Ace Advanced Hack Kit [Linux/OSX/Windows] attn1 2011
___________________________
MAIN MENU | |
| Only ONE Step to: |
1 - Hack Ace <----------------------------+ * S-OFF |
| * SIM Unlock |
2 - DONATE (Encouraged, but optional) | * SuperCID |
http://psas.revskills.de/?q=goldcard | * Root |
http://www.eff.org/ | * Busybox |
| * ClockworkMod |
**********************************************************************
o - Options Menu (Return to Stock, Flash radios, etc)
**********************************************************************
t - Toggle Flash Method - current method is fastbootRUU
*********************************************************************
q - Quit
[Select and press Enter]1
* server not running *
347 KB/s (4359771 bytes in 12.267s)
pkg: /data/local/tmp/stericson.busybox-1.apk
Success
234 KB/s (19240 bytes in 0.080s)
372 KB/s (4564992 bytes in 11.957s)
367 KB/s (3686400 bytes in 9.794s)
360 KB/s (557962 bytes in 1.512s)
318 KB/s (9796 bytes in 0.030s)
193 KB/s (15837 bytes in 0.080s)
354 KB/s (134401 bytes in 0.370s)
227 KB/s (13968 bytes in 0.060s)
ro.build.version.release=2.3.3
Setting up for Gingerbread restore...
326 KB/s (2801664 bytes in 8.382s)
156 KB/s (2830336 bytes in 17.685s)
199 KB/s (285981 bytes in 1.402s)
172 KB/s (285981 bytes in 1.622s)
1 Datei(en) kopiert.
Linux version 2.6.35.10-gd2564fb (htc-kernel@and18-2) (gcc version 4.4.0 (GCC) )
#1 PREEMPT Thu Jun 9 14:20:29 CST 2011
Kernel version is Gingerbread... Using fre3vo to temproot...
fre3vo by #teamwin
Please wait...
Attempting to modify ro.secure property...
fb_fix_screeninfo:
id: msmfb
smem_start: 802160640
smem_len: 3145728
type: 0
type_aux: 0
visual: 2
xpanstep: 0
ypanstep: 1
line_length: 1920
mmio_start: 0
accel: 0
fb_var_screeninfo:
xres: 480
yres: 800
xres_virtual: 480
yres_virtual: 1600
xoffset: 0
yoffset: 0
bits_per_pixel: 32
activate: 16
height: 106
width: 62
rotate: 0
grayscale: 0
nonstd: 0
accel_flags: 0
pixclock: 0
left_margin: 0
right_margin: 0
upper_margin: 0
lower_margin: 0
hsync_len: 0
vsync_len: 0
sync: 0
vmode: 0
Buffer offset: 00000000
Buffer size: 8192
Scanning region faa90000...
Scanning region fab80000...
Scanning region fac70000...
Scanning region fad60000...
Scanning region fae50000...
Scanning region faf40000...
Scanning region fb030000...
Scanning region fb120000...
Scanning region fb210000...
Scanning region fb300000...
Scanning region fb3f0000...
Scanning region fb4e0000...
Scanning region fb5d0000...
Scanning region fb6c0000...
Scanning region fb7b0000...
Scanning region fb8a0000...
Scanning region fb990000...
Scanning region fba80000...
Scanning region fbb70000...
Potential exploit area found at address fbb80e00:200.
Exploiting device...
* server not running *
HTC android goldcard tool Copyright (C) 2011, Wayne D. Hoxsie Jr.
Original code by B. Kerler. Special thanks to ATTN1 and the XDA team.
Donations can be made to the Electronic Frontier Foundation:
http://www.eff.org/
or to B. Kerler:
http://psas.revskills.de/
0+1 records in
0+1 records out
384 bytes transferred in 0.175 secs (2194 bytes/sec)
--set_version set. VERSION will be changed to: 1.31.405.6
Patching and backing up partition 17...
* server not running *
Starting update process....
error: device not found
< waiting for device >