Android applications. Samsung i9000 series (4). How superoneclick obtains root permissions

Source: Internet
Author: User

Android applications. Samsung i9000 series (4). How superoneclick obtains root permissions

 

Papaya 20110408

 

I. Preface

After self-testing and analysis, the author concludes that the root permission is the most intuitive for Android phones.
The most effective method is the superoneclick method!
It has nothing to do with what jpe, jpd, jp8, and so on of the i9000 baseband version.
It has nothing to do with i9000android 2.0, 2.1, 2.2, and so on.
It has nothing to do with specific Android phones.
Whether you are from Samsung, Moto, or HTC ......

What is it about? I understand it as the Linux kernel version! Of course, ordinary users do not have to worry about it!
In subsequent articles, we will discuss the underlying concept of cracking root, which is beyond the understanding of common users.

Here, I just want to introduce the simple principle of superoneclick getting root permissions!

Ii. Tips

For more information about how to obtain root permissions, see
Android app. Samsung i9000 series (3). You do not need to brush your machine to easily obtain root permissions.
This article: http://blog.csdn.net/liwei_cmg/category/241839.aspx

Iii. Principles

We already know the concept of ADB (Android debug Bridge), whether it's moto or Samsung.
Android phone connected to the computer via USB, installed driver, Android will be seen in the Device Manager
Such as composite ADB interface. Superoneclick is the called ADB interface.
Similarly, mobile assistant 91 also uses ADB.

For more information about how to connect Android mobile phones to a computer using USB, see:
Android Application. Samsung i9000 series (1). Version selection and USB connection


Iv. Basic Steps for superoneclick to extract root permissions

F: All files in the/own/phone/Samsung/tools/superoneclick directory

2010/10/16 577,335 adb.exe
2010/10/18 339,885 adblinux
2010/10/18 171,656 adbmac
2010/10/16 96,256 adbwinapi. dll
2010/10/16 60,928 adbwinusbapi. dll
2010/10/16 1,062,992 busybox
2010/10/16 5,392 rageagainstthecage // Step 1
2010/10/16 24,120 sqlite3
2010/10/16 26,264 su // Step 2
2010/11/04 379,392 superoneclick.exe
2010/10/16 196,521 superuser.apk // step 3


After connecting to the computer, run superoneclick.exe on the computer.
On the page, click the root button to start the automatic extraction of root permissions!

The procedure is as follows:

Step 1: store the rageagainstthecage file in the mobile phone/data/local/tmp and execute
--------------------------------------------------------------------------------

1) put the file under/data/local/tmp, and other directories cannot be executed. The command is as follows:
F:/own/phone/Samsung/tools/superoneclick> ADB push rageagainstthecage/data/local/tmp

2) use ADB shell to modify the rageagainstthecage File Permissions
F:/own/phone/Samsung/tools/superoneclick> ADB Shell
$ CD/data/local/tmp
CD/data/local/tmp
$ Chmod 777 rageagainstthecage

3) Run rageagainstthecage using the ADB shell.
$./Rageagainstthecage

[*] CVE-2010-EASY Android Local Root Exploit (c) 2010 by 743c

[*] Checking nproc limit...
[+] Rlimit_nproc ={ 2410,241 0}
[*] Searching for ADB...
[+] Found ADB as PID 19374
[*] Spawning children. Dont type anything and wait for reset!
[*]
[*] If you like what we are doing you can send us PayPal money
7-4-3-C@web.de so we can compensate time, effort and HW costs.
[*] If you are a company and feel like you profit from our work,
[*] We also accept donations> 1000 USD!
[*]
[*] ADB connection will be reset. Restart ADB server on desktop and re-login.
$

Exit shell and use ADB shell again. The prompt is #, which is already in the computer shell.
The root permission is obtained. If it is not #, repeat (./rageagainstthecage ),
Until prompt #.

F:/own/phone/Samsung/tools/superoneclick> ADB Shell
#

Step 2: Change/system to read/write, and copy Su to/system/bin/
--------------------------------------------------------------------------------

1) If Step 1 appears successfully at the # prompt, modify/System
# Mount-O remount RW/System
#

2) open a command line window and copy Su to/system/bin.
F:/own/phone/Samsung/tools/superoneclick> ADB push SU/system/bin

The su file function is to implement the permission switching between normal users and root Super Users!


Step 3: copy the authorized Android software package (superuser.apk) to your mobile phone and install
--------------------------------------------------------------------------------

This process is very simple. I will not go into details, that is, ADB push and ADB install. Authorization management
Is to manage which programs can use Su. This means to manage the use of super user permissions.


Step 4: restart your mobile phone
--------------------------------------------------------------------------------

In fact, it is just a restart test.

 

V. Summary

In the process of extracting root permissions, there are only two important files:

Rageagainstthecage
Su

Rageagainstthecage is responsible for directly cracking and obtaining root permissions before you can modify/system /.
If Su is only placed in the/data/local/tmp directory, it does not have the permission to run it.

$ LS-l Su
Ls-l Su
-Rwxrwxrwx shell 26264 Su
$./Su
./Su
Permission denied
$

Therefore, put Su in the/system/bin directory. For future mobile apps!
The running principle of rageagainstthecage and Su is not a problem discussed in this article.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.