Short statement on the Ovarit situation
This commit is contained in:
parent
2639aba46c
commit
7728287dcd
24 changed files with 529 additions and 69 deletions
33
garden/android_root/hltevzw.gmi
Executable file
33
garden/android_root/hltevzw.gmi
Executable file
|
@ -0,0 +1,33 @@
|
|||
# Rooting the Samsung Galaxy Note 3 (Verizon) and installing LineageOS
|
||||
|
||||
## Stuff you need
|
||||
|
||||
=> https://download.lineageos.org/hltetmo The latest LineageOS recovery file
|
||||
=> https://download.lineageos.org/hltetmo The latest LineageOS ROM file
|
||||
=> https://androidfilehost.com/?fid=4349826312261712202 This very specific version of the Odin image flashing tool
|
||||
=> https://developer.samsung.com/android-usb-driver Samsung Android USB Driver
|
||||
=> https://ipfs.letsdecentralize.org/ipfs/QmNhEPB2oCAmkwM7rD6bN2EhmXxVTRZKxLckRh7DHAZnNf ArabicToolApp.exe (ignore virus warnings. Of course an Android exploit is going to be classified as "malware")
|
||||
=> https://web.archive.org/web/20221010233203/https://forum.xda-developers.com/t/official-note-3-verizon-bootloader-unlock.3359370/ Note 3 Verizon Bootloader Unlock
|
||||
|
||||
### If some of the links are broken, try these mirrors
|
||||
=> ../../dl/hltevzw/Odin_3.13.1.zip Odin image flashing tool
|
||||
=> ipfs://QmaBWnbqJsWMFXS8aDspWsga7s3MtH7Gt3xF5sfKL6qGxr Odin image flashing tool (IPFS)
|
||||
=> ipfs://QmaRn2E65XPT1YHFXL5qkMeWdgd7MwnNCtWzmQQtgWguNR Note 3 Verizon Bootloader Unlock script (IPFS)
|
||||
=> ipfs://QmNhEPB2oCAmkwM7rD6bN2EhmXxVTRZKxLckRh7DHAZnNf ArabicToolApp.exe (IPFS)
|
||||
|
||||
### Also:
|
||||
|
||||
* a machine running Windows 10 (a VM will likely not work)
|
||||
* the Note 3 has to be running build version "OB6" (not "SEPL")
|
||||
* a blank microSD card (the bootloader unlock script will say how big it has to be)
|
||||
|
||||
## Instructions
|
||||
|
||||
1. Wipe the phone
|
||||
2. Downgrade the software to OB6 using Odin (you don't need to do anything fancy to downgrade; just flash the image)
|
||||
3. Enable ADB in developer settings
|
||||
4. Get root using ArabicToolApp.exe
|
||||
5. Follow the instructions on the bootloader unlock page to push the "unlock_n3" binary to the device and run it
|
||||
6. Follow these instructions (it says "hltetmo", but it counts for "hltevzw" too):
|
||||
|
||||
=> https://wiki.lineageos.org/devices/hltetmo/install Install LineageOS on hltetmo
|
69
garden/android_root/nook1.gmi
Executable file
69
garden/android_root/nook1.gmi
Executable file
|
@ -0,0 +1,69 @@
|
|||
# Rooting the Barnes & Noble Nook 1st Generation
|
||||
|
||||
## Stuff you need
|
||||
|
||||
=> ../../dl/nook/ Individual files
|
||||
=> https://upload.letsdecentralize.org/misc/nook.7z All the files in one .7z pack
|
||||
=> ipfs://QmPV9YTCNV3StpfbbXGpcJQWDbxstrato1keqprvBG7Gw9 All the files in one .7z pack (IPFS)
|
||||
|
||||
## Instructions
|
||||
|
||||
1. Get a server running on port 80 on a machine on the same Wi-Fi network as the Nook.
|
||||
|
||||
All the server needs to host is "exploit.html" from the pack linked above. For best results, rename the HTML file to "index.html".
|
||||
|
||||
2. Crash your Nook's browser to enable ADB.
|
||||
|
||||
Using the Nook's browser, navigate to the web server via its local IPv4 address. The browser should refresh a few times and then crash to the home menu.
|
||||
|
||||
3. Connect to the Nook over ADB.
|
||||
|
||||
```
|
||||
adb connect YOUR_NOOKS_LOCAL_IP_HERE
|
||||
```
|
||||
|
||||
If ADB refuses to connect, run step 2 repeatedly until ADB manages to connect. It could take between one and one hundred tries.
|
||||
|
||||
4. Get and edit "/init.rc".
|
||||
|
||||
```
|
||||
adb pull /init.rc
|
||||
```
|
||||
|
||||
Open "init.rc" in your favorite text editor on your local machine. Find the line that says:
|
||||
|
||||
```
|
||||
service adbd /sbin/adbd
|
||||
```
|
||||
|
||||
Below that should say "disabled". Change that to "enabled".
|
||||
|
||||
5. Get root access.
|
||||
|
||||
While still connected to the Nook over ADB, run:
|
||||
|
||||
```
|
||||
adb push ratc.bin /sqlite_stmt_journals
|
||||
adb shell
|
||||
cd /sqlite_stmt_journals
|
||||
/system/bin/chmod 777 ./ratc.bin
|
||||
./ratc.bin
|
||||
```
|
||||
|
||||
Several lines of output will appear. Do not press anything. A few seconds later, adb will disconnect you.
|
||||
|
||||
```
|
||||
adb kill-server
|
||||
```
|
||||
|
||||
6. Push the patched "init.rc" to the Nook.
|
||||
|
||||
Repeat step 3 to reconnect to the Nook over ADB. Then run:
|
||||
|
||||
```
|
||||
adb push init.rc /
|
||||
```
|
||||
|
||||
After a reboot, your Nook should now be rooted.
|
||||
|
||||
The default launcher will not show third-party apps. "ru.mynook.launcher.apk" included in the pack is an alternative launcher that will show all apps installed, including third-party ones.
|
Loading…
Add table
Add a link
Reference in a new issue