Well known developer Chainfire at XDA brings root to another device today, adding Samsung’s Galaxy S II to the list of 3rd-party developer unlocked devices. This comes hot on the heels of the Gingerbreak exploit, which can be used on a wide range of Android devices, also developed in part by CF.

Superuser access is acheived by using the Samsung flashing utility “Odin” to load a custom re-packaged kernel onto the phone, then booting up. Once booted, the kernel allows root access via the “adb” program, a part of the Android SDK. Simply typing “adb root” at the command line restarts adb in root mode, and allows full system access through “adb shell”

Root access granted by this method is not permanent – it requires further steps such as the manual loading of su, busybox, and Superuser.apk to enable permanent superuser access. Notably, Chainfire was able to re-package this modified kernel by using methods effective on the Galaxy S series of devices, without an actual SGS II to develop/test with.

Source: XDA

Thanks: Anonymous Coward

You May Also Like
Huawei Mate 30 Pro review

Huawei Mate 30 Pro review: the best phone you can’t get, and that’s OK

In our Huawei Mate 30 Pro review we’re trying to answer the question of whether the phone can survive without Google support, and should you buy it?

Companies could soon get licenses to sell to Huawei

Good news for Huawei: In a recent Bloomberg interview, Commerce Secretary W. Ross said he was optimistic about reaching a “Phase One” China deal this month.

The upcoming Moto Razr has been spotted in the wild, with a huge chin

It seems that the new Moto Razr is already being caught in the wild, with a huge chin, and there’s a picture to prove it