mauike
New member
Re: ADB rooting method
It does list <100072294a44 offline> though.
After running gingersnap phone does not reboot nor does it show with <adb devices>?Directions: (Assuming you followed preparations from Post #2)
Download DSChargeRoot.zip:
With your phone in debugging mode set to stay awake
1. Extract downloaded DSChargeRoot.zip file directly to your C:\ Drive
2. Now go to your start button on your menu bar,in the run field or search field depending on your version of windows, type CMD and hit enter. The command box will present itself. From here on out just copy and paste the commands i will provide below. To paste in the command box you must right click on the mouse and select paste. Do not paste BOLD text below those are just for info.
Commands are as follows:
Code:cd C:\DSChargeRoot adb devices
It will state
"List of devices attached
I500******* device"
If you dont see this you are not connected
Code:adb push su /data/local/su adb push Superuser.apk /data/local/Superuser.apk adb push GingerBreak /data/local/GingerBreak adb push com.sh /data/local/com.sh adb shell chmod 777 /data/local/su adb shell chmod 777 /data/local/GingerBreak adb shell chmod 777 /data/local/com.sh adb shell
The adb shell command will not put you in the phones internal command terminal. This is represented with "$" prompt. You will now execute the GingerBreak exploit. This make take serveral minutes.
Code:/data/local/GingerBreak
After entering the above command Gingerbreak will do its thing. A successful exploit will end with this,"[!] dance forever my only one"
If it ends in anything else or if it hangs for more than 5 minutes pull your battery and attempt to root again.
After exploit is complete you will have a command prompt that looks like this "#". That represents root access. You will now excute shell script then reboot your phone.
Code:/data/local/com.sh exit exit adb reboot
Your phone will now reboot. Congrats Enjoy your rooted device
[TIP]check app drawer to see if superuser app is installed,if it is you are rooted[/TIP]
It does list <100072294a44 offline> though.