获取android手机Root权限
2010-11-19 10:33
639 查看
Tidy up step by step rooting
1) Getting rageagainstthecage-arm5.bin
http://stealth.openwall.net/xSports/...nstTheCage.tgz
2) Getting Superuser.apk, busybox,su
http://forum.xda-developers.com/showthread.php?t=736271
Or
Find yourself..there are many floating around.
3) Rooting Process (Installing custom Recovery rom section is deleted to simplify illustration
Reference:http://forum.xda-developers.com/show...&postcount=250
1) Getting rageagainstthecage-arm5.bin
http://stealth.openwall.net/xSports/...nstTheCage.tgz
2) Getting Superuser.apk, busybox,su
http://forum.xda-developers.com/showthread.php?t=736271
Or
Find yourself..there are many floating around.
3) Rooting Process (Installing custom Recovery rom section is deleted to simplify illustration
Reference:http://forum.xda-developers.com/show...&postcount=250
F:\ADB>adb push rageagainstthecage-arm5.bin /data/local/tmp/rageagainstthecage 263 KB/s (5392 bytes in 0.020s) F:\ADB>adb shell chmod 700 /data/local/tmp/rageagainstthecage F:\ADB>adb shell $ cd /data/local/tmp cd /data/local/tmp $ ./rageagainstthecage ./rageagainstthecage[*] CVE-2010-EASY Android local root exploit (C) 2010 by 743C[*] checking NPROC limit ... [+] RLIMIT_NPROC={3084, 3084}[*] Searching for adb ... [+] Found adb as PID 64[*] Spawning children. Dont type anything and wait for reset![*][*] If you like what we are doing you can send us PayPal money to[*] 7-4-3-C[at]web.de so we can compensate time, effort and HW costs.[*] If you are a company and feel like you profit from our work,[*] we also accept donations > 1000 USD![*][*] adb connection will be reset. restart adb server on desktop and re-login. $ F:\ADB>adb kill-server F:\ADB>adb start-server * daemon not running. starting it now * * daemon started successfully * F:\ADB>adb shell #mount -o remount,rw -t yaffs2 /dev/block/mtdblock3 /system Follow the following steps to install Superuser.apk, busybox,su F:\ADB>adb shell # cd /data/local/tmp cd /data/local/tmp # ./busybox cp busybox /system/bin ./busybox cp busybox /system/bin # chmod 4755 /system/bin/busybox chmod 4755 /system/bin/busybox # busybox cp Superuser.apk /system/app busybox cp Superuser.apk /system/app # busybox cp su /system/bin busybox cp su /system/bin # chmod 4755 /system/bin/su chmod 4755 /system/bin/su # exit exit F:\ADB>adb shell # su su #mount -o remount,ro -t yaffs2 /dev/block/mtdblock3 /system # exit exit
相关文章推荐
- 一个获取Android手机root权限的程序
- Android手机root权限的判断与获取
- Android编程获取手机root权限问题
- Android用代码获取手机root之后的最高权限
- Android编程获取手机root权限问题
- Android手机获取权限问题
- android 应用如何获取系统权限 以及root系统方法
- 获取 Android 模拟器root 权限(解决data权限问题)
- 一键root手机,快速获取权限的方法
- Android手机动态获取权限
- Android入门之旅4—M9系统Root权限获取及目录结构分析
- Android Root设备中的su权限获取和使用详解
- 获取 Android 4.2 的 ROOT 权限(越狱)
- android5.1 获取adb shell root 权限
- 获取 Android 4.2 的 ROOT 权限(越狱)
- Android入门之旅4—M9系统Root权限获取及目录结构分析
- 无废话Android之android下junit测试框架配置、保存文件到手机内存、android下文件访问的权限、保存文件到SD卡、获取SD卡大小、使用SharedPreferences进行数据存储、使用Pull解析器操作XML文件、android下操作sqlite数据库和事务(2)
- android开发学习(二)——保存文件到手机内存和SD卡,文件访问权限,获取内存大小
- Android之——利用系统权限实现手机重启(获取系统权限签名详解)
- 获取 Android 模拟器root 权限(解决data权限问题)