How to get root privileges through ADB (Android web box and smart TV common)
Android system rom inside the main three files: boot.img, system.img, userdata.img
Which boot.img stored the kernel and Android system configuration information, such as the android system folder read and write permissions, adb permissions. So if you want to modify the adb root privileges, modify the corresponding boot.img place on the line.
System.img is stored in the system's various libraries, system pre-installed app.
Userdata.img is the user's configuration information.
This article describes how to unlock the boot.img file and modify the corresponding file so that the adb login is root.
use tools:
Bootimg.exe is often used to unpack boot.img, recovery.img, and so on.
Brief process:
1. Unpack boot.img
Command: bootimg --unpack-bootimg
Note: boot.img should be in the same directory as bootimg.exe.
Unpack ramdisk.gz (obtained from boot.img unpack)
Command: bootimg --unpack-ramdisk
Note: The directory initrd is generated, which contains various executable programs and drivers. Modify the file default.prop in this directory. Set ro.secure=0 to turn off protection.
3. Package ramdisk.gz
Command: bootimg --repack-ramdisk
Note: The cpiolist.txt and initrd directories must exist in the current directory.
4. Package boot.img
Command: bootimg --repack-bootimg
5. Brush the boot.img and test it on a PC.
Finally, let's remind you that ROOT is risky and need to be cautious! !
Android system rom inside the main three files: boot.img, system.img, userdata.img
Which boot.img stored the kernel and Android system configuration information, such as the android system folder read and write permissions, adb permissions. So if you want to modify the adb root privileges, modify the corresponding boot.img place on the line.
System.img is stored in the system's various libraries, system pre-installed app.
Userdata.img is the user's configuration information.
This article describes how to unlock the boot.img file and modify the corresponding file so that the adb login is root.
use tools:
Bootimg.exe is often used to unpack boot.img, recovery.img, and so on.
Brief process:
1. Unpack boot.img
Command: bootimg --unpack-bootimg
Note: boot.img should be in the same directory as bootimg.exe.
Unpack ramdisk.gz (obtained from boot.img unpack)
Command: bootimg --unpack-ramdisk
Note: The directory initrd is generated, which contains various executable programs and drivers. Modify the file default.prop in this directory. Set ro.secure=0 to turn off protection.
3. Package ramdisk.gz
Command: bootimg --repack-ramdisk
Note: The cpiolist.txt and initrd directories must exist in the current directory.
4. Package boot.img
Command: bootimg --repack-bootimg
5. Brush the boot.img and test it on a PC.
Finally, let's remind you that ROOT is risky and need to be cautious! !
Zinc aluminum alloy wire, zinc is the matrix, through different aluminum content to meet the needs of different customers, and the use of advanced production technology, strict quality control, surface and inner quality is good and stable, with good mechanical properties. Using in film capacitor surface spray
Zinc Aluminum Alloy Wire,Blasting Materials,Anti-Corrosion Spraying Material,Ductile Iron Pipe
Shaoxing Tianlong Tin Materials Co.,Ltd. , https://www.tianlongspray.com