• After 15+ years, we've made a big change: Android Forums is now Early Bird Club. Learn more here.

Root ZTE ZMAX Pro (Z981) root discussion

Status
Not open for further replies.
I'm sketched out by this lol. I'm not seeing any peculiar new system files installed. It seems like it did something, but not sure what.
 
I just tried on b08. it goes through the process then reboots the phone but does not root although says root successful. Does anyone know if they're on xda like the kingroot team. I'd like to contact them and let them know it's not working and see what they say. I know it's a long shot but still think it's worth trying.
 
I just tried on b08. it goes through the process then reboots the phone but does not root although says root successful. Does anyone know if they're on xda like the kingroot team. I'd like to contact them and let them know it's not working and see what they say. I know it's a long shot but still think it's worth trying.
I tweeted @ them. But no response
 
I just tried on b08. it goes through the process then reboots the phone but does not root although says root successful. Does anyone know if they're on xda like the kingroot team. I'd like to contact them and let them know it's not working and see what they say. I know it's a long shot but still think it's worth trying.
It was one of many things I tried. I had the same result. They said on Twitter they can root this phone since day 1.. but I did read somewhere that the whole site and everything they say is a scam cause they claim to root phone as soon as the phone comes out but other users keep getting the same results.. I personally think the key is in spoofing the OTA. I extracted the SuperSU folder and things got a bit confusing. I also agree that the OTA is not that unique. If that was the cast, why would ZTE or metro add the install update from Sd in settings..
 
It was one of many things I tried. I had the same result. They said on Twitter they can root this phone since day 1.. but I did read somewhere that the whole site and everything they say is a scam cause they claim to root phone as soon as the phone comes out but other users keep getting the same results.. I personally think the key is in spoofing the OTA. I extracted the SuperSU folder and things got a bit confusing. I also agree that the OTA is not that unique. If that was the cast, why would ZTE or metro add the install update from Sd in settings..
You may be right. after going through their tweets I found some phones that to my knowledge are still not rooted. Sorry guys. I should have looked into them more before posting. I don't think they're a complete scam because their software is free and worked on my old phone but I'm no longer convinced that they are completely legitimate either. Guess that's a no go. I'll edit or delete my old post. Still, I think it's a good thing to try every avenue available. At the very least we will have a very long list of things that don't work. That's better than nothing imo.
 
I used to have an lg volt. SRS root claimed that it can root it. But upon downloading the software and such. It didn't work. I don't trust SRS root they lie to much. Plus in order to root the volt we used geohots univeral root tool. I've been reading a lot about systemless root but i haven't been home to try it or test things. My cars fuel line snapped and left me stranded. But all's good I should be home tonight to try some of my knowledge
 
You may be right. after going through their tweets I found some phones that to my knowledge are still not rooted. Sorry guys. I should have looked into them more before posting. I don't think they're a complete scam because their software is free and worked on my old phone but I'm no longer convinced that they are completely legitimate either. Guess that's a no go. I'll edit or delete my old post. Still, I think it's a good thing to try every avenue available. At the very least we will have a very long list of things that don't work. That's better than nothing imo.
I'm actually glad SRS root came up.. we sometimes forget to update the community on what has been tried. I also tried something I think is called Baidu root and pingpong root to no success.. keep exploring..
 
Seams to be just like the original zmax. Jcase may be able to point us in the right direction. The exploit prob needs tweaked/written to work around system write protect. Am I making sense?
 
Has anyone tried extracting system.img.dat in the OTA and placing the SuperSU binary in the bin or xbin folder?
 
Is the mbn file something you can use to root? I saw it. ITs saying it contains files in what I believe is what you need to root...

http://forum.xda-developers.com/showthread.php?t=2799160

I don't know why you are ignoring this idea coz I know I am on the right track. Look what I found:

http://forum.xda-developers.com/showthread.php?t=2641245

IT works come on now, will post this on xda. Maybe someone will be interested there since you all are ignoring me.
The Asianrocker says Ya'll Won't Give Him No Love... :confused:
I was posting my opinions on this subject at a different site.. and the Rocker claimed he was "in".. o_O
I've asked him to post a step by step for me.. since he says he knows the way in.. but, doesn't want root for himself because he wants to be ready for the Android N update.. I'll be sure to post my success should I make it to the *other side* ;)
 
The Asianrocker says Ya'll Won't Give Him No Love... :confused:
I was posting my opinions on this subject at a different site.. and the Rocker claimed he was "in".. o_O
I've asked him to post a step by step for me.. since he says he knows the way in.. but, doesn't want root for himself because he wants to be ready for the Android N update.. I'll be sure to post my success should I make it to the *other side* ;)
Maybe
 
The Asianrocker says Ya'll Won't Give Him No Love... :confused:
I was posting my opinions on this subject at a different site.. and the Rocker claimed he was "in".. o_O
I've asked him to post a step by step for me.. since he says he knows the way in.. but, doesn't want root for himself because he wants to be ready for the Android N update.. I'll be sure to post my success should I make it to the *other side* ;)

I did not say I am in. I was merely suggesting the mbn route. Which the zte person just confirmed is used to update firmware. I mean if none of the usual root they tried didn't work, the most sensical thing to do is try other way.

And I think mbn route is the way. I just don't know how to. LOL. So I am suggesting it to them even giving them the links to give them an idea to explore it because, I don't know android or linux.
 
Systemless root is a dead end in just about every possible way. I realize people
are just trying to help but if you spent 2 seconds looking at what your suggesting,
you would (should) see why it won't work.

Correct me if i'm wrong, mbn would'nt be possible without fastboot right?
 
Last edited:
Hey, just came up with a crazy idea... But it needs a lot of us to do it.

Continuously, download the KingRoot app on a Z981, make a request to root, then uninstall the app, then download it again and so on.
If about 20 of us do it 10 times a day, we should hit top 50 in less than 2 weeks...
But again it's just an idea although I'm already doing this 20 times a day
 
Been using dirtycow and attempting to flash twrp using the method here:
http://forum.xda-developers.com/showpost.php?p=69312919&postcount=148

The exploit does work but the stock recovery remains.

cmd%202_zpscmgb2rxy.png


I've tried everything I could think of but I'm burnt out & done for today.
Maybe you guys (possibly who OTA'd?) will have better luck.

Here's a zip with: dirtycow, cow-applypatch-flash, & Messi"s extracted twrp.img
Edit: removed for now, will update.

Here's the commands from the link:
  1. adb push twrp.img /sdcard/recovery.img
  2. adb push dirtycow /data/local/tmp
  3. adb push cow-applypatch-flash /data/local/tmp
  4. adb shell
  5. $ chmod 0777 /data/local/tmp/*
  6. $ /data/local/tmp/dirtycow /system/bin/applypatch /data/local/tmp/cow-applypatch-flash
  7. $ setprop ctl.start flash_recovery
  8. $ logcat | grep cow (you can see flash progress or failure with this)
  9. wait ~60 seconds
  10. TWRP is installed!
Everything seems to work fine except, adb reboot recovery, boots the stock recovery.

Its worth mentioning that this will only work with an unlocked boot-loader. Lets hope
that's not the problem here.

Edit: I know why this didn't work. I'm working on it now.
 
Last edited:
I had the original ZTE ZMAX. We had a ZTEROOT and some switchers. We were in about the same situation as this. That ZTEROOT wouldn't work for this phone?
 
Been using dirtycow and attempting to flash twrp using the method here:
http://forum.xda-developers.com/showpost.php?p=69312919&postcount=148

The exploit does work:

CMD_zpsx1espw0d.png


I've tried everything I could think of but I'm burnt out & done for today.
Maybe you guys (possibly who OTA'd?) will have better luck.

Here's a zip with: dirtycow, cow-applypatch-flash, & Messi"s extracted twrp.img
https://goo.gl/ZzSf72

Here's the commands from the link:
  1. adb push twrp.img /sdcard/recovery.img
  2. adb push dirtycow /data/local/tmp
  3. adb push cow-applypatch-flash /data/local/tmp
  4. adb shell
  5. $ chmod 0777 /data/local/tmp/*
  6. $ /data/local/tmp/dirtycow /system/bin/applypatch /data/local/tmp/cow-applypatch-flash
  7. $ setprop ctl.start flash_recovery
  8. $ logcat | grep cow (you can see flash progress or failure with this)
  9. wait ~60 seconds
  10. TWRP is installed!
Everything seems to work fine except, adb reboot recovery, boots the stock recovery.

Its worth mentioning that this will only work with an unlocked boot-loader. Lets hope
that's not the problem here.
Been using dirtycow and attempting to flash twrp using the method here:
http://forum.xda-developers.com/showpost.php?p=69312919&postcount=148

The exploit does work:

CMD_zpsx1espw0d.png


I've tried everything I could think of but I'm burnt out & done for today.
Maybe you guys (possibly who OTA'd?) will have better luck.

Here's a zip with: dirtycow, cow-applypatch-flash, & Messi"s extracted twrp.img
https://goo.gl/ZzSf72

Here's the commands from the link:
  1. adb push twrp.img /sdcard/recovery.img
  2. adb push dirtycow /data/local/tmp
  3. adb push cow-applypatch-flash /data/local/tmp
  4. adb shell
  5. $ chmod 0777 /data/local/tmp/*
  6. $ /data/local/tmp/dirtycow /system/bin/applypatch /data/local/tmp/cow-applypatch-flash
  7. $ setprop ctl.start flash_recovery
  8. $ logcat | grep cow (you can see flash progress or failure with this)
  9. wait ~60 seconds
  10. TWRP is installed!
Everything seems to work fine except, adb reboot recovery, boots the stock recovery.

Its worth mentioning that this will only work with an unlocked boot-loader. Lets hope
that's not the problem here.
Shouldn't twrp.img be recovery.img?
Irregardless, still didn't work. Tried both ways
 
Status
Not open for further replies.
Back
Top Bottom