Well, isn’t this interesting – the latest OTA update for the EVO (which patched the vulnerability that previously enabled root) has been cracked. The interesting part? It uses Adobe’s Flash Config page to gain entry to the system config.
The full instructions aren’t all that tricky, and as we’ve said before, as long as you read the instructions first, you shouldn’t have an issue. If you haven’t rooted before, it’s certainly worth considering. The benefits are numerous, and having rooted a phone for the first time myself just a month ago, I can attest that it’s well worth it.
Video tutorial and full instructions:
Make sure you have adb ready to go and know how to get into adb shell. You must use the EVO browser to perform these steps. If these steps don't work, use recovery to wipe your phone and start fresh (you will lose all of your data on the phone)
1. Unzip the files into a directory somewhere on your computer
2. Put the files into the root of your sdcard (mount the EVO as a disk drive)
3. Unmount your phone
4. Run "adb shell" and start part1 on your phone:
5. If the script says to power down, hold your power button and turn off your phone, then turn it back on.
6. When it starts up it will ask you to open the EVO browser. open your EVO browser to http://bit.ly/ad0pRn
7. When it asks you to, refresh the EVO browser on the same page
8. Reboot your phone with "adb reboot"
9. Run adb shell as soon as you can (when the HTC logo is still showing). You need to be fast. If you get "error: device not found", try again.
Code:adb shell /data/local/part2
10. It should print after part2 finished:
Code:crw-rw-rw- root root 90, 2 2010-07-05 19:37 mtd1
11. When your phone finished booting, flash toastcfh's mtd-eng.img to misc:
Code:cat /sdcard/flash_image > /data/local/flash_image chmod 755 /data/local/flash_image /data/local/flash_image misc /sdcard/mtd-eng.img
12. Now flash the Engineering SPL with toastcfh's post: http://forum.xda-developers.com/showthread.php?t=701835