Microsoft Windows [Version 6.1.7600]
Copyright (c) 2009 Microsoft Corporation. All rights reserved.
C:\Users\Marcelo>cd c:\users\marcelo\Rootfiles
c:\Users\Marcelo\rootfiles>adb shell
$ rm -r /data/local/tmp
rm -r /data/local/tmp
$ mkdir /data/local/tmp
mkdir /data/local/tmp
$ exit
exit
c:\Users\Marcelo\rootfiles>adb push gingerbreak /data/local/tmp/gingerbreak
864 KB/s (16830 bytes in 0.019s)
c:\Users\Marcelo\rootfiles>adb push su /data/local/tmp/su
1221 KB/s (26264 bytes in 0.021s)
c:\Users\Marcelo\rootfiles>adb push busybox /data/local/tmp/busybox
1765 KB/s (1926944 bytes in 1.066s)
c:\Users\Marcelo\rootfiles>adb push Superuser.apk /data/local/tmp/Superuser.apk
906 KB/s (94728 bytes in 0.102s)
c:\Users\Marcelo\rootfiles>adb shell
$ cd /data/local/tmp
cd /data/local/tmp
$ chmod 777 /data/local/tmp/*
chmod 777 /data/local/tmp/*
$ ./gingerbreak
./gingerbreak
[**] Gingerbreak/Honeybomb -- android 2.[2,3], 3.0 softbreak
[**] (C) 2010-2011 The Android Exploid Crew. All rights reserved.
[**] Kudos to jenzi, the #brownpants-party, the Open Source folks,
[**] Zynamics for ARM skills and Onkel Budi
[**] donate to
7-4-3-C@web.de if you like
[**] Exploit may take a while!
[+] Detected Froyo!
[+] Found system: 0xafd14129 strcmp: 0xafd1cb9d
[+] Found PT_DYNAMIC of size 264 (33 entries)
[+] Found GOT: 0x000142a8
[+] Using device /devices/platform/goldfish_mmc.0
[*] vold: 0066 GOT start: 0x000142a8 GOT end: 0x000142e8