• After 15+ years, we've made a big change: Android Forums is now Early Bird Club. Learn more here.

Root ZTE ZMAX Pro (Z981) root discussion

Status
Not open for further replies.
With marshmallow and nougat SuperSU and its binaries don't go in /system. Instead, the boot image is modified and a new mount point is created at /su and that is where the binaries go. The SuperSU app is then placed in /data/app the same place where it would go if you installed it from the play store. The only way to have SuperSU and its binaries installed to /system is to flash a custom kernel before flashing SuperSU.

As far as cf auto root goes, Chainfire only builds it for devices that use fastboot or Odin, and for those of you who don't know how it works, it flashes a custom recovery to your device then uses that recovery to flash SuperSU and then reinstalls the stock recovery.

Adb pull /system will only give you a partial dump of system files because there are a lot of libs and binaries that can't be copied without root privileges. As for pulling partition images from the device like a boot.img, recovery.img, or system.img that cannot be done without root access.
 
Upvote 0
Honestly I dont know but it seems when you do "adb reboot edl" the phone shows up as "Qualcomm HS-USB QDloader 9008" in device manager
6d85c77d2d88724d04eb0b59e21facff.jpg
This could be used to flash a ROM using a program like qpst or qfil but I don't know much of anything about how to use these programs.
Also, I don't know anything about how the files would need to be packaged or what format they would need to be in.
 
  • Like
Reactions: 5318008
Upvote 0
I was on that page yesterday actually reading up on this exact idea lol. If you look at page 12 I linked an app that flashes image files and stuff to phone's in dfu mode and we can boot to dfu too. And yeah I linked qfil or something similar after I read up on EDL we've known we have flashing options we've just been spending the day trying to get us the so elusive thing to flash
 
  • Like
Reactions: 5318008
Upvote 0
With marshmallow and nougat SuperSU and its binaries don't go in /system. Instead, the boot image is modified and a new mount point is created at /su and that is where the binaries go. The SuperSU app is then placed in /data/app the same place where it would go if you installed it from the play store. The only way to have SuperSU and its binaries installed to /system is to flash a custom kernel before flashing SuperSU.

As far as cf auto root goes, Chainfire only builds it for devices that use fastboot or Odin, and for those of you who don't know how it works, it flashes a custom recovery to your device then uses that recovery to flash SuperSU and then reinstalls the stock recovery.

Adb pull /system will only give you a partial dump of system files because there are a lot of libs and binaries that can't be copied without root privileges. As for pulling partition images from the device like a boot.img, recovery.img, or system.img that cannot be done without root access.
So my ideas are pointless,.... Sucks
 
Upvote 0
Too much to read. where we at? What was done so far? Hya btw
Basically we found out how to flash IMGs on the phone ie: kernels, roms?, Recoverys ect... And a long discussion about how to use that to gain root, all we got at this point is that we need a recovery(but how we gonna get one with pulling the existing one?) Or another temp root exploit till a recovery can be built using the information and files that we can access with said root to build a recovery.
 
  • Like
Reactions: 5318008
Upvote 0
ok let me get some info flowing... i have tried to set a flash.zip (no go).. i worked with the EDL stuff (emergency download mode for unbrick. NO GO...) I have tried to worke avery way possible with fastboot and either im doing wrong commands or FASTBOOT commands are completely null FDM its most likely the fastboot mode now the edl stuff its our DLM to flash our firmware now its two firmware around Z981 & Z963U so far kewrnel with not commit working to find vulnerabilities adress to XXXPPLOIT
 
  • Like
Reactions: 5318008
Upvote 0
For those of you who are thinking the quadrooter exploit might be the answer to rooting this phone, as far as I know the last time someone found an exploit like this and turned it into a root apk was when geohot made towelroot. Stagefright was found by a security firm and that is probably the case with quadrooter as well. In my opinion it's doubtful that how to implement the quadrooter exploit will ever become public knowledge.
 
Upvote 0
DO NOT ATTEMPT THIS ITS JUST AN EXAMPLE >>>
or comm like this
adb shell
(you should now see a # instead of a $. # = root)
4: exit
5: adb shell "mount -o remount,rw /system"
6: adb push su /system/xbin/su
7: adb push su /system/xbin/daemonsu
8: adb push install-recovery.sh /system/etc/install-recovery.sh
9: adb shell "chown 0.0 /system/xbin/su;chmod 06755 /system/xbin/su"
10: adb shell "chown 0.0 /system/xbin/daemonsu;chmod 06755 /system/xbin/daemonsu"
11: adb shell "chown 0.2000 /system/etc/install-recovery.sh;chmod 755 /system/etc/install-recovery.sh"
12: adb shell "sync;mount -o remount,ro /system"
13: adb install Superuser.apk

REBOOT AFTER STEP #13

Confirm root with rootchecker.
etcetcetc ...
 
  • Like
Reactions: 5318008
Upvote 0
DO NOT ATTEMPT THIS ITS JUST AN EXAMPLE >>>
or comm like this
adb shell
(you should now see a # instead of a $. # = root)
4: exit
5: adb shell "mount -o remount,rw /system"
6: adb push su /system/xbin/su
7: adb push su /system/xbin/daemonsu
8: adb push install-recovery.sh /system/etc/install-recovery.sh
9: adb shell "chown 0.0 /system/xbin/su;chmod 06755 /system/xbin/su"
10: adb shell "chown 0.0 /system/xbin/daemonsu;chmod 06755 /system/xbin/daemonsu"
11: adb shell "chown 0.2000 /system/etc/install-recovery.sh;chmod 755 /system/etc/install-recovery.sh"
12: adb shell "sync;mount -o remount,ro /system"
13: adb install Superuser.apk

REBOOT AFTER STEP #13

Confirm root with rootchecker.
etcetcetc ...
Don't forget the custom kernel that's needed in order to have root installed on the system partition.
 
Upvote 0
We will get there. Ive exhausted all my options. Looks like whenever kingroot gets to this device then we can get temp root. After temp root , we can then pull/backup the stock recovery. Therefore port twrp then flash the superuser.zip for permenant root.
I see know other option because of no fastboot functionality.
The first zmax had the same issue.

If theres a temp root solution besides kingroot then porting twrp is the easy part.
If we get a update (it's ZTE so who knows if that will happen) we would have everything to get a system based root built, but that could be along ways away if at all.
 
  • Like
Reactions: 5318008
Upvote 0
Upvote 0
Status
Not open for further replies.

BEST TECH IN 2023

We've been tracking upcoming products and ranking the best tech since 2007. Thanks for trusting our opinion: we get rewarded through affiliate links that earn us a commission and we invite you to learn more about us.

Smartphones