Soo I figured this out, or at least it figured itself out. When I reconnected my phone and went to try again from the beginning for the third time, suddenly I had a root prompt, so I think it's all set!
**************************
I'm having some trouble and I am not sure where it is coming from. I followed the instructions clearly, have debug mode enabled for USB and have my phone in windows media sync. Everything worked fine until this step:
./rageagainstthecage-arm5.bin
- let the process run until it 'kicks' you out (may take a minute or two) to C:\android-sdk-windows\tools
When I run that step this is what I get:
./rageagainstthecage-arm5.bin
[*] CVE-2010-EASY Android local root exploit (C) 2010 by 743C
[*] checking NPROC limit ...
[+] RLIMIT_NPROC={3815, 3815}
[*] Searching for adb ...
[+] Found adb as PID 5014
[*] Spawning children. Dont type anything and wait for reset!
[*]
[*] If you like what we are doing you can send us PayPal money to
[*]
7-4-3-C@web.de so we can compensate time, effort and HW costs.
[*] If you are a company and feel like you profit from our work,
[*] we also accept donations > 1000 USD!
[*]
[*] adb connection will be reset. restart adb server on desktop and re-login.
$
It never kicks me out, it always just goes back to the $. I never get the # after the next steps and going back to execute the rageagainstthecage does not change anything, it always does the same thing. Am I missing something or is this the way it is supposed to work? When I tried to go on and run the mount command it gives me an operation not permitted, so I assume I am not at the right place.
Any help would be super appreciated. TIA!