![]() platform=android-8 -install-dir=/tmp/android-8-toolchain path-to-ndk/build/tools/make-standalone-toolchain.sh \ ZergRush exploits a use-after-free bug in Android 2.2 and Android 2.3 to temporarily restart the adbd daemon as root. ![]() Using zergRush exploit to restart adbd as root If you do not have a debug version of adb, you will need to exploit your device in order to restart adbd as root. If you have a debug version of adbd installed on your device, all you need to do get write permission on /system is to execute:Īdb root # restart the adbd daemon as rootĪdb remount # remount the /system partition as read-write This guide does not cover modifying or reflashing the boot image on your device. installing additional software such as busybox, or Superuser.apk.creating an executable su which when executed runs as root.being able to write to the /system partition to install software. ![]() Rooting an Android device in this guide means: You assume full responsibility in the event something goes wrong. 1.1.1 Using zergRush exploit to restart adbd as rootĭISCLAIMER: Following the steps on this page may brick your device and will certainly void any warranty. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |