**PLEASE NOTE**Most of the exploits will be detected by AV, these ARE POSITIVES!! Think about what you are downloading! You are downloading exploits in which bypass security on an Android (Linux) phone and obtain root, this is called PRIVILEGE ESCALATION. Its just like if your hacking a linux website trying to get root, what do you use? oh yeah, exploits!!! So before you complain about "my AV said it was a virus so I deleted it", just remember what it is you are downloading!Ok so I figured I would throw together this guide to help some Android Users out. There are some websites that I will be referring and linking to as none of these are my works.
Preparing your device for RootThere are usually always a couple of basics to do when getting ready to root your phone.
1. Download Device Drivers
It would be impossible for me to list device drivers for every android device, so simple use google!
https://www.google.com/#hl=en&sclient=psy-ab&q=NAME+OF+DEVICE+root+drivers
2. Turn on USB Debugging and Enable Unknown Sources (Required for rooting then installing superuser.apk)
2a. Press Menu and Go to Settings
2b. Select Applications
3. Check "Unknown Sources" and then select "Development"
4. Select "Enable USB Debugging"
5. Profit, all done
3. Look into unrooting methods and be sure to download and save the tools for later use (you never know what sites going to go down next fucking SOPA) If you ever "soft"brick your phone, need to return it to the store, flash a bad ROM, etc. Its always good to have these files!
Now that we have the basics done, time to look into rooting methods.
One Click RootersNow there is no sense in downloading the Android SDK, using ADB and manually entering commands if you don't have to. There are several One-Click options for rooting your phone. However some phones just wont work.
Now some devices will let you root your phone straight from your device.
On Phone Options:
z4root 1.3 -
http://upload.evilzone.org/download.php?id=8407914&type=rarCompatible with PERMANENT root option Samsung Galaxy S (All variants)
Backflip
Sony X10
Xperia Mini
Droid 2
Galaxy Tab
Galaxy I5700
Galaxy 3 I5800
Droid X
Samsung Acclaim
Cricket Huawei Ascend
Motorola Cliq
Huawei 8120
Hero
G1
Optimus T
Droid 1
Garmin Asus A50
Motorola Defy
LG Ally
Motorola Flipside
Motorola Milestone 2
Dell streak
X10 Mini Pro
Smartq v7 android 2.1
Incompatible with PERMANENT root option Desire (requires nand unlock)
Desire HD (requires nand unlock)
Magic (unknown)
Evo (requires nand unlock)
G2 (requires nand unlock)
Archos 70 (unknown)
myTouch 3G (unknown)
Wildfire
Droid Incredible
GingerBreak -
http://upload.evilzone.org/download.php?id=1208160&type=ziphttp://forum.xda-developers.com/showthread.php?t=1044765**WILL NOT WORK WITH ANY S-ON DEVICES!!!** Check out unrevoked!
On PC One Click RootSuper One Click -
http://upload.evilzone.org/download.php?id=9948125&type=ziphttp://forum.xda-developers.com/showthread.php?t=803682Compatibility listPlease note that if you device is not listed here, it doesn't automatically make it incompatible. The list is definitely incomplete.
Acer Liquid Metal
Dell Streak
HTC Magic (Sapphire) 32B
HTC Bee
LG Ally
Motorola Atrix4G
Motorola Charm
Motorola Cliq
Motorola Droid
Motorola Flipside
Motorola Flipout
Motorola Milestone
Nexus One
Samsung Captivate
Samsung Galaxy 551 (GT-I5510)
Samsung Galaxy Portal/Spica I5700
Samsung Galaxy S 4G
Samsung Galaxy S I9000
Samsung Galaxy S SCH-I500
Samsung Galaxy Tab
Samsung Transform M920
Samsung Vibrant
Sony Ericsson Xperia E51i X8
Sony Ericsson Xperia X10
Sprint Hero
Telus Fascinate
Toshiba Folio 100
NOTE:
rageagainstthecage is a root exploit via a fork bomb. It IS a potentially malicious payload, BUT it is being used with owner's consent to root the phone. The DreamDroid malware use exactly same payload - they are trojans, but this is a helpful tool. It IS a dangerous tool in the wrong hands, but this is a root exploit, so you should exercise common sense and a little understanding of what it does and how it works.
---
DooMLoRD's Easy Rooting Toolkit -
http://upload.evilzone.org/download.php?id=5673791&type=ziphttp://forum.xda-developers.com/showthread.php?t=1321582Confirmed to be working on the following devices:Sony Xperia X10 (GB firmware)
Sony Xperia Arc
Sony Xperia Arc S
Sony Xperia Play [R800i/R800x]
Sony Xperia Ray
Sony Xperia Neo
Sony Xperia Neo V
Sony Xperia Mini
Sony Xperia Mini S51SE
Sony Xperia Mini Pro
Sony Xperia Pro
Sony Xperia Active
Sony Xperia Live Walkman
NTT Docomo Xperia ARCO SO-02C
Samsung Galaxy S2 [GT-i9100/i9100P/i9100T]
Samsung Galaxy S II for T-Mobile (SGH-T989)
Samsung Galaxy S II for AT&T (SGH-I777), Skyrocket (SGH-i727)
Samsung Galaxy S II LTE Rogers Canada (SGH-I727R), Android version 2.3.5, Baseband version I727RUXKJ7
Samsung Galaxy S II Epic 4g Touch
Samsung Galaxy S2 HD LTE (SHV-E120S)(korea)
Samsung Galaxy S2 LTE (SHV-E110S)
Samsung Galaxy S2 LTE Japanese version (carrier DoCoMo) [SC-03D] (2.3.6) {OMKK3}
Samsung Galaxy i9100G
Samsung Galaxy S [i9000B] & [i9000 2.3.3 (PDA I9000BOJV8, Phone I9000XXJVO, CSC I9000GDTMJV7) and german T-Mobile branding], XWJVW (2.3.6)
Samsung Galaxy S 4G (aka SGH-T959V)
Samsung Galaxy S Plus (GT-I9001) OS 2.3.3 and 2.3.6 (I9001ZSKP6) & 2.3.4 firmware (i9001XXKP4)
Samsung Galaxy Mini GT-S5570 (GB only)
Samsung Galaxy Mini Pro i5510
Samsung Galaxy W [i8150]
Samsung Galaxy Y
Samsung Galaxy Y pro [B5510] (2.3.5)
Samsung Galaxy Tab [P1000] (2.3.3 firmware), [P1000N]
Samsung Galaxy Note [N7000]
Samsung Galaxy Player YP-G70 2.3.5 (GINGERBREAD.XXKPF)
Samsung Galaxy Ace (2.3.3, 2.3.4 firmware)
Samsung S5670 FIT DDKQ5 2.3.5
Samsung Nexus S [i9023] (2.3.6)
Samsung Nexus S 4G 2.3.7
Samsung Galaxy Nexus S [i9020] (2.3.6) & Nexus S i9020A (2.3.6)
Samsung Exhibit (SGH-T759)
Samsung Exhibit 4G (SGH-T759) (2.3.3) Build UVKE8
Samsung Epic 4G
Samsung Captivate i897 UCKH3
Motorola ATRIX
Motorola Milestone 3 [ME863 HK]
Motorola Milestone 2 with Gingerbread
Motorola XT860, Bell XT860
Motorola Defy+
Motorola Droid X sys ver 4.5.605 w/ gingerbread
Motorola Droid X2 (2.3.4) Sys ver 1.3.380.MB870.Verizon.en.US Build 4.5.1A-DTN-150-30
Motorola XT883 (China Telecom)
Motorola XT862 (Verizon Droid3)
Motorola DROID RAZR
Nexus One (2.3.6 stock)
LG Revolution
LG Nitro HD
Vizio VTAB1008 Tablet
Huawei Ideos U8150 (2.2)
Huawei Ideos X5 [U8800] (2.3.5)
HTC Sensation (S-OFF only)
HTC Raider (Rogers)
HTC Chacha
Acer Liquid Mini (2.3.5)
Acer Liquid Metal (2.3.6)
If you have a Motorola Droid 4, Razr, or Bionic, use the following:Motofail -
http://upload.evilzone.org/download.php?id=5188924&type=zipUnrevoked (Select HTC Devices that don't work with zergRush or rageagainstthecage exploits)
http://www.unrevoked.com/Supported Devices:
HTC Evo 4G
HTC Hero
HTC Wildfire
HTC Aria
HTC Desire
HTC Droid Incredible
If none of these are working then you have a stubborn phone, but if you really want root, you'll have to google it yourself or post your phone information and I will help you get rooted.
HOWEVER, be sure to check this list, its the most complete way to root phones:
http://wiki.rootzwiki.com/Category:DevicesOther sites you should check out if your an android enthusiast:
http://www.xda-developers.comhttp://www.droid-life.nethttp://www.rootzwiki.comNow I know this isn't really a guide, but its a starting point so you guys know what your looking for and what to expect when rooting. Remember to always backup and do your research!
Keep in mind that there has been malware for your phones that utilize these exploits... They have been used with both the gingerbreak and rageagainstthecage exploits (which is why google really removed them from the market)
List of android exploits:
rageagainstthecage -
Reversed Source with some documentation: http://pastebin.com/fXsGij3Ngingerbreak - Info:
http://anonym.to?http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-1823 Source Code: http://upload.evilzone.org/download.php?id=1727083&type=zipzergRush -
Source Code: http://upload.evilzone.org/download.php?id=6981973&type=zipI'm pretty sure those are the exploits that have been used in all the apps
rageagainstthecage - Android 1.6-2.2.1
gingerbreak - Android 2.2-2.3.4
zergRush - Android 2.2-2.3.4/5/6
Pretty sure those are the operating systems in which they root...