6月
22
2011

Xperia Arcのroot取得済み「GingerBreak APK」(FW:3.0.A.2.181 HK)Xperia Arc之root機「GingerBreak APK」(FW:3.0.A.2.181 HK)

Xperia Arcのroot取得済み「GingerBreak APK」(FW:3.0.A.2.181 HK)Arcの入手してまだ1週間もたってなく、すでにroot化しました。別に、自分がすごくてすぐにroot化できたわけでもなく、ArcをもってAPP2SD/テザリングはroot化せずにも使えるから、もうちょっと長くrootなしで使おうと思ったら、いろいろ弄れば弄るほどやっぱりroot化のことに追い込まれ、つい、root化やっちゃいました。うちのArcのファームウェアはAndroid2.3.2でビルド3.0.A.2.181 HKなのだ。

 

 

 

Xperiaのroot化、最初はやっぱりフラッシュモードに入らなければならない「つまりROM焼き」かと僕が思ったが、z4rootより新しいGingerBreakというAPKがあって、APKの実行だけroot化できるなんてほんま楽だな。「まぁ、ファームウェアアップなら、やっぱりROM焼きの必要だけどね。」

 

 

 

 

今の持ってるファームウェアは最新のではないので、近いうちにかならず最新のアップしてroot化もするね。そのあとまたroot化とROM焼きの報告を書きます。

 

 

 

[26.04.2011][v1.2] GingerBreak APK (root for GingerBread) – xda-developers

NOTICE: Gingerbreak is an exploit that has been fixed in many of the latest Android versions and releases. If it does not work, it does not work. I can’t “fix” the exploit, you will have to wait for a new exploit to come out, or root a different way!

About
The GingerBreak APK is a wrapper around the newly released GingerBreak exploit (credits to The Android Exploid Crew), which is meant to attain root access on GingerBread. This specific exploitmay work on various Froyo and Honeycomb versions as well.

What the APK and exploit do is as follows:
– The APK puts the right files in the right place to run the exploit
– The APK runs the exploit
– The exploit attempts to attain root access
– If it succeeds, the exploit remounts /system as read-write and runs the installer script
– The installer script attempts to install the su binary and superuser APK, and reboots

Some important things to know:
– You must have USB debugging enabled on your device
– You need to have an SD card (formatted and) inserted – if it doesn’t work, try formatting the SD card in your computer, or switching it with a different (or old, etc) SD card
– The APK must be installed to device, NOT SD card
– The exploit may take a while to run, but not more than 10 minutes, if it does, get me a logcat, and reboot the device. In rare occasions, even if the device does not reboot, you may still have root. So check that out after you manually pull battery after 15 minutes or so of being stuck.
– Always reboot between root attempts!
– While (temporary?) root access may be attained, due to locked bootloaders, efuses, S-ON, and whatnot this may still not work on your device. For temproot purposes, use the raw binary exploit (linked below), not this APK.
– The GingerBreak exploit should not be used to attain temproot and continue using the device. It fscks vold, you do not want to be running like that. You want to reboot! So if the root doesn’t stick, you (still) have a problem.

Installation
– Optional: Press the Thanks button below this post 
– Make sure USB debugging is enabled
– Make sure you have an SD card (formatted and) inserted
– Get the APK on the phone somehow, and install it
– Open the APK, press the root button
– Wait a few minutes. If there are no problems, the device will reboot (note that the reboot itself can take like 10 minutes due to cache wipe)
– Make sure the Superuser app is install and working
– Optional: Install BusyBox from Market (I personally prefer the stericsson installer)
– Optional: Uninstall GingerBreak, you don’t need it on your phone anymore
– Optional: Make a donation 

WARNING: Apparently on some devices the root exploit causes the SD card (internal or external) to be formatted. Also, if it gets stuck but you do see the card mounting/unmounting, try formatting your SD card yourself and try again (or use a different SD card) – often this works(a fix for both issues is being looked at)

NO IT DOES NOT WORK ON THE GALAXY ACE (yet ?)

WORKS ON A RARE SGS2, BUT NOT ON MOST (seems to be only pre-release devices that are rootable this way)

ACER A500 / ICONIA Look here (click). Will eventually be integrated, I guess 

Donate
Donate to Chainfire by PayPal: click this link
Donate to The Android Exploid Crew by PayPal: 7-4-3-C@web.de

Report!
Please report back if it does or doesn’t work on specific devices. If it doesn’t, don’t forget to post your logcat as attachment, and mention your device details and GingerBreak version.

Credits
– I made the APK and did some slight modding to the exploit code to install from an APK
– The exploit (“GingerBreak”) itself is made by The Android Exploid Crew. Original code can be found here: http://c-skills.blogspot.com/2011/04…ngerbreak.html

Manual rooting
From v1.1 it is no longer possible to manually root the device over an ADB connection using the files from this APK. Please use the original binaries from the c-skills website to do this. There are several guides posted here on XDA about how to do this manually, some are mentioned/linked-to in the first few pages of this thread.

Note
GingerBreak is not specific to any device, but there is code in there that may not work on device X or Y. The exploit is generic, but that does not mean one size fits all, nor does it mean that there will be no firmwares out there that fix this exploit. A special version may need to be compiled for your device, ask your favorite hacker from your specific device’s forum. This APK is meant to make the process easier, but also adds dependancies so that it may not work on your device.

AGAIN, THIS DOES NOT WORK ON S-ON DEVICES !

Changelog

26.04.2011: v1.2
– Removed some code that may break operation while the code itself isn’t needed
– Added UnRoot option
– The APK now logs exploit output semi-live

22.04.2011: v1.1
– Modded exploit code to not need /data/local/tmp – this should fix the problem extracting assets as well as be more compatible with various devices (in theory). In case the APK notices that this cannot work, it will warn you about this.
– Added some warnings and errors to the APK

21.04.2011: v1.0
– First release of APK
– Slight mods to the exploit source to have it work better from APK


Attached Files
File Type: apk GingerBreak-v1.00.apk (294.0 KB, 17445 views)
File Type: apk GingerBreak-v1.10.apk (294.6 KB, 27920 views)
File Type: apk GingerBreak-v1.20.apk (295.2 KB, 142310 views)

 

 

Xperia Arc之root機「GingerBreak APK」(FW:3.0.A.2.181 HK)入手咗Arc唔夠1星期,就已經root咗機了.並唔係要誇耀自己咁快就root到之犀利,諗住用Arc唔洗root機都已經可以 APP2SD/Tethering,應可唔root機都可以長用到一段日子的,不過越弄就越被逼到要要root機了,所以終要root咗囉.我部Arc係的Firmware係Android2.3.2,Build 3.0.A.2.181 HK的.

 

 

 

Xperia的root機,我起初以為又係非進入Flash mode「即係刷機」不可的,不過原來已有一個比起z4root還要新的名叫GingerBreak的APK了,只係執行APK就root倒機真係好方便.「不過,要升Firmware,始終都係要刷機的既」

 

 

 

 

我現用緊的Firmware非最新的,所以遲啲一定會升到最新的及root埋佢添.到時再讓我寫吓有關root機同埋刷機啲報告吧.

 

 

 

[26.04.2011][v1.2] GingerBreak APK (root for GingerBread) – xda-developers

NOTICE: Gingerbreak is an exploit that has been fixed in many of the latest Android versions and releases. If it does not work, it does not work. I can’t “fix” the exploit, you will have to wait for a new exploit to come out, or root a different way!

About
The GingerBreak APK is a wrapper around the newly released GingerBreak exploit (credits to The Android Exploid Crew), which is meant to attain root access on GingerBread. This specific exploitmay work on various Froyo and Honeycomb versions as well.

What the APK and exploit do is as follows:
– The APK puts the right files in the right place to run the exploit
– The APK runs the exploit
– The exploit attempts to attain root access
– If it succeeds, the exploit remounts /system as read-write and runs the installer script
– The installer script attempts to install the su binary and superuser APK, and reboots

Some important things to know:
– You must have USB debugging enabled on your device
– You need to have an SD card (formatted and) inserted – if it doesn’t work, try formatting the SD card in your computer, or switching it with a different (or old, etc) SD card
– The APK must be installed to device, NOT SD card
– The exploit may take a while to run, but not more than 10 minutes, if it does, get me a logcat, and reboot the device. In rare occasions, even if the device does not reboot, you may still have root. So check that out after you manually pull battery after 15 minutes or so of being stuck.
– Always reboot between root attempts!
– While (temporary?) root access may be attained, due to locked bootloaders, efuses, S-ON, and whatnot this may still not work on your device. For temproot purposes, use the raw binary exploit (linked below), not this APK.
– The GingerBreak exploit should not be used to attain temproot and continue using the device. It fscks vold, you do not want to be running like that. You want to reboot! So if the root doesn’t stick, you (still) have a problem.

Installation
– Optional: Press the Thanks button below this post 
– Make sure USB debugging is enabled
– Make sure you have an SD card (formatted and) inserted
– Get the APK on the phone somehow, and install it
– Open the APK, press the root button
– Wait a few minutes. If there are no problems, the device will reboot (note that the reboot itself can take like 10 minutes due to cache wipe)
– Make sure the Superuser app is install and working
– Optional: Install BusyBox from Market (I personally prefer the stericsson installer)
– Optional: Uninstall GingerBreak, you don’t need it on your phone anymore
– Optional: Make a donation 

WARNING: Apparently on some devices the root exploit causes the SD card (internal or external) to be formatted. Also, if it gets stuck but you do see the card mounting/unmounting, try formatting your SD card yourself and try again (or use a different SD card) – often this works(a fix for both issues is being looked at)

NO IT DOES NOT WORK ON THE GALAXY ACE (yet ?)

WORKS ON A RARE SGS2, BUT NOT ON MOST (seems to be only pre-release devices that are rootable this way)

ACER A500 / ICONIA Look here (click). Will eventually be integrated, I guess 

Donate
Donate to Chainfire by PayPal: click this link
Donate to The Android Exploid Crew by PayPal: 7-4-3-C@web.de

Report!
Please report back if it does or doesn’t work on specific devices. If it doesn’t, don’t forget to post your logcat as attachment, and mention your device details and GingerBreak version.

Credits
– I made the APK and did some slight modding to the exploit code to install from an APK
– The exploit (“GingerBreak”) itself is made by The Android Exploid Crew. Original code can be found here: http://c-skills.blogspot.com/2011/04…ngerbreak.html

Manual rooting
From v1.1 it is no longer possible to manually root the device over an ADB connection using the files from this APK. Please use the original binaries from the c-skills website to do this. There are several guides posted here on XDA about how to do this manually, some are mentioned/linked-to in the first few pages of this thread.

Note
GingerBreak is not specific to any device, but there is code in there that may not work on device X or Y. The exploit is generic, but that does not mean one size fits all, nor does it mean that there will be no firmwares out there that fix this exploit. A special version may need to be compiled for your device, ask your favorite hacker from your specific device’s forum. This APK is meant to make the process easier, but also adds dependancies so that it may not work on your device.

AGAIN, THIS DOES NOT WORK ON S-ON DEVICES !

Changelog

26.04.2011: v1.2
– Removed some code that may break operation while the code itself isn’t needed
– Added UnRoot option
– The APK now logs exploit output semi-live

22.04.2011: v1.1
– Modded exploit code to not need /data/local/tmp – this should fix the problem extracting assets as well as be more compatible with various devices (in theory). In case the APK notices that this cannot work, it will warn you about this.
– Added some warnings and errors to the APK

21.04.2011: v1.0
– First release of APK
– Slight mods to the exploit source to have it work better from APK


Attached Files
File Type: apk GingerBreak-v1.00.apk (294.0 KB, 17445 views)
File Type: apk GingerBreak-v1.10.apk (294.6 KB, 27920 views)
File Type: apk GingerBreak-v1.20.apk (295.2 KB, 142310 views)

 

 

Share and Enjoy:
  • Print
  • Digg
  • StumbleUpon
  • del.icio.us
  • Facebook
  • Yahoo! Buzz
  • Twitter
  • Google Bookmarks
  • Add to favorites
  • Google Buzz
  • Live
  • MSN Reporter
  • MySpace
  • RSS
  • email

コメントはまだありません »

RSS feed for comments on this post. TrackBack URL

Leave a comment

*