04-17-2013 08:43 PM
524 ... 18192021
tools
  1. jomamaiscool's Avatar
    This is awesome, it works really well and is simple

    Major kudos!
    07-01-2011 12:04 AM
  2. rawhide's Avatar
    I just got my charge with the latest and greatest android os. Does anyone know if this process works on all of the droid charges?
    07-01-2011 01:49 PM
  3. kcbroncosfan's Avatar
    [WARN]Gingersnap (along with all other Android modifications) is experimental software and while I have made this as safe as possible, differences in operating environments and natural disasters can cause your device to become unusable. Please make sure you understand this important fact before downloading.

    Disclaimer: Neither myself, Android Central or any other member of Android Central are responsible for any disasters that occur as a result of any hack or modification you perform on your device. Your use of this application is at your own risk![/WARN]


    With that out of the way, I'd like to introduce you to the Gingersnap Root Utility. Gingersnap is a one-click root utility, much like SuperOneClick or Universal Androot.

    The nitty gritty: Gingersnap uses a modified version of the famous GingerBreak exploit to automatically root your Android-powered device and installs the necessary files to maintain a permanent root status.

    Pre-use Requirements:
    1) You need the .NET 4 Framework. Not the Client Profile, the full .NET 4 Framework.
    2) For some reason you need the Visual C++ 2008 redistributable installed. Don't ask me why.
    3) You need proper drivers for the your phone. Your video card doesn't work without drivers and neither will your phone.
    4) Before running this Utility please make sure your phone is in debugging mode

    Instructions:
    • Download and unzip Gingersnap-V1.2.zip to anyplace on your computer
    • Connect your phone to computer in debugging mode
    • Open Gingersnap-V1.2 folder
    • Double click Gingersnap applications icon
    • press GO , sit back and relax

    Credits:
    Gingersnap Utility: drewwalton19216801
    GingerBreak exploit: C-Skills (Sebastian)
    Autoroot shell script (com.sh): Droidxcon, YAY ME!
    MAJOR thanks to jondevere for being drewwalton19216801's personal guinea pig!

    Think you're ready? The file is attached to this post.

    Source Code:
    The modified GingerBreak source code is attached to this post. The filename is gingerbreak-mod-gs-src.zip
    I'm hoping this works. I've lost lots of sleep trying to root my Replenish!
    07-02-2011 10:06 AM
  4. kcbroncosfan's Avatar
    I'm hoping this works. I've lost lots of sleep trying to root my Replenish!
    Why can't I find the file?
    07-02-2011 10:08 AM
  5. gblockstudios's Avatar
    first tey at this on a replenish did it on my old droid on verizon with no problem
    07-02-2011 11:17 AM
  6. chilefreak's Avatar
    [WARN]Gingersnap (along with all other Android modifications) is experimental software and while I have made this as safe as possible, differences in operating environments and natural disasters can cause your device to become unusable. Please make sure you understand this important fact before downloading.

    Disclaimer: Neither myself, Android Central or any other member of Android Central are responsible for any disasters that occur as a result of any hack or modification you perform on your device. Your use of this application is at your own risk![/WARN]


    With that out of the way, I'd like to introduce you to the Gingersnap Root Utility. Gingersnap is a one-click root utility, much like SuperOneClick or Universal Androot.

    The nitty gritty: Gingersnap uses a modified version of the famous GingerBreak exploit to automatically root your Android-powered device and installs the necessary files to maintain a permanent root status.

    Pre-use Requirements:
    1) You need the .NET 4 Framework. Not the Client Profile, the full .NET 4 Framework.
    2) For some reason you need the Visual C++ 2008 redistributable installed. Don't ask me why.
    3) You need proper drivers for the your phone. Your video card doesn't work without drivers and neither will your phone.
    4) Before running this Utility please make sure your phone is in debugging mode

    Instructions:
    • Download and unzip Gingersnap-V1.2.zip to anyplace on your computer
    • Connect your phone to computer in debugging mode
    • Open Gingersnap-V1.2 folder
    • Double click Gingersnap applications icon
    • press GO , sit back and relax

    Credits:
    Gingersnap Utility: drewwalton19216801
    GingerBreak exploit: C-Skills (Sebastian)
    Autoroot shell script (com.sh): Droidxcon, YAY ME!
    MAJOR thanks to jondevere for being drewwalton19216801's personal guinea pig!

    Think you're ready? The file is attached to this post.

    Source Code:
    The modified GingerBreak source code is attached to this post. The filename is gingerbreak-mod-gs-src.zip
    Thanks for all the hard work.
    chilefreak
    07-02-2011 11:45 AM
  7. tamcswain09's Avatar
    Thanks for the info! This was really useful.
    07-02-2011 03:06 PM
  8. phantomeyeam's Avatar
    Hopefully this works for me! Thanks for the info.
    07-02-2011 04:40 PM
  9. MunkySpunk's Avatar
    Thanks!!


    ____________________
    07-03-2011 08:56 AM
  10. tdidi5's Avatar
    Great info Thanks
    07-03-2011 09:15 AM
  11. benjamcc's Avatar
    anyone use this on a samsung replenish yet?
    07-04-2011 07:01 AM
  12. puercomal's Avatar
    thanks! confirming it doesn't work for ED2.
    07-04-2011 02:11 PM
  13. droidcharge's Avatar
    Trying this now. I hope I don't kill my phone
    07-04-2011 06:39 PM
  14. nachocheez's Avatar
    Does this work on ee4?
    07-04-2011 07:15 PM
  15. dalillama's Avatar
    Post #1 = Index
    Post #2 = FAQ
    Post #3 = GingerSnap One click root (Retired Semi Auto root)
    Post #4 = ADB rooting (Beginner-Intermediate)
    Post #5 = How to root using a Mac (Beginner-Intermediate)
    Post #6 = Removing apps once rooted (Coming soon)
    Post #7 = How to Unroot
    Post #8 = Credits

    [warn]The methodS of rooting your Android device as described in the article herein is solely for enthusiasts and not for the faint of heart.

    Android Central, Android Police, Team AndIRC and myself disclaim all liability for any harm that may befall your device, including, but not limited to: bricked phones, voided manufacturer warranties, exploding batteries, etc.

    THESE METHODS ONLY WORK FOR ED1 BUILD, ANYTHING BEYOND THAT REQUIRE A CUSTOM KERNEL THAT INCLUDES ROOT

    [/warn]
    Thanks for the guide!
    07-04-2011 09:02 PM
  16. T-Rob's Avatar
    Hey, guys...please excuse the noob question, but I'm coming from a D1 and now have a Charge. What is ED1 and ED2....what does it stand for and how do I know which one I have?

    Also, from what I've read, if you have ED2, this rooting process won't work...is that still correct?

    Thanks,
    T
    07-04-2011 11:33 PM
  17. andy.eskridge's Avatar
    Thank you for this post. It was very helpful.
    07-05-2011 01:08 AM
  18. siXUNE's Avatar
    I'm fresh and new to the smart phones. And I'm trying to learn how to actually root my phone. I hope I don't mess up.
    07-05-2011 11:48 AM
  19. dewijaro's Avatar
    Thanks for the instructions!
    07-05-2011 10:45 PM
  20. edstreiff's Avatar
    Thanks this was great
    07-05-2011 11:13 PM
  21. danielbarakat's Avatar
    I hope this works
    07-06-2011 02:48 PM
  22. NTravers's Avatar
    Mine just hangs after I run gingerbreak and I've tried multiple times. Any suggestions? Would trying from a factory-fresh state help?

    Microsoft Windows [Version 6.1.7601]
    Copyright (c) 2009 Microsoft Corporation. All rights reserved.

    C:\windows\system32>cd c:\dschargeroot

    c:\DSChargeRoot>adb devices
    * daemon not running. starting it now on port 5037 *
    * daemon started successfully *
    List of devices attached
    1000dec2faa7 device


    c:\DSChargeRoot>adb push su /data/local/su
    383 KB/s (26336 bytes in 0.067s)

    c:\DSChargeRoot>adb push Superuser.apk /data/local/Superuser.apk
    872 KB/s (196521 bytes in 0.220s)

    c:\DSChargeRoot>adb push GingerBreak /data/local/GingerBreak
    222 KB/s (16830 bytes in 0.074s)

    c:\DSChargeRoot>adb push com.sh /data/local/com.sh
    3 KB/s (225 bytes in 0.056s)

    c:\DSChargeRoot>adb shell chmod 777 /data/local/su

    c:\DSChargeRoot>adb shell chmod 777 /data/local/GingerBreak

    c:\DSChargeRoot>adb shell chmod 777 /data/local/com.sh

    c:\DSChargeRoot>adb shell
    $

    $ /data/local/GingerBreak
    /data/local/GingerBreak

    [**] Gingerbreak/Honeybomb -- android 2.[2,3], 3.0 softbreak
    [**] (C) 2010-2011 The Android Exploid Crew. All rights reserved.
    [**] Kudos to jenzi, the #brownpants-party, the Open Source folks,
    [**] Zynamics for ARM skills and Onkel Budi

    [**] donate to 7-4-3-C@web.de if you like
    [**] Exploit may take a while!

    [+] Detected Froyo!
    [+] Found system: 0xafd1452d strcmp: 0xafd1d7ed
    [+] Found PT_DYNAMIC of size 264 (33 entries)
    [+] Found GOT: 0x000162e8
    [+] Using device /devices/platform/s3c-sdhci.2/mmc_host/mmc2[*] vold: 2385 GOT start: 0x000162e8 GOT end: 0x00016328


    Edit: My phone doesn't have an option to suspend sleeping like the example phone, it only has debugging mode and mock locations.
    07-10-2011 04:20 PM
  23. Bretski's Avatar
    I have tried to root twice now get to this point using the adb method

    Microsoft Windows [Version 6.1.7601]
    Copyright (c) 2009 Microsoft Corporation. All rights reserved.

    C:\Users\Administrator>cd C:\DSChargeRoot

    C:\DSChargeRoot>adb devices
    List of devices attached
    10003d1b020f device


    C:\DSChargeRoot>adb push su /data/local/su
    411 KB/s (26336 bytes in 0.062s)

    C:\DSChargeRoot>adb push Superuser.apk /data/local/Superuser.apk
    795 KB/s (140049 bytes in 0.171s)

    C:\DSChargeRoot>adb push GingerBreak /data/local/GingerBreak
    350 KB/s (16830 bytes in 0.046s)

    C:\DSChargeRoot>adb push com.sh /data/local/com.sh
    3 KB/s (225 bytes in 0.062s)

    C:\DSChargeRoot>adb shell chmod 777 /data/local/su

    C:\DSChargeRoot>adb shell chmod 777 /data/local/GingerBreak

    C:\DSChargeRoot>adb shell chmod 777 /data/local/com.sh

    C:\DSChargeRoot>adb shell
    $ /data/local/GingerBreak
    /data/local/GingerBreak

    [**] Gingerbreak/Honeybomb -- android 2.[2,3], 3.0 softbreak
    [**] (C) 2010-2011 The Android Exploid Crew. All rights reserved.
    [**] Kudos to jenzi, the #brownpants-party, the Open Source folks,
    [**] Zynamics for ARM skills and Onkel Budi

    [**] donate to 7-4-3-C@web.de if you like
    [**] Exploit may take a while!

    [+] Detected Froyo!
    [+] Found system: 0xafd1452d strcmp: 0xafd1d7ed
    [+] Found PT_DYNAMIC of size 264 (33 entries)
    [+] Found GOT: 0x000162e8
    [+] Using device /devices/platform/s3c-sdhci.2/mmc_host/mmc2[*] vold: 2386 GOT start: 0x000162e8 GOT end: 0x00016328

    then nothing. Any suggestions?
    07-13-2011 06:44 PM
  24. nachocheez's Avatar
    I have tried to root twice now get to this point using the adb method

    Microsoft Windows [Version 6.1.7601]
    Copyright (c) 2009 Microsoft Corporation. All rights reserved.

    C:\Users\Administrator>cd C:\DSChargeRoot

    C:\DSChargeRoot>adb devices
    List of devices attached
    10003d1b020f device


    C:\DSChargeRoot>adb push su /data/local/su
    411 KB/s (26336 bytes in 0.062s)

    C:\DSChargeRoot>adb push Superuser.apk /data/local/Superuser.apk
    795 KB/s (140049 bytes in 0.171s)

    C:\DSChargeRoot>adb push GingerBreak /data/local/GingerBreak
    350 KB/s (16830 bytes in 0.046s)

    C:\DSChargeRoot>adb push com.sh /data/local/com.sh
    3 KB/s (225 bytes in 0.062s)

    C:\DSChargeRoot>adb shell chmod 777 /data/local/su

    C:\DSChargeRoot>adb shell chmod 777 /data/local/GingerBreak

    C:\DSChargeRoot>adb shell chmod 777 /data/local/com.sh

    C:\DSChargeRoot>adb shell
    $ /data/local/GingerBreak
    /data/local/GingerBreak

    [**] Gingerbreak/Honeybomb -- android 2.[2,3], 3.0 softbreak
    [**] (C) 2010-2011 The Android Exploid Crew. All rights reserved.
    [**] Kudos to jenzi, the #brownpants-party, the Open Source folks,
    [**] Zynamics for ARM skills and Onkel Budi

    [**] donate to 7-4-3-C@web.de if you like
    [**] Exploit may take a while!

    [+] Detected Froyo!
    [+] Found system: 0xafd1452d strcmp: 0xafd1d7ed
    [+] Found PT_DYNAMIC of size 264 (33 entries)
    [+] Found GOT: 0x000162e8
    [+] Using device /devices/platform/s3c-sdhci.2/mmc_host/mmc2[*] vold: 2386 GOT start: 0x000162e8 GOT end: 0x00016328

    then nothing. Any suggestions?
    This root method is for ED1 build, im guessing you recently got your Droid Charge or got an OTA update so it is running on EE4 build. This root will not work with your current build.
    07-15-2011 05:56 PM
  25. nachocheez's Avatar
    This root method is for ED1 build, im guessing you recently got your Droid Charge or got an OTA update so it is running on EE4 build. This root will not work with your current build.
    Also same explanation for the previous poster
    07-15-2011 05:57 PM
524 ... 18192021
LINK TO POST COPIED TO CLIPBOARD