QUOTE(kldoc @ Dec 2 2011, 08:56 PM)
C:\android>runme.bat
---------------------------------------------------------------
Easy rooting toolkit (v3.0)
created by DooMLoRD
using exploit zergRush (Revolutionary Team)
Credits go to all those involved in making this possible!
---------------------------------------------------------------
[*] This script will:
(1) root ur device using latest zergRush exploit (16 Nov)
(2) install Busybox (1.18.4)
(3) install SU files (binary: 3.0.3 and apk: 3.0.6)
[*] Before u begin:
(1) make sure u have installed adb drivers for ur device
(2) enable "USB DEBUGGING"
from (Menu\Settings\Applications\Development)
(3) enable "UNKNOWN SOURCES"
from (Menu\Settings\Applications)
(4) [OPTIONAL] increase screen timeout to 10 minutes
(5) connect USB cable to PHONE and then connect to PC
(6) skip "PC Companion Software" prompt on device
---------------------------------------------------------------
CONFIRM ALL THE ABOVE THEN
Appuyez sur une touche pour continuer...
--- STARTING ----
--- WAITING FOR DEVICE
* daemon not running. starting it now *
* daemon started successfully *
--- cleaning
--- pushing zergRush"
2814 KB/s (23056 bytes in 0.008s)
--- correcting permissions
--- executing zergRush
[**] Zerg rush - Android 2.2/2.3 local root
[**] © 2011 Revolutionary. All rights reserved.
[**] Parts of code from Gingerbreak, © 2010-2011 The Android Exploid Crew.
[+] Found a GingerBread ! 0x0002e118
[+] Found a Samsung, running Samsung mode
[*] Scooting ...
[*] Sleeping a bit (~40s)...
[*] Waking !
[*] Sending 149 zerglings ...
[*] Sleeping a bit (~40s)...
[*] Waking !
[*] Sending 189 zerglings ...
[+] Zerglings found a way to enter ! 0x18
[+] Overseer found a path ! 0x000305f0
[*] Sleeping a bit (~40s)...
[*] Waking !
[*] Sending 189 zerglings ...
[+] Overseer found a path ! 0x000306b8
[*] Sleeping a bit (~40s)...
[*] Waking !
[*] Sending 189 zerglings ...
[+] Zerglings caused crash (good news): 0x40322cd4 0x0074
[*] Researching Metabolic Boost ...
[+] Speedlings on the go ! 0xafd198cb 0xafd395cf
[*] Sleeping a bit (~40s)...
[*] Waking !
[*] Sending 181 zerglings ...
[+] Rush did it ! It's a GG, man !
[+] Killing ADB and restarting as root... enjoy!
--- WAITING FOR DEVICE TO RECONNECT
if it gets stuck over here for a long time then try:
disconnect usb cable and reconnect it
toggle "USB DEBUGGING" (first disable it then enable it)
--- DEVICE FOUND
Appuyez sur une touche pour continuer...
--- pushing busybox
3499 KB/s (1075144 bytes in 0.300s)
--- correcting permissions
--- remounting /system
--- copying busybox to /system/xbin/
2099+1 records in
2099+1 records out
1075144 bytes transferred in 0.058 secs (18536965 bytes/sec)
--- correcting ownership
--- correcting permissions
--- installing busybox
--- pushing SU binary
3101 KB/s (22228 bytes in 0.007s)
--- correcting ownership
--- correcting permissions
--- correcting symlinks
--- pushing Superuser app
2673 KB/s (785801 bytes in 0.287s)
--- cleaning
--- rebooting
ALL DONE!!!
Appuyez sur une touche pour continuer...
I finaly did it !!!
And i found out the true reason why i made it work.
Some guy in the chinese most popular android forum did say that the results were really random depending on ram.
Zergrush is based on a ram exploit, since creezalird told us he installed a lot of things, i was thinking that maybe he didn't clean his phone ram, but i clean it all the time.
So i loaded 2 gameloft games in RAM, 3 making the phone crash because not enough memory, i did not close the games, just running in the background.
Then i ran doomlord's script, and it worked !
ZCKI1 kernel rooted !
Thanks to everybody here for their feedback, i'll myself continue to post on this board since we all own the same phone, and it's always usefull to share experience.
congratz man, finally u found ur way in..so its the memory after all..---------------------------------------------------------------
Easy rooting toolkit (v3.0)
created by DooMLoRD
using exploit zergRush (Revolutionary Team)
Credits go to all those involved in making this possible!
---------------------------------------------------------------
[*] This script will:
(1) root ur device using latest zergRush exploit (16 Nov)
(2) install Busybox (1.18.4)
(3) install SU files (binary: 3.0.3 and apk: 3.0.6)
[*] Before u begin:
(1) make sure u have installed adb drivers for ur device
(2) enable "USB DEBUGGING"
from (Menu\Settings\Applications\Development)
(3) enable "UNKNOWN SOURCES"
from (Menu\Settings\Applications)
(4) [OPTIONAL] increase screen timeout to 10 minutes
(5) connect USB cable to PHONE and then connect to PC
(6) skip "PC Companion Software" prompt on device
---------------------------------------------------------------
CONFIRM ALL THE ABOVE THEN
Appuyez sur une touche pour continuer...
--- STARTING ----
--- WAITING FOR DEVICE
* daemon not running. starting it now *
* daemon started successfully *
--- cleaning
--- pushing zergRush"
2814 KB/s (23056 bytes in 0.008s)
--- correcting permissions
--- executing zergRush
[**] Zerg rush - Android 2.2/2.3 local root
[**] © 2011 Revolutionary. All rights reserved.
[**] Parts of code from Gingerbreak, © 2010-2011 The Android Exploid Crew.
[+] Found a GingerBread ! 0x0002e118
[+] Found a Samsung, running Samsung mode
[*] Scooting ...
[*] Sleeping a bit (~40s)...
[*] Waking !
[*] Sending 149 zerglings ...
[*] Sleeping a bit (~40s)...
[*] Waking !
[*] Sending 189 zerglings ...
[+] Zerglings found a way to enter ! 0x18
[+] Overseer found a path ! 0x000305f0
[*] Sleeping a bit (~40s)...
[*] Waking !
[*] Sending 189 zerglings ...
[+] Overseer found a path ! 0x000306b8
[*] Sleeping a bit (~40s)...
[*] Waking !
[*] Sending 189 zerglings ...
[+] Zerglings caused crash (good news): 0x40322cd4 0x0074
[*] Researching Metabolic Boost ...
[+] Speedlings on the go ! 0xafd198cb 0xafd395cf
[*] Sleeping a bit (~40s)...
[*] Waking !
[*] Sending 181 zerglings ...
[+] Rush did it ! It's a GG, man !
[+] Killing ADB and restarting as root... enjoy!
--- WAITING FOR DEVICE TO RECONNECT
if it gets stuck over here for a long time then try:
disconnect usb cable and reconnect it
toggle "USB DEBUGGING" (first disable it then enable it)
--- DEVICE FOUND
Appuyez sur une touche pour continuer...
--- pushing busybox
3499 KB/s (1075144 bytes in 0.300s)
--- correcting permissions
--- remounting /system
--- copying busybox to /system/xbin/
2099+1 records in
2099+1 records out
1075144 bytes transferred in 0.058 secs (18536965 bytes/sec)
--- correcting ownership
--- correcting permissions
--- installing busybox
--- pushing SU binary
3101 KB/s (22228 bytes in 0.007s)
--- correcting ownership
--- correcting permissions
--- correcting symlinks
--- pushing Superuser app
2673 KB/s (785801 bytes in 0.287s)
--- cleaning
--- rebooting
ALL DONE!!!
Appuyez sur une touche pour continuer...
I finaly did it !!!
And i found out the true reason why i made it work.
Some guy in the chinese most popular android forum did say that the results were really random depending on ram.
Zergrush is based on a ram exploit, since creezalird told us he installed a lot of things, i was thinking that maybe he didn't clean his phone ram, but i clean it all the time.
So i loaded 2 gameloft games in RAM, 3 making the phone crash because not enough memory, i did not close the games, just running in the background.
Then i ran doomlord's script, and it worked !
ZCKI1 kernel rooted !
Thanks to everybody here for their feedback, i'll myself continue to post on this board since we all own the same phone, and it's always usefull to share experience.
Dec 2 2011, 08:10 PM

Quote
0.0425sec
0.50
7 queries
GZIP Disabled