Related
http://forum.xda-developers.com/showthread.php?t=2071626
2013/01/07:
Secure_Boot_Key Dumper for tegra2/tegra3 v0.1
1. adb push ss.ko /sdcard/
2. adb shell
su
cd /sdcard/
insmod ss.ko
dmesg
3. at the end of dmesg, you should see the secure_boot_key.....
Please veriy it with Atrix 4G, hope it work with all tegra devices.
YOUR DEVICE MUST BE ROOTED!
Reply
Thx!!
Hey, if this is the SBK file we needed then we can revive our bricked Atrix, right?
It's not a SBK file, it's a way of getting one. Provided that the method described actually works.
hey, has anyone got the SBK? Is it possible to revive hard bricked atrix!!!!???
what can we do with a SBK?
being able to unlock the bootloader on newer devices or to rescue bricked devices?
Sent from my MB860 using xda app-developers app
I hope somebody here can try this!
Please post the results asap!
akizakian said:
I hope somebody here can try this!
Please post the results asap!
Click to expand...
Click to collapse
I will try this. only problem is I don't remember how to use adb. I am looking into it. has been a while. I am rooted with one of our cool new bootloaders that no one has figured out how to unlock yet.
step by step starting with installing adb would be great
I received an email about a soak test so i will not be messing with phone for a while.
Guys, I know chances are very small, but did anybody actually try this software? It would be interesting to know.
akizakian said:
Guys, I know chances are very small, but did anybody actually try this software? It would be interesting to know.
Click to expand...
Click to collapse
I tested it but it just shows me that my SBK is fx00000.... I don't remember how many 0
But I think that wee need completely rebuild kernel for hacking SBK not just patch in kernel
Anyone have an update on this yet?
Hello everyone. I am a kindle fire hdx user from China. We all waited your root method and turned out that we rooted first.
The method is very simple.
1. Install the attached software in your compurter, connect your device .(be sure you installed driver)The software will connect your device.
2. Click the low right button. Your device will be rebooted in five seconds. Root completed.
joetech1989 said:
Hello everyone. I am a kindle fire hdx user from China. We all waited your root method and turned out that we rooted first.
The method is very simple.
1. Install the attached software in your compurter, connect your device .(be sure you installed driver)The software will connect your device.
2. Click the low right button. Your device will be rebooted in five seconds. Root completed.
Click to expand...
Click to collapse
Can you show the source. I really don't trust this, if it works or not. Can we see the code. I put together code from other known Devs. The package seems shady, just saying. Anybody else install this?
Faznx92 said:
Can you show the source. I really don't trust this, if it works or not. Can we see the code. I put together code from other known Devs. The package seems shady, just saying. Anybody else install this?
Click to expand...
Click to collapse
It's a pretty popular rooting tool use among people how lack knowledge of Linux. Btw I rooted mine use the same tool, and I'm chinese too. We don't really know what exploit they use but it seems to work pretty well.
Sent from my KFTHWI using Tapatalk
wz7820431lb said:
It's a pretty popular rooting tool use among people how lack knowledge of Linux. Btw I rooted mine use the same tool, and I'm chinese too. We don't really know what exploit they use but it seems to work pretty well.
Sent from my KFTHWI using Tapatalk
Click to expand...
Click to collapse
I would like to know what exploit they used. Hold onto that for a future root. That is what I'm really interested in.
Faznx92 said:
Can you show the source. I really don't trust this, if it works or not. Can we see the code. I put together code from other known Devs. The package seems shady, just saying. Anybody else install this?
Click to expand...
Click to collapse
I didn't since this was the first post by someone just claiming it works without any source code or proof. I have to agree with you that this seems shady.
R1Mike said:
I didn't since this was the first post by someone just claiming it works without any source code or proof. I have to agree with you that this seems shady.
Click to expand...
Click to collapse
Either way I'm not install this to my computer. I really want to see what exploit they used. But yah, I don't know what this is. Better to be safe then sorry.:angel:
joetech1989 said:
Hello everyone. I am a kindle fire hdx user from China. We all waited your root method and turned out that we rooted first.
The method is very simple.
1. Install the attached software in your compurter, connect your device .(be sure you installed driver)The software will connect your device.
2. Click the low right button. Your device will be rebooted in five seconds. Root completed.
Click to expand...
Click to collapse
And doubt you rooted first since this suddenly appears 2 days after it was first rooted here on XDA from our great jcase.
Faznx92 said:
Can you show the source. I really don't trust this, if it works or not. Can we see the code. I put together code from other known Devs. The package seems shady, just saying. Anybody else install this?
Click to expand...
Click to collapse
I don't know how it works but it works. Show you the evidence.
Is this work for the model HDX 8.9" as well?
lanegan said:
Is this work for the model HDX 8.9" as well?
Click to expand...
Click to collapse
Just tested on HDX 7. Not suggest you to try.
joetech1989 said:
Just tested on HDX 7. Not suggest you to try.
Click to expand...
Click to collapse
If you can find who made this or what the exploit code is it may be a future rooting method.
Faznx92 said:
If you can find who made this or what the exploit code is it may be a future rooting method.
Click to expand...
Click to collapse
It's a very popular root tool in China that made by a company. I tested it OK and here to share with you. Can't get any code.
The best and quickest method to root.
joetech1989, Thank you, bro!!!
Your method really works fine.
Very easy and fast.
Equinox666 said:
joetech1989, Thank you, bro!!!
Your method really works fine.
Very easy and fast.
Click to expand...
Click to collapse
Can you please tell us your version? Are you on the latest version of hdx7? Give us more specific would be very helpful. Thanks bud!
andyt315 said:
Can you please tell us your version? Are you on the latest version of hdx7? Give us more specific would be very helpful. Thanks bud!
Click to expand...
Click to collapse
Current version: 13.3.1.0. At first it is necessary to include in settings Enable ADB, then to install adb drivers.
Seems sketchy. So seeing as you only have a few posts...it seems you just joined XDA developers. And you have a root tool but you cannot tell us more about it. I mean if it works then GREAT but most people would want to know what exactly it is that they are downloading..just saying. don't be offended.
equisbox said:
Seems sketchy. So seeing as you only have a few posts...it seems you just joined XDA developers. And you have a root tool but you cannot tell us more about it. I mean if it works then GREAT but most people would want to know what exactly it is that they are downloading..just saying. don't be offended.
Click to expand...
Click to collapse
This kind of reminds me of the whole fiasco with Kango root, which was secretly sending peoples IMEI numbers to a server in China, even though the dev claimed to be from Canada. It was a very easy to use program to root many different phones but was eventually pulled from XDA because of security concerns. It was/is sending 'sensitive' data without encrypting it and then also sent the IMEI as well. It also connected to the internet to download 'drivers' so a virus scan was not of much use for Kango Root. That is a completely separate program which was posted by a different XDA member.
Just to be clear... I am not at all inferring the original poster has malicious intent or has posted a malicious tool. I am merely explaining why some would view it with such skepticism especially in light of previous events. I don't yet own a Kindle Fire HDX, so, I don't have to make the difficult choice of choosing which way to root the device. Virus Total reports the files as being clean, but, that does not always mean it is safe, especially if something is downloaded once the file has been executed.
If you could shed some additional light on the tool it would likely help to put a lot of people's minds at ease.
joetech1989 said:
It's a very popular root tool in China that made by a company. I tested it OK and here to share with you. Can't get any code.
Click to expand...
Click to collapse
What is the company's name in China and do they have a webpage that we can see and get the root tool from?
Yes ,it works. maybe they use exploit we get it on XDA.
FYI : thus is just one of a few xda posts I've seen concerning vroot.... http://forum.xda-developers.com/showthread.php?t=2473354
Sent from my SCH-I545 using Tapatalk
This is for anyone who has root on 4.4.4 but also has write protection enabled. (Used SuperSU to keep root through the update).
This app will allow you to enable the native WiFi tether without modifying the system (Which we can't do anyways). I have been using this for about an hour with no issues.
Finally, I didn't make this, I'm just someone who's stuck between places and need WiFi tethering for my job and hate spending money. Use at your own risk of course.
http://forum.xda-developers.com/moto-x/themes-apps/app-hotspot-entitlement-bypass-v1-1-5-9-t2705152
Sent from my XT1080 using Tapatalk
Yeah, I think this is how Topsnake's exploit works.
Its the same thing as the exploit I released in the dev section. Nice repost
Topsnake said:
Its the same thing as the exploit I released in the dev section. Nice repost
Click to expand...
Click to collapse
Link? I looked through both Dev sections and only saw exploits that require you to modify system files and build.prop. Sorry nonetheless if this has been posted before.
Sent from my XT1080 using Tapatalk
miketoasty said:
Link? I looked through both Dev sections and only saw exploits that require you to modify system files and build.prop. Sorry nonetheless if this has been posted before.
Sent from my XT1080 using Tapatalk
Click to expand...
Click to collapse
Yeah i just made the connection now. Forgot not everyone has unlocked BLs. In theory, if the app can make the change, you can too.
The app literally applies the same exact exploit as the one I've already released.
chrisc2u said:
Doesn't the exploit require write access? Shouldn't this as well? Just want to make sure before I update.Thanks in advance.
Click to expand...
Click to collapse
No it does not, it runs a command after the phone is booted that while requiring root to run does not make any actually changes to the system.
Again, I have a 1 for write protection (meaning its enabled) and SuperSU basically stuck in System and have no issues running the app, making WiFi hot spots, and having devices connected to it.
Make sure you have root survival set up as well, I'm not sure if the update would remove root without it but I don't think you would want to take that chance.
Sent from my XT1080 using Tapatalk
I dont know if anybody found that before but Im able to tether wifi without doing anything [emoji1], of course Im using my phone outside US with a gsm carrier.
miketoasty said:
No it does not, it runs a command after the phone is booted that while requiring root to run does not make any actually changes to the system.
Again, I have a 1 for write protection (meaning its enabled) and SuperSU basically stuck in System and have no issues running the app, making WiFi hot spots, and having devices connected to it.
Make sure you have root survival set up as well, I'm not sure if the update would remove root without it but I don't think you would want to take that chance.
Sent from my XT1080 using Tapatalk
Click to expand...
Click to collapse
and just to confirm, you couldn't apply my exloit? Again this app does the same thing.
josuearisty said:
I dont know if anybody found that before but Im able to tether wifi without doing anything [emoji1], of course Im using my phone outside US with a gsm carrier.
Click to expand...
Click to collapse
That's because your on a different carrier
Topsnake said:
and just to confirm, you couldn't apply my exloit? Again this app does the same thing.
Click to expand...
Click to collapse
I attempted this exploit by you TopSnake ( http://bit.ly/1zz1JOE) and after rebooting my build.prop was deleted and all renamed files were restored to their original state. Was there another exploit you were talking about? This was the only one I could find in the dev section for the latest update.
I do know that you can run a simple command to do what this app does but this app can run on boot up which saves some time.
Sent from my XT1080 using Tapatalk
Topsnake said:
The app literally applies the same exact exploit as the one I've already released.
Click to expand...
Click to collapse
The OP stated he was write protected, so he can't copy the build.prop over the stock one. My app doesn't write to the system it runs the /system/bin/setprop command to set the property. The build.prop sets the property on boot but after the phone has booted the build.prop is never read again. So replacing it on write protected devices won't work.
Replied in pm
Thread cleaned
Keep this thread on topic and all other issues to PMs
Thank you for your cooperation
Friendly Neighborhood Senior-Mod
Is there any way to root my phone.
The system version is 183.46.15.
If your boot loader is locked, no.
Sent from my HTC6525LVW using Tapatalk
Nope. Sorry. Both bootloader and root are patched.
RikRong said:
If your boot loader is locked, no.
Sent from my HTC6525LVW using Tapatalk
Click to expand...
Click to collapse
Is there any guru working on the root? thinking about selling the phone if no hope
everseen said:
Is there any guru working on the root? thinking about selling the phone if no hope
Click to expand...
Click to collapse
Not gonna come as far as I can see from now. Just go ahead and sell it. Plenty of alternatives on the market.
Sent from Google Nexus 4 @ CM11
[WARNING: XDA Premium 4.0.13 lacks Signature function - do not update]
There are some RAZR M that are unlocked on Swappa as well.
tianor said:
Is there any way to root my phone.
The system version is 183.46.15.
Click to expand...
Click to collapse
Did u get unlocked, i am also stricken with it
Love Cyaan said:
Did u get unlocked, i am also stricken with it
Click to expand...
Click to collapse
No luck yet.
root and unlock 183.46.15
everseen said:
No luck yet.
Click to expand...
Click to collapse
Me too, me too!
Googleing this search daily " unlock 183.46.15 site:forum[.]xda-developers[.]com"
Checked ever corner of XDA, alas no solution on how to root and unlock 183.46.15
Devs @ XDA, come on champs gave us something, so can we also enjoy the privilege of CM12. Many are waiting for it fingers crossed
Mods/all, its only a humble request to Dev & not that if being annoyed.
Qualcomm patched the second layer (sbl2) of the second-stage bootloader, to take care of possible exploitation, effectively making it impenetrable. So for some individuals, we're pretty much out of luck. I wouldn't be sure of the possible exploits (the problem is, after that patch, it makes it even harder, although not impossible). Previous Kit Kat rooting exploitation relies on the permission requestion layer (futex) of the Linux kernel, as discovered by the former PS3 hacker, GeoHot, while it's patched by now. It's possible there is already a new rooting exploit by now, just don't hold the breath.
It's possible there is already a new rooting exploit by now, just don't hold the breath.
Click to expand...
Click to collapse
Can you please be more concretely?
I may not be up to date, been out of town for a bit, and figuring out a way to unbrick a few RAZR Ms.
However, the reason I said not to hold the breath is because of Verizon demanding a hard fix for rooting so that way almost any root exploits simply fail on arrival. This phone company also WANTS locked BIOS so no one can install custom recovery and OS "just because it put customer services in jeopardy".
That's really bad, can't believe that there is no chance to root or bootunlock this device.
By the way, do you know any way to disable/delete/freeze modem fast dormancy service without rooting phone? Or to made some changes in build.prop file?
Simply force close Modem fastdormancy first then disable it in app manager, it will then quit. And, editing build.prop requires root (write protection).
Force close works but disable button is inactive.
Sent from my XT907 using XDA Free mobile app
Ah, right.... I wonder why Verizon would disable some app manager features.
I'm outside of us, my carrier operates in gsm network and does not support fast dormancy, therefore phone reboots and can't wake up on power button when using h+. Thats why I need to edit build.prop and to dothis I need root access to file system.
Sent from my XT907 using XDA Free mobile app
Makes sense. However, I may look for new exploit, but since Futex is removed, it is not so simple.
Dr. Mario, are you developer?
Sent from my XT907 using XDA Free mobile app
Not officially, yet. But I know how the software works underneath the pretty UI, even down to the machine codes. I have been modding Android for 3 years.
If i were to change the emmc chip on my 7th gen 7" and 8" fire tablets for an emmc chip with vanilla Android am i likely to run into any issues?
J_IO_B said:
If i were to change the emmc chip on my 7th gen 7" and 8" fire tablets for an emmc chip with vanilla Android am i likely to run into any issues?
Click to expand...
Click to collapse
yes, you will run into many problems. 1st problem is desoldering it. 2nd problem if desoldering wasn't a dead end, finding a preprogrammed emmc chip that will work for it is pretty much impossible. but don't worry there is a new exploit for all MediaTek processors that will let you flash partitions in boot rom mode! it's only a matter of time for this device to get hacked.
ANDROID2468 said:
yes, you will run into many problems. 1st problem is desoldering it. 2nd problem if desoldering wasn't a dead end, finding a preprogrammed emmc chip that will work for it is pretty much impossible. but don't worry there is a new exploit for all MediaTek processors that will let you flash partitions in boot rom mode! it's only a matter of time for this device to get hacked.
Click to expand...
Click to collapse
Thanks for the reply if i did have the ability to desolder/resoldrer and program the emmc chip do you know what i should program it with? a compatible image? Or is it this that isn't available?
The exploit sounds even more promising do you know where i can find out more?
J_IO_B said:
Thanks for the reply if i did have the ability to desolder/resoldrer and program the emmc chip do you know what i should program it with? a compatible image? Or is it this that isn't available?
The exploit sounds even more promising do you know where i can find out more?
Click to expand...
Click to collapse
I pach a system.img with root now I'm just waiting for a script to flash it!( The scripts use python and I'm kinda new to programming python) I requested on a different thread for the script...
So I wouldn't go with the desolder the emmc route because then you have to warty about soldier balls, bridges, killing you emmc chip with heat, etc.
Sent from my VS986 using XDA Labs
ANDROID2468 said:
I pach a system.img with root now I'm just waiting for a script to flash it!( The scripts use python and I'm kinda new to programming python) I requested on a different thread for the script...
So I wouldn't go with the desolder the emmc route because then you have to warty about soldier balls, bridges, killing you emmc chip with heat, etc.
Sent from my VS986 using XDA Labs
Click to expand...
Click to collapse
How did you get on?
J_IO_B said:
How did you get on?
Click to expand...
Click to collapse
if you short one of the pads under the sheld to ground you will be able to boot to boot rom mode. that's when you will run the script to that will decrypt the keys so you can flash anything from there.
Bit late but its kinda impossible to change emmc chips.
If you get past soldering you could replace emmc chips with one from an old broken fire
and maybe it will work then
But who knows
we already have full root and bootloader unlock for most of the fire devices now
check the relevant sub for your model
LOS (soon)
ANDROID2468 said:
if you short one of the pads under the sheld to ground you will be able to boot to boot rom mode. that's when you will run the script to that will decrypt the keys so you can flash anything from there.
Click to expand...
Click to collapse
Sorry for the hijack here, but do this work on Fire HD 8 5th Gen model?
Thanks!
mugorj said:
Sorry for the hijack here, but do this work on Fire HD 8 5th Gen model?
Thanks!
Click to expand...
Click to collapse
Yes, technically it will but this method is harder to do.
here is a more in-depth guide on this. But I would not use this method, it's complex.
About the bootloader unlock:
The explicit to unlock the bootloader hasn't been ported to your device (if it has, I can't find it on XDA). It's because this model isn't that common. I will help Root you device using this method but I'm not skilled enough to Port the bootloader unlock.
ANDROID2468 said:
Yes, technically it will but this method is harder to do.
here is a more in-depth guide on this. But I would not use this method, it's complex.
About the bootloader unlock:
The explicit to unlock the bootloader hasn't been ported to your device (if it has, I can't find it on XDA). It's because this model isn't that common. I will help Root you device using this method but I'm not skilled enough to Port the bootloader unlock.
Click to expand...
Click to collapse
@ANDROID2468:
Thank you very much for your help!
If I can achieve root access, I believe I'll be 97% happy. I have just managed to have another launcher working on my device with Launcher Hijack (just discovered that Amazon implemented a childish blocking by the app name), and the thing is flying! I'm much happier! The device is perfectly usable now!
If I just can uninstall some Amazon crap and have my stuff going, I'll be happy, even if it's still running FireOS underneath.
I'll read the topic you mentioned carefully. If I still need help, I'll politelly ask you for guidance.
Thanks again!
mugorj said:
@ANDROID2468:
Thank you very much for your help!
If I can achieve root access, I believe I'll be 97% happy. I have just managed to have another launcher working on my device with Launcher Hijack (just discovered that Amazon implemented a childish blocking by the app name), and the thing is flying! I'm much happier! The device is perfectly usable now!
If I just can uninstall some Amazon crap and have my stuff going, I'll be happy, even if it's still running FireOS underneath.
I'll read the topic you mentioned carefully. If I still need help, I'll politelly ask you for guidance.
Thanks again!
Click to expand...
Click to collapse
ok, first I need to know what version of fire os you are running.
Then, I need a picture of your board. you need to open your tablet and you need to take off the shield. here is an example (you have the 5th gen so the shield should just pop off):
mugorj said:
@ANDROID2468:
Thank you very much for your help!
If I can achieve root access, I believe I'll be 97% happy. I have just managed to have another launcher working on my device with Launcher Hijack (just discovered that Amazon implemented a childish blocking by the app name), and the thing is flying! I'm much happier! The device is perfectly usable now!
If I just can uninstall some Amazon crap and have my stuff going, I'll be happy, even if it's still running FireOS underneath.
I'll read the topic you mentioned carefully. If I still need help, I'll politelly ask you for guidance.
Thanks again!
Click to expand...
Click to collapse
sorry, I didn't read your message carefully. the post that I posted previously was about porting a root method used by the fire 7 (7th gen) which was used before the bootloader unlock was released(well the 5th gen was released at the time but not 7th gen ). that method is a lot easier to do and less likely to kill your device.
Do you have a link for the root method please?
laharl_22 said:
Do you have a link for the root method please?
Click to expand...
Click to collapse
do you have a hd8 5th gen? or something else?