
Aaskereija
Inventar
- 5.601
Folge dem Video um zu sehen, wie unsere Website als Web-App auf dem Startbildschirm installiert werden kann.
Anmerkung: Diese Funktion erfordert derzeit den Zugriff auf die Seite über den integrierten Safari-Browser.
Microsoft Windows [Version 6.1.7601]
Copyright (c) 2009 Microsoft Corporation. Alle Rechte vorbehalten.
C:\Windows\system32>cd..
C:\Windows>cd.
C:\Windows>
C:\Windows>cd..
C:\>cd root
C:\root>runme_win
---------------------------------------------------------------
Easy Rooting toolkit (v19.0-a)
created by DooMLoRD
"pref_event exploit"
Credits go to all those involved in making this possible!
---------------------------------------------------------------
Special thanks to: the_laser, Bin4ry, fi01, hiikezoe, [NUT]
and to all those who are contributing to our git tree!
Sources: https://github.com/android-rooting-tools
---------------------------------------------------------------
[*] This script will:
(1) root ur device using the pref_event exploit
(2) install Busybox
(3) install SU files
[*] Before u begin:
(1) make sure u have installed adb drivers for ur device
(2) enable "USB DEBUGGING"
from (Menu\Settings\Developer Options)
(3) enable "UNKNOWN SOURCES"
from (Menu\Settings\Security)
(4) connect USB cable to PHONE and then connect to PC
(5) skip "PC Companion Software" prompt on device
---------------------------------------------------------------
CONFIRM ALL THE ABOVE THEN
Drücken Sie eine beliebige Taste . . .
--- STARTING ----
--- WAITING FOR DEVICE
* daemon not running. starting it now *
* daemon started successfully *
--- creating temporary directory
mkdir failed for tmp, File exists
--- cleaning
rm failed for *, No such file or directory
--- pushing files
63 KB/s (326 bytes in 0.005s)
770 KB/s (1578 bytes in 0.002s)
3971 KB/s (89472 bytes in 0.022s)
4430 KB/s (853044 bytes in 0.188s)
4056 KB/s (112164 bytes in 0.027s)
3916 KB/s (1953159 bytes in 0.487s)
--- DooMing device!
--- Correcting permissions
--- Running exploit
run_root_shell v9.0 (20130911)
Based on pref_event exploit
Modified for auto-rooting by DooMLoRD
Part of Easy Rooting Toolkit
Devices Supported:
Xperia Z (C6602/3) - 10.3.A.0.423
Xperia Z (C6606) - 10.1.1.B.0.166
Xperia Z (C6616) - 10.1.1.A.1.319
Xperia Z (C6602/3) - 10.1.1.A.1.253/307
Xperia ZL (C6502/3/6) - 10.3.A.0.423
Tablet Z (SGP321) - 10.1.1.A.1.307
Tablet Z (SGP311/2) - 10.1.C.0.370
Xperia ZR (C5502/3/M36h) - 10.1.1.A.1.310
Xperia SP (C5302/3/6) - 12.0.A.1.211/257/284
Xperia L (C2104/5) - 15.0.A.1.31/36
Xperia T (LT30p) - 9.1.A.1.141/142/145
Xperia TX (LT29i) - 9.1.B.1.67
Xperia V (LT25i) - 9.1.A.1.140/142/145
Xperia S (LT26i) - 6.2.B.0.200/211
Xperia SL (LT26ii) - 6.2.B.0.211
Xperia Acro S (LT26w) - 6.2.B.0.200/211
Xperia Ion (LT28h/i) - 6.2.B.0.211
Xperia P (LT22i) - 6.2.A.1.100
Xperia Go (ST27i/a) - 6.2.A.1.100
Xperia J (ST26i/a) - 11.2.A.0.21/31
Xperia AX (SO-01E) - 10.1.D.0.343
Tablet Z (SO-03E) - 10.1.E.0.265/269
Xperia GX (SO-04D) - 7.0.D.1.137
Xperia A (SO-04E) - 10.1.1.D.0.179
Xperia A (SO-04E) - 10.1.1.D.2.26
Xperia SX (SO-05D) - 7.0.D.1.137
Xperia SX (SO-05D) - 9.1.C.0.475
Xperia VL (SOL21) - 9.0.F.0.226
Xperia VL (SOL21) - 9.1.D.0.395/401
Xperia UL (SOL22) - 10.2.F.3.43
Changelog is posted here: http://bit.ly/ert_log
Device detected: SGP312 (10.3.1.C.0.136)
Try to find address in memory...
Detected kernel physical address at 0x80208000 form iomem
Attempt fb_mem exploit...
Failed to open /dev/graphics/fb0 due to Permission denied
You need to manage to get remap_pfn_range addresses.
Failed to get prepare_kernel_cred addresses.
Failed to get commit_creds addresses.
Failed to get ptmx_fops addresses.
SGP312 (10.3.1.C.0.136) is not supported.
Failed to setup variables.
--- cleaning
--- Please wait device is now rebooting
ALL DONE!!!
Drücken Sie eine beliebige Taste . . .
Aaskereija schrieb:wo steht das?
---------------------------------------------------------------
Easy Rooting toolkit (v18.0)
created by DooMLoRD
"pref_event exploit"
Credits go to all those involved in making this possible!
---------------------------------------------------------------
Special thanks to: the_laser, Bin4ry, fi01, hiikezoe, [NUT]
and to all those who are contributing to our git tree!
Sources: https://github.com/android-rooting-tools
---------------------------------------------------------------
[*] This script will:
(1) root ur device using the pref_event exploit
(2) install Busybox
(3) install SU files
[*] Before u begin:
(1) make sure u have installed adb drivers for ur device
(2) enable "USB DEBUGGING"
from (Menu\Settings\Developer Options)
(3) enable "UNKNOWN SOURCES"
from (Menu\Settings\Security)
(4) connect USB cable to PHONE and then connect to PC
(5) skip "PC Companion Software" prompt on device
---------------------------------------------------------------
CONFIRM ALL THE ABOVE THEN
Drücken Sie eine beliebige Taste . . .
--- STARTING ----
--- WAITING FOR DEVICE
* daemon not running. starting it now *
* daemon started successfully *
--- creating temporary directory
mkdir failed for tmp, File exists
--- cleaning
rm failed for *, No such file or directory
--- pushing files
0 KB/s (326 bytes in 1.000s)
98 KB/s (1578 bytes in 0.015s)
328 KB/s (26268 bytes in 0.078s)
3141 KB/s (853044 bytes in 0.265s)
1170 KB/s (112164 bytes in 0.093s)
2306 KB/s (1953159 bytes in 0.826s)
--- DooMing device!
--- Correcting permissions
--- Running exploit
run_root_shell v7.0 (20130731)
Based on pref_event exploit
Modified for auto-rooting by DooMLoRD
Part of Easy Rooting Toolkit
Devices Supported:
Xperia Z (C6602/3) - 10.3.A.0.423
Xperia Z (C6606) - 10.1.1.B.0.166
Xperia Z (C6602/3) - 10.1.1.A.1.253/307
Xperia ZL (C6502/3/6) - 10.3.A.0.423
Tablet Z (SGP321) - 10.1.1.A.1.307
Tablet Z (SGP311/2) - 10.1.C.0.370
Xperia ZR (C5502/3/M36h) - 10.1.1.A.1.310
Xperia SP (C5302/3/6) - 12.0.A.1.211/257/284
Xperia L (C2104/5) - 15.0.A.1.31/36
Xperia T (LT30p) - 9.1.A.1.141/142/145
Xperia TX (LT29i) - 9.1.B.1.67
Xperia V (LT25i) - 9.1.A.1.140/142/145
Xperia S (LT26i) - 6.2.B.0.200/211
Xperia SL (LT26ii) - 6.2.B.0.211
Xperia Acro S (LT26w) - 6.2.B.0.200/211
Xperia Ion (LT28h/i) - 6.2.B.0.211
Xperia P (LT22i) - 6.2.A.1.100
Xperia Go (ST27i/a) - 6.2.A.1.100
Xperia J (ST26i/a) - 11.2.A.0.21/31
Xperia AX (SO-01E) - 10.1.D.0.343
Tablet Z (SO-03E) - 10.1.E.0.265/269
Xperia GX (SO-04D) - 7.0.D.1.137
Xperia A (SO-04E) - 10.1.1.D.0.179
Xperia A (SO-04E) - 10.1.1.D.2.26
Xperia SX (SO-05D) - 7.0.D.1.137
Xperia SX (SO-05D) - 9.1.C.0.475
Xperia VL (SOL21) - 9.0.F.0.226
Xperia VL (SOL21) - 9.1.D.0.395/401
Xperia UL (SOL22) - 10.2.F.3.43
Changelog is posted here: http://bit.ly/ert_log
Device detected: SGP312 (10.1.C.0.370)
Attempt perf_swevent exploit...
writing address is 8e49
--- cleaning
error: closed
--- Please wait device is now rebooting
ALL DONE!!!
Drücken Sie eine beliebige Taste . . .