Short statement on the Ovarit situation
This commit is contained in:
		
							parent
							
								
									2639aba46c
								
							
						
					
					
						commit
						7728287dcd
					
				
					 24 changed files with 529 additions and 69 deletions
				
			
		
							
								
								
									
										33
									
								
								garden/android_root/hltevzw.gmi
									
										
									
									
									
										Executable file
									
								
							
							
						
						
									
										33
									
								
								garden/android_root/hltevzw.gmi
									
										
									
									
									
										Executable file
									
								
							|  | @ -0,0 +1,33 @@ | |||
| # Rooting the Samsung Galaxy Note 3 (Verizon) and installing LineageOS | ||||
| 
 | ||||
| ## Stuff you need | ||||
| 
 | ||||
| => https://download.lineageos.org/hltetmo	The latest LineageOS recovery file | ||||
| => https://download.lineageos.org/hltetmo	The latest LineageOS ROM file | ||||
| => https://androidfilehost.com/?fid=4349826312261712202	This very specific version of the Odin image flashing tool | ||||
| => https://developer.samsung.com/android-usb-driver	Samsung Android USB Driver | ||||
| => https://ipfs.letsdecentralize.org/ipfs/QmNhEPB2oCAmkwM7rD6bN2EhmXxVTRZKxLckRh7DHAZnNf	ArabicToolApp.exe (ignore virus warnings. Of course an Android exploit is going to be classified as "malware") | ||||
| => https://web.archive.org/web/20221010233203/https://forum.xda-developers.com/t/official-note-3-verizon-bootloader-unlock.3359370/	Note 3 Verizon Bootloader Unlock | ||||
| 
 | ||||
| ### If some of the links are broken, try these mirrors | ||||
| => ../../dl/hltevzw/Odin_3.13.1.zip	Odin image flashing tool | ||||
| => ipfs://QmaBWnbqJsWMFXS8aDspWsga7s3MtH7Gt3xF5sfKL6qGxr	Odin image flashing tool (IPFS) | ||||
| => ipfs://QmaRn2E65XPT1YHFXL5qkMeWdgd7MwnNCtWzmQQtgWguNR	Note 3 Verizon Bootloader Unlock script (IPFS) | ||||
| => ipfs://QmNhEPB2oCAmkwM7rD6bN2EhmXxVTRZKxLckRh7DHAZnNf	ArabicToolApp.exe (IPFS) | ||||
| 
 | ||||
| ### Also: | ||||
| 
 | ||||
| * a machine running Windows 10 (a VM will likely not work) | ||||
| * the Note 3 has to be running build version "OB6" (not "SEPL") | ||||
| * a blank microSD card (the bootloader unlock script will say how big it has to be) | ||||
| 
 | ||||
| ## Instructions | ||||
| 
 | ||||
| 1. Wipe the phone | ||||
| 2. Downgrade the software to OB6 using Odin (you don't need to do anything fancy to downgrade; just flash the image) | ||||
| 3. Enable ADB in developer settings | ||||
| 4. Get root using ArabicToolApp.exe | ||||
| 5. Follow the instructions on the bootloader unlock page to push the "unlock_n3" binary to the device and run it | ||||
| 6. Follow these instructions (it says "hltetmo", but it counts for "hltevzw" too): | ||||
| 
 | ||||
| => https://wiki.lineageos.org/devices/hltetmo/install	Install LineageOS on hltetmo | ||||
							
								
								
									
										69
									
								
								garden/android_root/nook1.gmi
									
										
									
									
									
										Executable file
									
								
							
							
						
						
									
										69
									
								
								garden/android_root/nook1.gmi
									
										
									
									
									
										Executable file
									
								
							|  | @ -0,0 +1,69 @@ | |||
| # Rooting the Barnes & Noble Nook 1st Generation | ||||
| 
 | ||||
| ## Stuff you need | ||||
| 
 | ||||
| => ../../dl/nook/	Individual files | ||||
| => https://upload.letsdecentralize.org/misc/nook.7z	All the files in one .7z pack | ||||
| => ipfs://QmPV9YTCNV3StpfbbXGpcJQWDbxstrato1keqprvBG7Gw9	All the files in one .7z pack (IPFS) | ||||
| 
 | ||||
| ## Instructions | ||||
| 
 | ||||
| 1. Get a server running on port 80 on a machine on the same Wi-Fi network as the Nook. | ||||
| 
 | ||||
| All the server needs to host is "exploit.html" from the pack linked above. For best results, rename the HTML file to "index.html". | ||||
| 
 | ||||
| 2. Crash your Nook's browser to enable ADB. | ||||
| 
 | ||||
| Using the Nook's browser, navigate to the web server via its local IPv4 address. The browser should refresh a few times and then crash to the home menu. | ||||
| 
 | ||||
| 3. Connect to the Nook over ADB. | ||||
| 
 | ||||
| ``` | ||||
| adb connect YOUR_NOOKS_LOCAL_IP_HERE | ||||
| ``` | ||||
| 
 | ||||
| If ADB refuses to connect, run step 2 repeatedly until ADB manages to connect. It could take between one and one hundred tries. | ||||
| 
 | ||||
| 4. Get and edit "/init.rc". | ||||
| 
 | ||||
| ``` | ||||
| adb pull /init.rc | ||||
| ``` | ||||
| 
 | ||||
| Open "init.rc" in your favorite text editor on your local machine. Find the line that says: | ||||
| 
 | ||||
| ``` | ||||
| service adbd /sbin/adbd | ||||
| ``` | ||||
| 
 | ||||
| Below that should say "disabled". Change that to "enabled". | ||||
| 
 | ||||
| 5. Get root access. | ||||
| 
 | ||||
| While still connected to the Nook over ADB, run: | ||||
| 
 | ||||
| ``` | ||||
| adb push ratc.bin /sqlite_stmt_journals | ||||
| adb shell | ||||
| cd /sqlite_stmt_journals | ||||
| /system/bin/chmod 777 ./ratc.bin | ||||
| ./ratc.bin | ||||
| ``` | ||||
| 
 | ||||
| Several lines of output will appear. Do not press anything. A few seconds later, adb will disconnect you. | ||||
| 
 | ||||
| ``` | ||||
| adb kill-server | ||||
| ``` | ||||
| 
 | ||||
| 6. Push the patched "init.rc" to the Nook. | ||||
| 
 | ||||
| Repeat step 3 to reconnect to the Nook over ADB. Then run: | ||||
| 
 | ||||
| ``` | ||||
| adb push init.rc / | ||||
| ``` | ||||
| 
 | ||||
| After a reboot, your Nook should now be rooted. | ||||
| 
 | ||||
| The default launcher will not show third-party apps. "ru.mynook.launcher.apk" included in the pack is an alternative launcher that will show all apps installed, including third-party ones. | ||||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue