How to hijack ADB shell permissions?

Claude Speed

Well-known member
Nov 24, 2014
596
0
0
I want to root my device because ADB shell has root permissions, but I do not have working PC! So, how I can do that?

Sent from my eSTAR CRYSTAL using Tapatalk
 
Last edited:
But to modify default.prop you need to run su, which you can't install without being temporarily rooted, in which case you wouldn't have to modify default.prop.

You can modify the file, then repack the system and flash it, or, easier, add su to /system/bin, repack and flash.
 
But to modify default.prop you need to run su, which you can't install without being temporarily rooted, in which case you wouldn't have to modify default.prop.

You can modify the file, then repack the system and flash it, or, easier, add su to /system/bin, repack and flash.
Here's my output of default.prop (I not modified it, because there is no * symbol after file name):
f034fcc89bf5b169f118474de45b766b.jpg


Sent from my eSTAR CRYSTAL using Tapatalk
 
So, there's root access on ADB-only! How I can execute ro.secure=0 in default.prop (not modified) via another way (excluding ADB)?

Sent from my eSTAR CRYSTAL using Tapatalk
 

Trending Posts

Forum statistics

Threads
956,240
Messages
6,967,105
Members
3,163,489
Latest member
JonC