Well known developer Chainfire at XDA brings root to another device today, adding Samsung’s Galaxy S II to the list of 3rd-party developer unlocked devices. This comes hot on the heels of the Gingerbreak exploit, which can be used on a wide range of Android devices, also developed in part by CF.

Superuser access is acheived by using the Samsung flashing utility “Odin” to load a custom re-packaged kernel onto the phone, then booting up. Once booted, the kernel allows root access via the “adb” program, a part of the Android SDK. Simply typing “adb root” at the command line restarts adb in root mode, and allows full system access through “adb shell”

Root access granted by this method is not permanent – it requires further steps such as the manual loading of su, busybox, and Superuser.apk to enable permanent superuser access. Notably, Chainfire was able to re-package this modified kernel by using methods effective on the Galaxy S series of devices, without an actual SGS II to develop/test with.

Source: XDA

Thanks: Anonymous Coward

You May Also Like

Motorola says ‘lumps and bumps are normal’ on Moto RAZR’s display

Motorola emphasizes that the screen on the RAZR is made to bend, which means users should not worry too much about bumps and bends.

OnePlus reveals camera upgrades coming to its current and upcoming smartphones

OnePlus recently conducted an Open Ears Forum in New York where it took feedback from its community on the topic of cameras.

Samsung Galaxy M21 spotted on Geekbench with Exynos 9611 and 4GB RAM

Samsung is all apparently developing a successor to the affordable Galaxy M20, and it might debut as the Galaxy M21, according to reports.