Rooting DroidX with Android 2.3.3 (Verizon)
But there wasn’t any method that easily could root your phone, even using the well known GingerBreak.
Today a new method to gain root access to the Motorola devices has been released. Although the exploit claim to be for the Droid 3, in the same post we can also read: I identified a vulnerability specific to Motorola devices… Cool! My DroidX is a Motorola device as well, so let’s give it a try.
Before starting with the rooting process, I will say the same thing you have already read if you ever try to root a device or try to hack anything: This is for educational purposes blah blah blah… In other words if you brick or mess up your device is your problem.
The first thing you need to do is connect to your device (if you don’t know how to do that, please refer to the documentation):
Now from the prompt (you should see a dollar sign there):
Now we have to reboot the phone. Turn it off and the on. After you have done that, we connect again to the device again and run the following commands:
Reboot your device one more time and connect again.
Now your prompt should be # instead of $. At this point if you type id you should see something like:
You are root right now, but we want to be able to run certain applications with root permission.
You are going to need 3 files: su, busybox and Superuser.apk. I had these files already in my system from my previous adventures :p, I downloaded them from here, but you may want to find newer versions. Once you get and extract them, you need to copy them over your phone.
Now we connect back to the phone and copy these files in the system:
If you completed all the steps successfully, now you should have your phone rooted.
All the credits here are for Dan Rosenberg, since he found the way to gain root access in our system. The rest of the process is just copy few files into the system.
Keep in mind I did achieved this on a Motorola Droid X from Verizon with last OTA update, but it should work on any Motorola device.
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec
- asn-search, herramienta de reconocimiento
- El país de la [des]conexión. Parte de lo que no se vio
- Escribiendo plugins para kubectl
- Herramienta para entender cómo corren las aplicaciones en Kubernetes
- Cómo kubectl usa la API de Kubernetes