I have redone all of the steps and got an error about the file not found when moving the .p file which I expected. here is the output from the entire process.
C:\tools>adb push c:\droidroot\rageagainstthecage-a
rm5.bin /data/local/tmp
338 KB/s (0 bytes in 5392.000s)
C:\tools>adb shell
$ cd /data/local/tmp
cd /data/local/tmp
$ chmod 0755 rageagainstthecage-arm5.bin
chmod 0755 rageagainstthecage-arm5.bin
$ ./rageagainstthecage-arm5.bin
./rageagainstthecage-arm5.bin
[*] CVE-2010-EASY Android local root exploit (C) 2010 by 743C
[*] checking NPROC limit ...
[+] RLIMIT_NPROC={1803, 1803}
[*] Searching for adb ...
[+] Found adb as PID 3942
[*] Spawning children. Dont type anything and wait for reset!
[*]
[*] If you like what we are doing you can send us PayPal money to
[*] 7-4-3-C@web.de so we can compensate time, effort and HW costs.
[*] If you are a company and feel like you profit from our work,
[*] we also accept donations > 1000 USD!
[*]
[*] adb connection will be reset. restart adb server on desktop and re-login.
$
C:\tools>adb devices
List of devices attached
0403682802008009 device
C:\tools>adb shell
# mount -o remount,rw -t yaffs2 /dev/block/mtdblock4 /system
mount -o remount,rw -t yaffs2 /dev/block/mtdblock4 /system
# exit
exit
C:\tools>adb push c:\droidroot\Superuser.apk /syste
m/app
895 KB/s (0 bytes in 196521.000s)
C:\tools>adb push c:\droidroot\su /system/bin
838 KB/s (0 bytes in 26264.000s)
C:\tools>adb push c:\droidroot\busybox /system/bin
1921 KB/s (0 bytes in 1926944.000s)
C:\tools>adb shell
# chmod 4755 /system/bin/su
chmod 4755 /system/bin/su
# chmod 4755 /system/bin/busybox
chmod 4755 /system/bin/busybox
# mv /system/recovery-from-boot.p /system/recovery-from-boot.p.disabled
mv /system/recovery-from-boot.p /system/recovery-from-boot.p.disabled
failed on '/system/recovery-from-boot.p' - No such file or directory
# mount -o ro,remount -t yaffs2 /dev/block/mtdblock4 /system
mount -o ro,remount -t yaffs2 /dev/block/mtdblock4 /system
# rm /data/local/tmp/rageagainstthecage-arm5.bin
rm /data/local/tmp/rageagainstthecage-arm5.bin
# exit
exit
C:\tools>
C:\tools>adb push c:\droidroot\rageagainstthecage-a
rm5.bin /data/local/tmp
338 KB/s (0 bytes in 5392.000s)
C:\tools>adb shell
$ cd /data/local/tmp
cd /data/local/tmp
$ chmod 0755 rageagainstthecage-arm5.bin
chmod 0755 rageagainstthecage-arm5.bin
$ ./rageagainstthecage-arm5.bin
./rageagainstthecage-arm5.bin
[*] CVE-2010-EASY Android local root exploit (C) 2010 by 743C
[*] checking NPROC limit ...
[+] RLIMIT_NPROC={1803, 1803}
[*] Searching for adb ...
[+] Found adb as PID 3942
[*] Spawning children. Dont type anything and wait for reset!
[*]
[*] If you like what we are doing you can send us PayPal money to
[*] 7-4-3-C@web.de so we can compensate time, effort and HW costs.
[*] If you are a company and feel like you profit from our work,
[*] we also accept donations > 1000 USD!
[*]
[*] adb connection will be reset. restart adb server on desktop and re-login.
$
C:\tools>adb devices
List of devices attached
0403682802008009 device
C:\tools>adb shell
# mount -o remount,rw -t yaffs2 /dev/block/mtdblock4 /system
mount -o remount,rw -t yaffs2 /dev/block/mtdblock4 /system
# exit
exit
C:\tools>adb push c:\droidroot\Superuser.apk /syste
m/app
895 KB/s (0 bytes in 196521.000s)
C:\tools>adb push c:\droidroot\su /system/bin
838 KB/s (0 bytes in 26264.000s)
C:\tools>adb push c:\droidroot\busybox /system/bin
1921 KB/s (0 bytes in 1926944.000s)
C:\tools>adb shell
# chmod 4755 /system/bin/su
chmod 4755 /system/bin/su
# chmod 4755 /system/bin/busybox
chmod 4755 /system/bin/busybox
# mv /system/recovery-from-boot.p /system/recovery-from-boot.p.disabled
mv /system/recovery-from-boot.p /system/recovery-from-boot.p.disabled
failed on '/system/recovery-from-boot.p' - No such file or directory
# mount -o ro,remount -t yaffs2 /dev/block/mtdblock4 /system
mount -o ro,remount -t yaffs2 /dev/block/mtdblock4 /system
# rm /data/local/tmp/rageagainstthecage-arm5.bin
rm /data/local/tmp/rageagainstthecage-arm5.bin
# exit
exit
C:\tools>
Upvote
0