Thats exactly the way rooting works you personally unleash a trojan into your system and gain access to your phone
Sent from my SCH-I400 using Tapatalk
Its only dangerous when someone else is the one using the exploit without your knowledge.
OK, Thanks..
So, I tried twice to walk through the rooting process. It never comes out of the shell. I waited 15 mins the first time, 10 mins the second. Any suggestions. (Besides locate the box and return it to the seller, cause I'm too dumb to own one!) ;-)
-------------------------------------------
C:\FascinateRoot_v02>adb devices
List of devices attached
I500eea3ab54 device
C:\FascinateRoot_v02>adb push rage.bin /data/local/tmp/rage.bin
19 KB/s (5392 bytes in 0.265s)
C:\FascinateRoot_v02>adb shell
$ cd /data/local/tmp
cd /data/local/tmp
$ chmod 0755 rage.bin
chmod 0755 rage.bin
$ ./rage.bin
./rage.bin
[*] CVE-2010-EASY Android local root exploit (C) 2010 by 743C
[*] checking NPROC limit ...
[+] RLIMIT_NPROC={3712, 3712}
[*] Searching for adb ...
[+] Found adb as PID 3006
[*] Spawning children. Dont type anything and wait for reset!
[*]
[*] If you like what we are doing you can send us PayPal money to
[*]
7-4-3-C@web.de so we can compensate time, effort and HW costs.
[*] If you are a company and feel like you profit from our work,
[*] we also accept donations > 1000 USD!
[*]
[*] adb connection will be reset. restart adb server on desktop and re-login.
$