The Motorola Droid 3 has been rooted, and while we expect root to happen for most Android phones, there are a couple things here that we want to talk about. To start at the beginning, the goal of any project to exploit or root an Android phone is to get the permissions you want, where you want them. Once you have administrative permissions on a folder you can also write to, you're pretty much set. Security researcher Dan Rosenberg found a fairly easy method to do just that, and we now have a shell root via ADB with no third-party files being used. This means no worries about sketchy files that have been through numerous hands, doing lord knows what when you run them.
To make things even better, Dan has outlined exactly what he did, why he did it, and how you can do it as well. When you read it, it seems so simple, but it's apparent that a lot of research went into this and it's refreshing to see the method presented in such an open way. Yes, this means that the carriers can patch it quickly, but for the vast majority of users that won't be rooting their phone this is a good thing. Dan, we tip our hat to you and there's a standing offer of a frosty beverage or three should you even run across any of us here at AC.
Now, for the method -- you'll need to have ADB running, and be confident in your ability to run a few commands from the command line or terminal. And be aware that this is the first step only, and you'll only have root via the shell. Next, someone will need to build a few files to inject so that you have root on the device itself, and I'm sure at least a few are hard at it. You can (and should) check out the source link for the full directions, as well as the rhyme and reason behind the method.
Update: Gerald wrote in to let us know he has posted up the files and method to get root on the device itself working, you can find that here. And we've received numerous reports about a one click method posted by the fellows at rootzwiki. Go get your root on!
Source and method: VulnFactory blog
- Related devices:
- Filed under: