Mid am705


  1. dpetrosky1

    dpetrosky1 Member

    I would like to root this MID AM705 7" Tablet but cannot find a way to do this. Can you help me please by providing a good app/link.
    Thank You.
    **SuperOneClick Does not seem to work
    **SuperUser does not work
    **Z4Root does not work

    Advertisement
  2. mikedt

    mikedt 你好 Guide

    A no-brand Chinese device, which is rarely good. Doesn't seem to be much information at all for this one. And searching for AM705 on Chinese sites, shows it as being a bra. Seems to be a trading company in Guangzhou that distributes a tablet called AM705. For what good it might be, here's their contact details...
    Guangzhou S.Mita Electronic Firm
    Telephone: 13710467798
    Fax: 020-85670309
    Address: Room 105, Building 31th, Donghe Garden,Yuancun Er Heng road,Tianhe district
    Zip: 510655
    Guangzhou, Guangdong, China.

    If you've already tried all the usual rooting tools, think you might be out of luck. One thing though, sure it's not already rooted? - some of these Chinese tablets are already rooted
  3. dpetrosky1

    dpetrosky1 Member

  4. mikedt

    mikedt 你好 Guide

    Geeks.com is the US importer. Searching for "AM705" doesn't really show much relevant information at all, apart from the Guangzhou trading company, and "MID" is just generic. More than likely this tablet is distributed under other names and designations.

    Is there any more information in the About Tablet menu, like Build number, Kernel version, Model version, etc. Sometimes searching for these can show more information about who the manufacturer is, which can sometimes be useful in finding information about possible rooting etc,.
  5. dpetrosky1

    dpetrosky1 Member

    @Mikedt
    Model # - ICS
    Android Version - 4.0.3
    Kernel Version - 3.0.8
    Build Number - ICS.f08refem31.20120808
  6. mikedt

    mikedt 你好 Guide

    I don't think we can identify this one at all. That's all rather generic. I did actually call Guangzhou S.Mita Electronic Firm at 13710467798, They didn't know anything about rooting at all, in fact they just said we primarily distribute educational toys, that's all I could get from them.


    That's sometimes the problem with these things, there is no way to identify what you've got, that's if there's any rooting info at all. Sometimes it does give clues as to what it actually is, sometimes it doesn't.
  7. dpetrosky1

    dpetrosky1 Member

    Is there any app out there that can pull more information from this device..... so that I may be able to download some drivers for it?
  8. mikedt

    mikedt 你好 Guide

    There's various system-info and diagnostic apps. But they'll usually tell you what hardware it's got, CPU speed and number of cores, RAM size, etc, plus whatever information is the About Tablet stuff, which we already know. Universal rooting tools will only do what they can, and what they know about.

    If there's a device which is unknown, and and non of the established rooting methods work, then that's pretty much it. Unless any more information comes to light in the future about this tablet...I wouldn't hold your breath though.
  9. dpetrosky1

    dpetrosky1 Member

    I'm sure there is a way to put all this in a link, but I do not know how at the moment.
    Here is the info that is displayed using SuperOneClick when trying to root this generic device.....maybe you can make something out of this......

    * daemon not running. starting it now on port 5037 *
    * daemon started successfully *
    export PS1=""

    shell@android:/ $ export PS1=""
    getprop ro.build.version.release > /data/local/tmp/output 2>&1
    export TEMPRANDOM=26777
    export PS1=END:$TEMPRANDOM;cat /data/local/tmp/output
    4.0.3
    END:26777export PS1=""

    getprop ro.product.manufacturer > /data/local/tmp/output 2>&1
    export TEMPRANDOM=60635
    export PS1=END:$TEMPRANDOM;cat /data/local/tmp/output
    EMDOOR
    END:60635export PS1=""
    getprop ro.product.model > /data/local/tmp/output 2>&1
    export TEMPRANDOM=30213
    export PS1=END:$TEMPRANDOM;cat /data/local/tmp/output
    ICS
    END:30213export PS1=""
    getprop ro.build.version.incremental > /data/local/tmp/output 2>&1
    export TEMPRANDOM=42771
    export PS1=END:$TEMPRANDOM;cat /data/local/tmp/output
    eng.xiebing.20120808.144901
    END:42771export PS1=""
    ls -l /system/xbin/su > /data/local/tmp/output 2>&1
    export TEMPRANDOM=39633
    export PS1=END:$TEMPRANDOM;cat /data/local/tmp/output
    /system/xbin/su: No such file or directory
    END:39633export PS1=""
    ls -l /system/bin/su > /data/local/tmp/output 2>&1
    export TEMPRANDOM=99210
    export PS1=END:$TEMPRANDOM;cat /data/local/tmp/output
    /system/bin/su: No such file or directory
    END:99210export PS1=""
    chmod 755 /data/local/tmp/busybox > /data/local/tmp/output 2>&1
    export TEMPRANDOM=17357
    export PS1=END:$TEMPRANDOM;cat /data/local/tmp/output
    END:17357export PS1=""
    /data/local/tmp/busybox whoami > /data/local/tmp/output 2>&1
    export TEMPRANDOM=62208
    export PS1=END:$TEMPRANDOM;cat /data/local/tmp/output
    export TEMPRANDOM=62208
    export PS1=END:$TEMPRANDOM;cat /data/local/tmp/output
    whoami: unknown uid 2000
    END:62208export PS1=""
    rm /data/local/tmp/boomsh > /data/local/tmp/output 2>&1
    export TEMPRANDOM=17059
    export PS1=END:$TEMPRANDOM;cat /data/local/tmp/output
    END:17059export PS1=""
    rm /data/local/tmp/sh > /data/local/tmp/output 2>&1
    export TEMPRANDOM=94202
    export PS1=END:$TEMPRANDOM;cat /data/local/tmp/output
    END:94202export PS1=""
    chmod 700 /data/local/tmp/zergRush > /data/local/tmp/output 2>&1
    export TEMPRANDOM=15487
    export PS1=END:$TEMPRANDOM;cat /data/local/tmp/output
    END:15487export PS1=""
    cd /data/local/tmp/ > /data/local/tmp/output 2>&1
    export TEMPRANDOM=17357
    export PS1=END:$TEMPRANDOM;cat /data/local/tmp/output
    END:17357export PS1=""
    export TEMPRANDOM=29915;export PS1=END:$TEMPRANDOM;./zergRush
    [**] Zerg rush - Android 2.2/2.3 local root
    [**] (C) 2011 Revolutionary. All rights reserved.
    [**] Parts of code from Gingerbreak, (C) 2010-2011 The Android Exploid Crew.
    [-] Not a 2.2/2.3 Android ...
    END:29915export PS1=""
    export PS1=""
    /data/local/tmp/busybox mount -o rw,remount /system > /data/local/tmp/output 2
    ount /system > /data/local/tmp/output 2 <>&1
    export TEMPRANDOM=34626
    export PS1=END:$TEMPRANDOM;cat /data/local/tmp/output
    mount: permission denied (are you root?)
    END:34626export PS1=""
    /data/local/tmp/busybox mount > /data/local/tmp/output 2>&1
    export TEMPRANDOM=94202
    export PS1=END:$TEMPRANDOM;cat /data/local/tmp/output
    rootfs on / type rootfs (rw)
    tmpfs on /dev type tmpfs (rw,nosuid,relatime,mode=755)
    devpts on /dev/pts type devpts (rw,relatime,mode=600,ptmxmode=000)
    proc on /proc type proc (rw,relatime)
    sysfs on /sys type sysfs (rw,relatime)
    none on /acct type cgroup (rw,relatime,cpuacct)
    tmpfs on /mnt/asec type tmpfs (rw,relatime,mode=755,gid=1000)
    tmpfs on /mnt/obb type tmpfs (rw,relatime,mode=755,gid=1000)
    none on /dev/cpuctl type cgroup (rw,relatime,cpu)
    ubi0_0 on /system type ubifs (rw,relatime)
    ubi1_0 on /data type ubifs (rw,nosuid,nodev,relatime)
    /dev/block/mtdblock6 on /cache type yaffs2 (rw,nosuid,nodev,relatime)
    none on /proc/bus/usb type usbfs (rw,relatime)
    /dev/block/vold/250:33 on /mnt/sdcard type vfat (rw,dirsync,nosuid,nodev,noexec,relatime,uid=1000,gid=1015,fmask=0002,dmask=0002,allow_utime=0020,codepage=cp437,iocharset=iso8859-1,shortname=mixed,utf8,errors=remount-ro)
    /dev/block/vold/250:33 on /mnt/secure/asec type vfat (rw,dirsync,nosuid,nodev,noexec,relatime,uid=1000,gid=1015,fmask=0002,dmask=0002,allow_utime=0020,codepage=cp437,iocharset=iso8859-1,shortname=mixed,utf8,errors=remount-ro)
    tmpfs on /mnt/sdcard/.android_secure type tmpfs (ro,relatime,size=0k,mode=000)
    END:94202export PS1=""
    /data/local/tmp/busybox mount -o rw,remount ubi0_0 /system > /data/local/tmp/o
    ount ubi0_0 /system > /data/local/tmp/o <utput 2>&1
    export TEMPRANDOM=63780
    export PS1=END:$TEMPRANDOM;cat /data/local/tmp/output
    mount: permission denied (are you root?)
    END:63780export PS1=""
    /data/local/tmp/busybox mount > /data/local/tmp/output 2>&1
    export TEMPRANDOM=38061
    export PS1=END:$TEMPRANDOM;cat /data/local/tmp/output
    rootfs on / type rootfs (rw)
    tmpfs on /dev type tmpfs (rw,nosuid,relatime,mode=755)
    devpts on /dev/pts type devpts (rw,relatime,mode=600,ptmxmode=000)
    proc on /proc type proc (rw,relatime)
    sysfs on /sys type sysfs (rw,relatime)
    none on /acct type cgroup (rw,relatime,cpuacct)
    tmpfs on /mnt/asec type tmpfs (rw,relatime,mode=755,gid=1000)
    tmpfs on /mnt/obb type tmpfs (rw,relatime,mode=755,gid=1000)
    none on /dev/cpuctl type cgroup (rw,relatime,cpu)
    ubi0_0 on /system type ubifs (rw,relatime)
    ubi1_0 on /data type ubifs (rw,nosuid,nodev,relatime)
    /dev/block/mtdblock6 on /cache type yaffs2 (rw,nosuid,nodev,relatime)
    none on /proc/bus/usb type usbfs (rw,relatime)
    /dev/block/vold/250:33 on /mnt/sdcard type vfat (rw,dirsync,nosuid,nodev,noexec,relatime,uid=1000,gid=1015,fmask=0002,dmask=0002,allow_utime=0020,codepage=cp437,iocharset=iso8859-1,shortname=mixed,utf8,errors=remount-ro)
    /dev/block/vold/250:33 on /mnt/secure/asec type vfat (rw,dirsync,nosuid,nodev,noexec,relatime,uid=1000,gid=1015,fmask=0002,dmask=0002,allow_utime=0020,codepage=cp437,iocharset=iso8859-1,shortname=mixed,utf8,errors=remount-ro)
    tmpfs on /mnt/sdcard/.android_secure type tmpfs (ro,relatime,size=0k,mode=000)
    END:38061export PS1=""
    mount -o rw,remount ubi0_0 /system > /data/local/tmp/output 2>&1
    export TEMPRANDOM=39931
    export PS1=END:$TEMPRANDOM;cat /data/local/tmp/output
    mount: Operation not permitted
    END:39931

Share This Page