Dan Rosenberg, a security researcher and rooting mastermind, has done it again, this time making quick work of the LG Spectrum. In a post to his blog just moments ago, Rosenberg simply states "Yawn. LG loses, users win," and gives instructions on downloading the scripts he provides for Windows, Linux, and OSX.
Considering all that Rosenberg has done (and continues to do) for the community, I'd highly recommend supporting him by hitting the donate button below. Read More
After learning that yesterday's XYBoard root (which was thought to work on all Gingerbread/Honeycomb Moto devices) didn't play nice with Motorola's Xoom Family Edition, highly respected security researcher Dan Rosenberg decided to have a look, hoping to bring root back to the FE.
In a post to his blog earlier today, Rosenberg announced that he has found a working exploit for rooting the Xoom Family Edition. Rosenberg has again beaten others to the punch, namely a developer called Evil_DevNull, who Rosenberg calls out in the post for the alleged plagiarism of a previous FE exploit. Read More
Here's a bit of good news for anyone with an unrooted Motorola device - the root method released earlier today by Dan Rosenberg for the Xyboard/Xoom 2 should actually work on any Moto device that's running Gingerbread or Honeycomb. The direct quote, from Dan himself:
The Droid 4 root ("Motofail") should work on all Gingerbread Motorola devices that I know of. The just-released XYBoard root ("XYZ") should root all Gingerbread and Honeycomb Motorola devices.
Over the past 2 days, I've been watching a thread over at MDW that showcased a rooted Motorola XYBOARD tablet but instructed us to wait a few days for the root method to be released. Root was achieved by none other than Dan Rosenberg, the ninja from vulnfactory.org, who has been serving multiple root methods for previously unrootable devices left and right.
Good news, everyone [of you five fine gentlemen in the corner who own a XYBOARD] - as of this morning, we have the root files. Read More
Update: You can download a batch script to root your DROID 4 now (you'll need to have USB debugging and Unknown Sources enabled in the Application settings menu). Find the file on this page, and if you can spare it, take the time to donate to Dan Rosenberg for finding the exploit. All proceeds will go directly to charity, in this case, the American Red Cross.
Widely known and respected security researcher Dan Rosenberg has evidently uncovered a root method for the Droid 4, in addition to a universal Motorola root method. Read More
Pay attention to the name Dan Rosenberg, it's one that you're going to want to know for the future. He's the guy who brought us root for the Lenovo Thinkpad Tablet, and now he's back with a root method for the Sony Tablet S. His blog post on how he figured out the exploit is an absolutely fascinating read, albeit quite technical. Even if you don't understand the post in its entirety, you can still appreciate the genius at work to construct such a clever exploit. Read More
If you lost root after updating your Transformer Prime with the latest OTA, we have good news: thanks to a new method found by Android hacker Saurik, you can now root once again.
As always, we're not responsible if you damage your device. It's all you, baby!
So, you ready to make this happen? Let's get started.
First things first, you'll need to grab a couple of files.
Once you've downloaded the required files, plug your Prime into your computer, fire up adb, and enter the following commands (one at a time, of course):
adb push mempodroid /data/local
adb push su /data/local
adb shell chmod 777 /data/local/mempodroid
adb shell /data/local/mempodroid 0xd9ec 0xaf47 mount -o remount,rw '' /system
/data/local/mempodroid 0xd9ec 0xaf47 sh
At this point, you should be in a root shell session (indicated with the pound sign). Read More
Owners of the Lenovo Thinkpad tablet have long been waiting for a way to root their devices... in fact, the situation is so dire that there is a $785 bounty for root. Or was, anyway: Dan Rosenberg has figured out a way to root the device, and Justin Case and utkanos have managed to get ClockworkMod Recovery (CWM) up and running without a hitch. Luckily, both rooting and installing CWM are quite simple (though you do need an SD card to install CWM). Read More
Since launch, the ASUS Transformer Prime's GPS issues have hampered an otherwise stellar tablet. To make matters worse, ASUS confirmed that the problem was due to the Prime's all-aluminium construction, indicating that a software fix was unlikely. Indeed ASUS was forced to release a new version of the Prime (TF700T), with an updated back panel to improve the GPS functionality. However, ASUS has not given up all hope on the original Prime as a new OTA update (V126.96.36.199) is rolling out, which could fix the GPS drivers. Read More
Justin Case has done it again, bringing root access back to users of Amazon's Kindle Fire who accepted the recent firmware update to version 6.2.2. BurritoRoot 2 is an easy-to-use exploit that only requires adb (Android debug bridge) and a few moments of your time. Users looking to root their device after Amazon's latest firmware update can grab BurritoRoot 2 using the download mirrors below.
To use the exploit, just download the file and run the following commands from adb:
adb push BurritoRoot2.bin /data/local/
adb shell chmod 777 /data/local/BurritoRoot2.bin
adb shell /data/local/BurritoRoot2.bin
adb shell id
<if uid = 0 continue, if not start over>
adb push su /system/xbin/su
adb shell chown 0.0 /system/xbin/su
adb shell chmod 06755 /system/xbin/su
adb install Superuser.apk (skip this step if its already installed)
For more information, check out Justin's original thread over at XDA. Read More