[INFO]
1) Preparation:
-- Copy the entire contents of your sdcard to your PC or dropbox etc, or you could lose it all!
-- Be sure your phone is charged over 50%
-- Under settings, be sure USB Debugging is enabled
-- Check firmware version on your phone under Settings>>About phone, it should show VM670ZV9
-- Run any app that uses the accelerometer, this is to initialize the config files
-- Check to be sure your PC is set up for adb and has the LG Optimus V USB drivers installed
---- Please read the stickies for instructions on setting up adb and installing the USB drivers
-- Download the following files:
---- flash_image binary
md5sum 16559f2c27d08ff1ddfcaca05fbf10fb
---- BobZhome recovery VM670NH_recovery.img
md5sum 4196aac89f95ee7b468c53b5ffacf9db
---- jcase's modified SuperUser zip package
md5sum 5321eb31301ff30e67d3bc6b661ef03f
2) Transfer Files To Phone:
-- Use adb to push (transfer) the downloaded files to your phone
---- note - it is easiest to place the files in the same folder that adb.exe is located in!
3) Perform Exploit:
-- Type the following commands
---- note - if you get errors, please post them,
---- you may need to do a factory reset, and then redo the phone prep
-- Wait for your phone to reboot, the magick is working
-- Once fully rebooted, type the following commands
Note- If you have permission or other errors during step 3, do a factory reset, then try again.
4) Install SuperUser and Prevent Recovery Re-Write
-- Once you have rebooted into recovery, you should be in CWM based Recovery v4.0.1.5
---- If you see anything else, STOP and please report the version you see at the top or bottom
-- Select Install zip from sdcard
-- Select Choose zip from sdcard
-- Select the jcase_rootme.zip
-- Select Yes - Install jcase_rootme.zip
-- Return to main menu (press back button)
-- Select Reboot Now
5) Test Root Capability
-- In your app draw, open SuperUser, it should open without errors
-- Install Terminal emulator from the market
-- Open Terminal and type in su
---- If SuperUser asks for permission, and/or you get a # prompt, congratulations you are rooted!
---- If you get permission denied, something went wrong, please post here
6) Thank jcase for his hard work developing this exploit!
-- He has named the exploit GorditaRoot, and the original thread is locate here
-- Please consider donating some small amount to help continue jcase's development work on Android!
If you have any errors along the way, please post them here, or to jcase's original thread.
[INFO]
To everyone who helped by offering their phone, time, and knowledge, THANK YOU VERY MUCH!
Take that VIrgin!
Great news everyone!
An incredible developer at xda, handle = jcase, has helped me to root the security udpate from Virgin Mobile!
[/INFO][WARN]An incredible developer at xda, handle = jcase, has helped me to root the security udpate from Virgin Mobile!
As always, this will void your warranty!
Even though we have tested this on several phones, this could brick your phone, anything is possible!
Do NOT use the Touch recovery, CWM-Green, or Multi-ROM recovery, they WILL BRICK YOUR PHONE when installing this.
[/WARN][NOTE]Even though we have tested this on several phones, this could brick your phone, anything is possible!
Do NOT use the Touch recovery, CWM-Green, or Multi-ROM recovery, they WILL BRICK YOUR PHONE when installing this.
This exploit is designed for the March 2012 Virgin Mobile Security Update.
It may work on other phones or firmware versions, but this has not been confirmed.
I had two corrupt downloads/transfers of the Security Update, both were transfered via USB mass storage.
I switched to using adb push update.zip /sdcard/update.zip and finally got a good tranfer.
We had to do a factory reset with the new update installed the first time we attempted this exploit, ymmv.
[/NOTE][TIP]It may work on other phones or firmware versions, but this has not been confirmed.
I had two corrupt downloads/transfers of the Security Update, both were transfered via USB mass storage.
I switched to using adb push update.zip /sdcard/update.zip and finally got a good tranfer.
We had to do a factory reset with the new update installed the first time we attempted this exploit, ymmv.
The following instructions are for those who have already flashed
the Virgin Mobile Security Update March 2012
See the second post for other ways to make use of this update package (radio, kernel, restore to stock, etc)
[/TIP]the Virgin Mobile Security Update March 2012
See the second post for other ways to make use of this update package (radio, kernel, restore to stock, etc)
1) Preparation:
-- Copy the entire contents of your sdcard to your PC or dropbox etc, or you could lose it all!
-- Be sure your phone is charged over 50%
-- Under settings, be sure USB Debugging is enabled
-- Check firmware version on your phone under Settings>>About phone, it should show VM670ZV9
-- Run any app that uses the accelerometer, this is to initialize the config files
-- Check to be sure your PC is set up for adb and has the LG Optimus V USB drivers installed
---- Please read the stickies for instructions on setting up adb and installing the USB drivers
-- Download the following files:
---- flash_image binary
md5sum 16559f2c27d08ff1ddfcaca05fbf10fb
---- BobZhome recovery VM670NH_recovery.img
md5sum 4196aac89f95ee7b468c53b5ffacf9db
---- jcase's modified SuperUser zip package
md5sum 5321eb31301ff30e67d3bc6b661ef03f
2) Transfer Files To Phone:
-- Use adb to push (transfer) the downloaded files to your phone
---- note - it is easiest to place the files in the same folder that adb.exe is located in!
Code:
cd FILE_PATH_TO_ADB_DIRECTORY_HERE
adb push flash_image /data/local/flash_image
adb push VM670NH_recovery.img /data/local/VM670NH_recovery.img
adb push jcase_rootme.zip /sdcard/jcase_rootme.zip
3) Perform Exploit:
-- Type the following commands
---- note - if you get errors, please post them,
---- you may need to do a factory reset, and then redo the phone prep
Code:
adb shell chmod 755 /data/local/flash_image
adb shell rm /data/amit/*
adb shell ln -s /dev/mtd/mtd2 /data/amit/AMI304_Config.ini
adb shell ln -s /dev/mtd/mtd2 /data/amit/AMI304_Config2.ini
adb reboot
-- Once fully rebooted, type the following commands
Code:
adb shell rm /data/amit/*
adb shell /data/local/flash_image recovery /data/local/VM670NH_recovery.img
adb reboot recovery
Note- If you have permission or other errors during step 3, do a factory reset, then try again.
4) Install SuperUser and Prevent Recovery Re-Write
-- Once you have rebooted into recovery, you should be in CWM based Recovery v4.0.1.5
---- If you see anything else, STOP and please report the version you see at the top or bottom
-- Select Install zip from sdcard
-- Select Choose zip from sdcard
-- Select the jcase_rootme.zip
-- Select Yes - Install jcase_rootme.zip
-- Return to main menu (press back button)
-- Select Reboot Now
5) Test Root Capability
-- In your app draw, open SuperUser, it should open without errors
-- Install Terminal emulator from the market
-- Open Terminal and type in su
---- If SuperUser asks for permission, and/or you get a # prompt, congratulations you are rooted!
---- If you get permission denied, something went wrong, please post here
6) Thank jcase for his hard work developing this exploit!
-- He has named the exploit GorditaRoot, and the original thread is locate here
-- Please consider donating some small amount to help continue jcase's development work on Android!
If you have any errors along the way, please post them here, or to jcase's original thread.
[INFO]
All thanks should be directed to jcase, the developer of GorditaRoot,
and the man who gave his time to help root a phone he doesn't even own!!!
I will be making a one-click solution for this over the next few days,
and I will put intructions in the second post when ready.
[/INFO]and the man who gave his time to help root a phone he doesn't even own!!!
I will be making a one-click solution for this over the next few days,
and I will put intructions in the second post when ready.
To everyone who helped by offering their phone, time, and knowledge, THANK YOU VERY MUCH!
Take that VIrgin!
Last edited: