Change emmc Chip to achieve root? - Fire General

If i were to change the emmc chip on my 7th gen 7" and 8" fire tablets for an emmc chip with vanilla Android am i likely to run into any issues?

J_IO_B said:
If i were to change the emmc chip on my 7th gen 7" and 8" fire tablets for an emmc chip with vanilla Android am i likely to run into any issues?
Click to expand...
Click to collapse
yes, you will run into many problems. 1st problem is desoldering it. 2nd problem if desoldering wasn't a dead end, finding a preprogrammed emmc chip that will work for it is pretty much impossible. but don't worry there is a new exploit for all MediaTek processors that will let you flash partitions in boot rom mode! it's only a matter of time for this device to get hacked.

ANDROID2468 said:
yes, you will run into many problems. 1st problem is desoldering it. 2nd problem if desoldering wasn't a dead end, finding a preprogrammed emmc chip that will work for it is pretty much impossible. but don't worry there is a new exploit for all MediaTek processors that will let you flash partitions in boot rom mode! it's only a matter of time for this device to get hacked.
Click to expand...
Click to collapse
Thanks for the reply if i did have the ability to desolder/resoldrer and program the emmc chip do you know what i should program it with? a compatible image? Or is it this that isn't available?
The exploit sounds even more promising do you know where i can find out more?

J_IO_B said:
Thanks for the reply if i did have the ability to desolder/resoldrer and program the emmc chip do you know what i should program it with? a compatible image? Or is it this that isn't available?
The exploit sounds even more promising do you know where i can find out more?
Click to expand...
Click to collapse
I pach a system.img with root now I'm just waiting for a script to flash it!( The scripts use python and I'm kinda new to programming python) I requested on a different thread for the script...
So I wouldn't go with the desolder the emmc route because then you have to warty about soldier balls, bridges, killing you emmc chip with heat, etc.
Sent from my VS986 using XDA Labs

ANDROID2468 said:
I pach a system.img with root now I'm just waiting for a script to flash it!( The scripts use python and I'm kinda new to programming python) I requested on a different thread for the script...
So I wouldn't go with the desolder the emmc route because then you have to warty about soldier balls, bridges, killing you emmc chip with heat, etc.
Sent from my VS986 using XDA Labs
Click to expand...
Click to collapse
How did you get on?

J_IO_B said:
How did you get on?
Click to expand...
Click to collapse
if you short one of the pads under the sheld to ground you will be able to boot to boot rom mode. that's when you will run the script to that will decrypt the keys so you can flash anything from there.

Bit late but its kinda impossible to change emmc chips.
If you get past soldering you could replace emmc chips with one from an old broken fire
and maybe it will work then
But who knows

we already have full root and bootloader unlock for most of the fire devices now
check the relevant sub for your model
LOS (soon)

ANDROID2468 said:
if you short one of the pads under the sheld to ground you will be able to boot to boot rom mode. that's when you will run the script to that will decrypt the keys so you can flash anything from there.
Click to expand...
Click to collapse
Sorry for the hijack here, but do this work on Fire HD 8 5th Gen model?
Thanks!

mugorj said:
Sorry for the hijack here, but do this work on Fire HD 8 5th Gen model?
Thanks!
Click to expand...
Click to collapse
Yes, technically it will but this method is harder to do.
here is a more in-depth guide on this. But I would not use this method, it's complex.
About the bootloader unlock:
The explicit to unlock the bootloader hasn't been ported to your device (if it has, I can't find it on XDA). It's because this model isn't that common. I will help Root you device using this method but I'm not skilled enough to Port the bootloader unlock.

ANDROID2468 said:
Yes, technically it will but this method is harder to do.
here is a more in-depth guide on this. But I would not use this method, it's complex.
About the bootloader unlock:
The explicit to unlock the bootloader hasn't been ported to your device (if it has, I can't find it on XDA). It's because this model isn't that common. I will help Root you device using this method but I'm not skilled enough to Port the bootloader unlock.
Click to expand...
Click to collapse
@ANDROID2468:
Thank you very much for your help!
If I can achieve root access, I believe I'll be 97% happy. I have just managed to have another launcher working on my device with Launcher Hijack (just discovered that Amazon implemented a childish blocking by the app name), and the thing is flying! I'm much happier! The device is perfectly usable now!
If I just can uninstall some Amazon crap and have my stuff going, I'll be happy, even if it's still running FireOS underneath.
I'll read the topic you mentioned carefully. If I still need help, I'll politelly ask you for guidance.
Thanks again!

mugorj said:
@ANDROID2468:
Thank you very much for your help!
If I can achieve root access, I believe I'll be 97% happy. I have just managed to have another launcher working on my device with Launcher Hijack (just discovered that Amazon implemented a childish blocking by the app name), and the thing is flying! I'm much happier! The device is perfectly usable now!
If I just can uninstall some Amazon crap and have my stuff going, I'll be happy, even if it's still running FireOS underneath.
I'll read the topic you mentioned carefully. If I still need help, I'll politelly ask you for guidance.
Thanks again!
Click to expand...
Click to collapse
ok, first I need to know what version of fire os you are running.
Then, I need a picture of your board. you need to open your tablet and you need to take off the shield. here is an example (you have the 5th gen so the shield should just pop off):

mugorj said:
@ANDROID2468:
Thank you very much for your help!
If I can achieve root access, I believe I'll be 97% happy. I have just managed to have another launcher working on my device with Launcher Hijack (just discovered that Amazon implemented a childish blocking by the app name), and the thing is flying! I'm much happier! The device is perfectly usable now!
If I just can uninstall some Amazon crap and have my stuff going, I'll be happy, even if it's still running FireOS underneath.
I'll read the topic you mentioned carefully. If I still need help, I'll politelly ask you for guidance.
Thanks again!
Click to expand...
Click to collapse
sorry, I didn't read your message carefully. the post that I posted previously was about porting a root method used by the fire 7 (7th gen) which was used before the bootloader unlock was released(well the 5th gen was released at the time but not 7th gen ). that method is a lot easier to do and less likely to kill your device.

Do you have a link for the root method please?

laharl_22 said:
Do you have a link for the root method please?
Click to expand...
Click to collapse
do you have a hd8 5th gen? or something else?

Related

Briked Kindle with soupkit

Hi my kindle was soft brick and it just stayed in the boot section contniously for so i tried different methods so i came a cross the soup kit not knowing much about so i install the bootloader now it wont turn on any suggestion that will help a lot >< at this point i think its pretty much useless but hoping for some positive information ><
[Edit:] I just realized this was the KFHD thread. I'll pull the downloads until I get an MD5 check working.
I need to know, however, which SoupKit did you use? For the 1st gen KFs or the one with RootPlus
soupmagnet said:
I can assure you, the SoupKit itself didn't brick your Kindle. A bad bootloader flash did. And I can assure you, the SoupKit won't flash a bootloader that has an MD5 sum that is different from the original, which leaves one possible culprit...your computer. And yes, it can happen.
That being said, before you flash a bootloader using the SoupKit, you are presented with a message, warning you of the risks of flashing a boot loader and suggesting you flash it in recovery instead. You must confirm that you are aware of the risks before it will go any further, therefore you are the one who is ultimately responsible.
Now that we have that cleared up, there is hope for you. You'll need to usbboot and install a new bootloader using a combination of both the Firekit and the "shorting trick". I suggest you read their respective threads to get more information on how to use them.
Good luck, and if you run into trouble, I will be more than happy to help.
Click to expand...
Click to collapse
hahaha yeah Iam well responsible for those action XD thank you i will look into those things and thanks for offering your help i shall bug you every step on the way lol jk but yes some help would be greatly appreaciated >< any suggestion were should i start?
We're apparently messaging on top of each other...refer to my edit please.
XD yes its the KDFHD i dont know which one exatcly i had so i mesear it assuming it was the 8.9 but kinda thinking it says sd card but mine doesnt have and sd card it could be the the 7" any suggestions? and i used this one http://forum.xda-developers.com/showthread.php?t=1850038 from this thread
trunks_ss2 said:
XD yes its the KDFHD i dont know which one exatcly i had so i mesear it assuming it was the 8.9 but kinda thinking it says sd card but mine doesnt have and sd card it could be the the 7" any suggestions? and i used this one http://forum.xda-developers.com/showthread.php?t=1850038 from this thread
Click to expand...
Click to collapse
I just notice the big red signs that say do not use of kindle fire HD lol ooo geeez I eff up XD i guess the words werent big enough can it be fix?
trunks_ss2 said:
XD yes its the KDFHD i dont know which one exatcly i had so i mesear it assuming it was the 8.9 but kinda thinking it says sd card but mine doesnt have and sd card it could be the the 7" any suggestions? and i used this one http://forum.xda-developers.com/showthread.php?t=1850038 from this thread
Click to expand...
Click to collapse
I'm sorry to tell you, but that version is for 1st generation Kindle Fires only. There were warnings in the thread about not using it on second generation devices. I'm sad to say, but there isn't much you can do about it at this point.
If it's any consolation (though it probably won't be) I just put a bigger warning in the 1st generation SoupKit thread to try and prevent mishaps like this in the future.
soupmagnet said:
I'm sorry to tell you, but that version is for 1st generation Kindle Fires only. There were warnings in the thread about not using it on second generation devices. I'm sad to say, but there isn't much you can do about it at this point.
If it's any consolation (though it probably won't be) I just put a bigger warning in the 1st generation SoupKit thread to try and prevent mishaps like this in the future.
Click to expand...
Click to collapse
OOOooo okay well i guess thats settles that >< thank for the clearing all that for me

ROOT MASTER: Root kindle fire hdx7 with one click

Hello everyone. I am a kindle fire hdx user from China. We all waited your root method and turned out that we rooted first.
The method is very simple.
1. Install the attached software in your compurter, connect your device .(be sure you installed driver)The software will connect your device.
2. Click the low right button. Your device will be rebooted in five seconds. Root completed.
joetech1989 said:
Hello everyone. I am a kindle fire hdx user from China. We all waited your root method and turned out that we rooted first.
The method is very simple.
1. Install the attached software in your compurter, connect your device .(be sure you installed driver)The software will connect your device.
2. Click the low right button. Your device will be rebooted in five seconds. Root completed.
Click to expand...
Click to collapse
Can you show the source. I really don't trust this, if it works or not. Can we see the code. I put together code from other known Devs. The package seems shady, just saying. Anybody else install this?
Faznx92 said:
Can you show the source. I really don't trust this, if it works or not. Can we see the code. I put together code from other known Devs. The package seems shady, just saying. Anybody else install this?
Click to expand...
Click to collapse
It's a pretty popular rooting tool use among people how lack knowledge of Linux. Btw I rooted mine use the same tool, and I'm chinese too. We don't really know what exploit they use but it seems to work pretty well.
Sent from my KFTHWI using Tapatalk
wz7820431lb said:
It's a pretty popular rooting tool use among people how lack knowledge of Linux. Btw I rooted mine use the same tool, and I'm chinese too. We don't really know what exploit they use but it seems to work pretty well.
Sent from my KFTHWI using Tapatalk
Click to expand...
Click to collapse
I would like to know what exploit they used. Hold onto that for a future root. That is what I'm really interested in.
Faznx92 said:
Can you show the source. I really don't trust this, if it works or not. Can we see the code. I put together code from other known Devs. The package seems shady, just saying. Anybody else install this?
Click to expand...
Click to collapse
I didn't since this was the first post by someone just claiming it works without any source code or proof. I have to agree with you that this seems shady.
R1Mike said:
I didn't since this was the first post by someone just claiming it works without any source code or proof. I have to agree with you that this seems shady.
Click to expand...
Click to collapse
Either way I'm not install this to my computer. I really want to see what exploit they used. But yah, I don't know what this is. Better to be safe then sorry.:angel:
joetech1989 said:
Hello everyone. I am a kindle fire hdx user from China. We all waited your root method and turned out that we rooted first.
The method is very simple.
1. Install the attached software in your compurter, connect your device .(be sure you installed driver)The software will connect your device.
2. Click the low right button. Your device will be rebooted in five seconds. Root completed.
Click to expand...
Click to collapse
And doubt you rooted first since this suddenly appears 2 days after it was first rooted here on XDA from our great jcase.
Faznx92 said:
Can you show the source. I really don't trust this, if it works or not. Can we see the code. I put together code from other known Devs. The package seems shady, just saying. Anybody else install this?
Click to expand...
Click to collapse
I don't know how it works but it works. Show you the evidence.
Is this work for the model HDX 8.9" as well?
lanegan said:
Is this work for the model HDX 8.9" as well?
Click to expand...
Click to collapse
Just tested on HDX 7. Not suggest you to try.
joetech1989 said:
Just tested on HDX 7. Not suggest you to try.
Click to expand...
Click to collapse
If you can find who made this or what the exploit code is it may be a future rooting method.
Faznx92 said:
If you can find who made this or what the exploit code is it may be a future rooting method.
Click to expand...
Click to collapse
It's a very popular root tool in China that made by a company. I tested it OK and here to share with you. Can't get any code.
The best and quickest method to root.
joetech1989, Thank you, bro!!!
Your method really works fine.
Very easy and fast.
Equinox666 said:
joetech1989, Thank you, bro!!!
Your method really works fine.
Very easy and fast.
Click to expand...
Click to collapse
Can you please tell us your version? Are you on the latest version of hdx7? Give us more specific would be very helpful. Thanks bud!
andyt315 said:
Can you please tell us your version? Are you on the latest version of hdx7? Give us more specific would be very helpful. Thanks bud!
Click to expand...
Click to collapse
Current version: 13.3.1.0. At first it is necessary to include in settings Enable ADB, then to install adb drivers.
Seems sketchy. So seeing as you only have a few posts...it seems you just joined XDA developers. And you have a root tool but you cannot tell us more about it. I mean if it works then GREAT but most people would want to know what exactly it is that they are downloading..just saying. don't be offended.
equisbox said:
Seems sketchy. So seeing as you only have a few posts...it seems you just joined XDA developers. And you have a root tool but you cannot tell us more about it. I mean if it works then GREAT but most people would want to know what exactly it is that they are downloading..just saying. don't be offended.
Click to expand...
Click to collapse
This kind of reminds me of the whole fiasco with Kango root, which was secretly sending peoples IMEI numbers to a server in China, even though the dev claimed to be from Canada. It was a very easy to use program to root many different phones but was eventually pulled from XDA because of security concerns. It was/is sending 'sensitive' data without encrypting it and then also sent the IMEI as well. It also connected to the internet to download 'drivers' so a virus scan was not of much use for Kango Root. That is a completely separate program which was posted by a different XDA member.
Just to be clear... I am not at all inferring the original poster has malicious intent or has posted a malicious tool. I am merely explaining why some would view it with such skepticism especially in light of previous events. I don't yet own a Kindle Fire HDX, so, I don't have to make the difficult choice of choosing which way to root the device. Virus Total reports the files as being clean, but, that does not always mean it is safe, especially if something is downloaded once the file has been executed.
If you could shed some additional light on the tool it would likely help to put a lot of people's minds at ease.
joetech1989 said:
It's a very popular root tool in China that made by a company. I tested it OK and here to share with you. Can't get any code.
Click to expand...
Click to collapse
What is the company's name in China and do they have a webpage that we can see and get the root tool from?
Yes ,it works. maybe they use exploit we get it on XDA.
FYI : thus is just one of a few xda posts I've seen concerning vroot.... http://forum.xda-developers.com/showthread.php?t=2473354
Sent from my SCH-I545 using Tapatalk

How About Root?

I know it is still early, but any ideas how to get root?
I just tried the following method without success (check details in the original thread: http://forum.xda-developers.com/android/development/intel-android-devices-root-temp-cwm-t2975096)
maybe someone else might try it, to double check.
furthermore, I'm hoping to get an answer from the author / developer if it might be possible in the future.
ok, seems like the method above is outdated!
Hey guys.
And what's about this?
http://arstechnica.com/security/201...ed-by-most-serious-linux-escalation-bug-ever/
Where do we get this tool. Great and easy!
arohrmann said:
Hey guys.
And what's about this?
http://arstechnica.com/security/201...ed-by-most-serious-linux-escalation-bug-ever/
Where do we get this tool. Great and easy!
Click to expand...
Click to collapse
looks promising, but don't think it is so easy. take a look here:
http://forum.xda-developers.com/general/security/dirty-cow-t3484879
people there are already working on it, but run into problems
Dirty c0w and INTEL
danjac said:
looks promising, but don't think it is so easy. take a look here:
http://forum.xda-developers.com/general/security/dirty-cow-t3484879
people there are already working on it, but run into problems
Click to expand...
Click to collapse
To whom it may concern (my English is not so good you should just try to get the meaning from the context )
I don't think this is a valid way for the Yoga Book. I compiled the dirty cow Exploit for the Yoga Book but it does not work. I used this code to execute it on the Yoga Book : https://github.com/timwr/CVE-2016-5195/blob/master/dirtycow.c .However this does not work on the Yoga Book : It will either not trigger the expected result to be able to overwrite an RO file or the yoga book just reboots.
There are a couple of developers also confirming that the existing android dirty c0w exploit code does not work on their intel tablets.
So we need somebody with more skills to modify the exploit c code for the intel tablets or another exploit. .....
If somebody has a link to an intel exploit I will test that.
reiter123 said:
To whom it may concern (my English is not so good you should just try to get the meaning from the context )
I don't think this is a valid way for the Yoga Book. I compiled the dirty cow Exploit for the Yoga Book but it does not work. I used this code to execute it on the Yoga Book : https://github.com/timwr/CVE-2016-5195/blob/master/dirtycow.c .However this does not work on the Yoga Book : It will either not trigger the expected result to be able to overwrite an RO file or the yoga book just reboots.
There are a couple of developers also confirming that the existing android dirty c0w exploit code does not work on their intel tablets.
So we need somebody with more skills to modify the exploit c code for the intel tablets or another exploit. .....
If somebody has a link to an intel exploit I will test that.
Click to expand...
Click to collapse
does anyone know if it is possible to dump the bootloader and or recovery without root access?
it would greatly help to build a custom rom.
i was searching a lot but couldn't find an answer or a way how to do it.
or is there any other source out there, where we could get a full stock rom???
Ok, now that I got hands on a flashable stock rom update with the images of recovery and boot partition I 'dare' to port cwm. Honestly, I've never done sth like that and my experiences are litte, so my hopes are actually low.
If anyone can and/or would like to help, this would be highly appreciated.
If it works, it will definitely take its time.
Hope for the the best and plan for the worst.
Cheers
danjac said:
Ok, now that I got hands on a flashable stock rom update with the images of recovery and boot partition I 'dare' to port cwm. Honestly, I've never done sth like that and my experiences are litte, so my hopes are actually low.
If anyone can and/or would like to help, this would be highly appreciated.
If it works, it will definitely take its time.
Hope for the the best and plan for the worst.
Cheers
Click to expand...
Click to collapse
Good Luck and Thanks!
... is there anyone rooted this Tablet?
Sent from my XT1580 using XDA-Developers mobile app
arohrmann said:
... is there anyone rooted this Tablet?
Sent from my XT1580 using XDA-Developers mobile app
Click to expand...
Click to collapse
Not yet that I've seen....
hey there,
looks like I got TWRP working. It's definitely an amateur's work and I'm still not sure if everything works as expected, but so far it looks quite promising.
By now I was able to to backup and restore.
At the moment I'm trying to flash su - but without luck so far, it either hangs with a black screen when booting or root isn't installed properly.
So, I will play around with it for a while and report back soon.
Keep your fingers crossed.
danjac said:
hey there,
looks like I got TWRP working. It's definitely an amateur's work and I'm still not sure if everything works as expected, but so far it looks quite promising.
By now I was able to to backup and restore.
At the moment I'm trying to flash su - but without luck so far, it either hangs with a black screen when booting or root isn't installed properly.
So, I will play around with it for a while and report back soon.
Keep your fingers crossed.
Click to expand...
Click to collapse
Waiting for the good news ~
---------- Post added at 07:06 PM ---------- Previous post was at 06:24 PM ----------
danjac said:
Ok, now that I got hands on a flashable stock rom update with the images of recovery and boot partition I 'dare' to port cwm. Honestly, I've never done sth like that and my experiences are litte, so my hopes are actually low.
If anyone can and/or would like to help, this would be highly appreciated.
If it works, it will definitely take its time.
Hope for the the best and plan for the worst.
Cheers
Click to expand...
Click to collapse
Can you share the stock rom to me ? Plz
danjac said:
Ok, now that I got hands on a flashable stock rom update with the images of recovery and boot partition I 'dare' to port cwm. Honestly, I've never done sth like that and my experiences are litte, so my hopes are actually low.
If anyone can and/or would like to help, this would be highly appreciated.
If it works, it will definitely take its time.
Hope for the the best and plan for the worst.
Cheers
Click to expand...
Click to collapse
it's not cwm but twrp instead...see new thread

Unlock the Bootloader! 5.3.2.1 Root! Roms! This is crazy, and needs more attention!

Ever since I got my Fire Tablet I've been on 5.3.2.1, what a shame. However, Now you can unlock the bootloader, and install a custom Rom!
Note- This isn't my work. but I want to spread attention!
https://forum.xda-developers.com/amazon-fire/development/unlock-fire-t3899860
I downgraded the tablet from 5.6 to 5.0 (and it bricked it, however it's not over)
Boot into their BootRom mode, and while in the brick, it will boot you into TWRP, and hack your bootloader to be unlocked. (Your not bricked anymore... this can also be used to unbrick you device!) With newer gen models you might have you short pins or solder. I tested my sisters tablet which was on FireOS 5.6 and I just installed a custom rom on it... AOSP Nexus Lollipop.
This is an amazing discovery, though I take no credit for it, I want to spread attention.
Cheers!
savvytechwinner said:
Ever since I got my Fire Tablet I've been on 5.3.2.1, what a shame. However, Now you can unlock the bootloader, and install a custom Rom!
....
Click to expand...
Click to collapse
Is your device Fire 7, 2015 (5th Generation) ?
I am looking for a SOFTWARE-ONLY Root&Rom for Fire 7, 2017 (7th Generation).
Mine was a Fire 7 5th gen and this worked fine.
You'll think the tablet is dead after you flash the rom, but it'll get captured by the process.
I believe it also works for 7th Gen, but read the thread carefully and you may also need a different version of the rom for flashing.
Also thinking very deam hard bout trying this with my ford - Asking me if this ll be availabe on duglas (HD8)
Wagner.B said:
Also thinking very deam hard bout trying this with my ford - Asking me if this ll be availabe on duglas (HD8)
Click to expand...
Click to collapse
Believe this came from hd8,
Do not cross files between them. But the dev ported the needed binaries and adjusted any offsets .
Hold on, I'll update with confirmation to hd8 thread
EDIT update:
it was on the HD8 karnak (2018) model only
https://forum.xda-developers.com/hd...fire-hd-8-2018-downgrade-unlock-root-t3894256
mrmazak said:
EDIT update:
it was on the HD8 karnak (2018) model only
https://forum.xda-developers.com/hd...fire-hd-8-2018-downgrade-unlock-root-t3894256
Click to expand...
Click to collapse
You know if this is the actual model which is sold now?
Would be a worth investment then.
Wagner.B said:
You know if this is the actual model which is sold now?
Would be a worth investment then.
Click to expand...
Click to collapse
Yes, it's the newest model. The Current hd10 is also unlockable without the shorting on the clk pin. The hd8 was easy to shirt the pins and run the script.

Onn 7" Gen 2 (100026191) dumping and development

I have recently rooted my Onn 7, and extracted the boot and recovery images.
(I accidentally deleted the boot image, but I still have one patched with Magisk, and the recovery image is still present.)
I want to get the entire system dumped, including the original system and boot partitions, which would require some help from other tablet owners (I'm broke right now).
I can walk you through the entire process of rooting the system, I just need willing participants.
(I could also use some help porting TWRP, since I have no idea how that works anymore.)
Hi, just got my hands on this device. I'd appreciate it if you can help me get my device rooted. I'm looking to remove some apps that came along with it. Thanks
strggdrive said:
Hi, just got my hands on this device. I'd appreciate it if you can help me get my device rooted. I'm looking to remove some apps that came along with it. Thanks
Click to expand...
Click to collapse
Do you want to do Magisk method or GSI method?
PseudoDistant said:
Do you want to do Magisk method or GSI method?
Click to expand...
Click to collapse
I'm not sure really, whichever is easier I think.
Discord - A New Way to Chat with Friends & Communities
Discord is the easiest way to communicate over voice, video, and text. Chat, hang out, and stay close with your friends and communities.
discord.gg
Actually just join here, I'll help you live.
strggdrive said:
I'm not sure really, whichever is easier I think.
Click to expand...
Click to collapse
Magisk, definitely.
PseudoDistant said:
Discord - A New Way to Chat with Friends & Communities
Discord is the easiest way to communicate over voice, video, and text. Chat, hang out, and stay close with your friends and communities.
discord.gg
Actually just join here, I'll help you live.
Click to expand...
Click to collapse
Hey I just got my hands on a 100026191 are you still looking for help? I have this 7in and an 8in 3rd gen that I'm working on currenty. Thanks!
dilo34 said:
Hey I just got my hands on a 100026191 are you still looking for help? I have this 7in and an 8in 3rd gen that I'm working on currenty. Thanks!
Click to expand...
Click to collapse
Yea, both are doable.
PseudoDistant said:
Yea, both are doable.
Click to expand...
Click to collapse
Can you give me information on how to root via the Magisk method please ?
LiftedByNature said:
Can you give me information on how to root via the Magisk method please ?
Click to expand...
Click to collapse
You need to dump your `boot.bin`, either from an OTA update, or from a temprooted system.
Hello, I have an Onn 7, Gen 3 that I just picked up. I found the files you posted in the other forum but am not sure how to build a TWRP based off of those. Help please
Im also looking for a root method for the Onn Surf 7 gen 2. I get that i need to use usb debugging to log the url for the ota update, however my unit came with android 11 go and says up to date when i check for updates after a factory reset. can you tell me what I've done wrong? also what program are you using to run adb logcat from PC?

Categories

Resources