Is there a way to backup the android phone firmware without root access?
I have read many article but most of them need root access.
Show the way, Please.
thantin said:
Is there a way to backup the android phone firmware without root access?
I have read many article but most of them need root access.
Show the way, Please.
Click to expand...
Click to collapse
you can use kies..kies is samsung official tool for up-to-date and backup device
As far as I'm concerned, there's no way to backup your firmware without root access.
This action is a quite low-level action because firmware is basically what runs on your device and no manufacturer would allow this without rooting.
Doubtful
You might be able to find some firmware online but it depends really some firmwares get leaked you might be lucky to be honest but it is doubtful.
thantin said:
Is there a way to backup the android phone firmware without root access?
I have read many article but most of them need root access.
Show the way, Please.
Click to expand...
Click to collapse
u can backup your ROM using adb
Check this guide:
http://forum.xda-developers.com/showthread.php?t=1420351
how can i make a copy of stock android version of my phone like that is in http://samsung-updates.com/ ?
Hi,
I just got my Note 3 and was annoyed by the hole knox issue so i started to read back & forward after a few hours i found this program called kingo which i liked cause i only had to install it and start the program and the rest was done for me by the program.
Here are the easy steps to rooting.
1. Install the Note 3 drivers on the PC "all i did was plug-in the phone and it was installed for me".
2. Install Kingo (LINKS REMOVED)
3. Open the program and follow the simple instructions on you monitor.
When it's done you are rooted and your knox will still be 0x0.
After this i used Odin to flash the TWRP 2.6.3.7 and the knox was still 0x0.
I then shut off the phone to reboot into TWRP and did a backup of the stock rom rooted. Once done backing up the rom i rebooted into download mode and noticed that it knox was changed to 0x1.
So if you want root on stock rom then this is the easiest solution but you wont get custom recovery nor custom roms without tripping the knox counter for now.
Great does it work with latest stock firmware mj7
Sent from my SM-N9005 using Tapatalk
Doesn't work with MJ7, as posted on their Facebook page.
I did this with MJ2
Zionator said:
I did this with MJ2
Click to expand...
Click to collapse
If you did not absolutely need a custom recovery/kernel you should have gone with URDLV and you could have kept knox 0x0
xclub_101 said:
If you did not absolutely need a custom recovery/kernel you should have gone with URDLV and you could have kept knox 0x0
Click to expand...
Click to collapse
I have no idea what you are talking about.
Zionator said:
Hi,
I just got my Note 3 and was annoyed by the hole knox issue so i started to read back & forward after a few hours i found this program called kingo which i liked cause i only had to install it and start the program and the rest was done for me by the program.
Here are the easy steps to rooting.
1. Install the Note 3 drivers on the PC "all i did was plug-in the phone and it was installed for me".
2. Install Kingo from here.
3. Open the program and follow the simple instructions on you monitor.
When it's done you are rooted and your knox will still be 0x0.
After this i used Odin to flash the TWRP 2.6.3.7 and the knox was still 0x0.
I then shut off the phone to reboot into TWRP and did a backup of the stock rom rooted. Once done backing up the rom i rebooted into download mode and noticed that it knox was changed to 0x1.
So if you want root on stock rom then this is the easiest solution but you wont get custom recovery nor custom roms without tripping the knox counter for now.
Click to expand...
Click to collapse
As far as I know Kingo is banned on XDA forums until further notice, unless they finally got approved? Not to get you paranoid or anything, but suspicious communications with a chinese server were part of the rooting method you just used.
blumsen said:
As far as I know Kingo is banned on XDA forums until further notice, unless they finally got approved? Not to get you paranoid or anything, but suspicious communications with a chinese server were part of the rooting method you just used.
Click to expand...
Click to collapse
Why is it suspicious ? I mean it's most likely downloading what's needed for rooting and bypassing the knox system.
If it was banned then there should be a post so others know about it.
I am using Zonealarm firewall and i wasn't made aware of any suspicious behaviour.
Zionator said:
Why is it suspicious ? I mean it's most likely downloading what's needed for rooting and bypassing the knox system.
If it was banned then there should be a post so others know about it.
I am using Zonealarm firewall and i wasn't made aware of any suspicious behaviour.
Click to expand...
Click to collapse
It was suspected of sending your IMEI #. Don't know the details.....
Zionator said:
Why is it suspicious ? I mean it's most likely downloading what's needed for rooting and bypassing the knox system.
If it was banned then there should be a post so others know about it.
I am using Zonealarm firewall and i wasn't made aware of any suspicious behaviour.
Click to expand...
Click to collapse
1. It is suspicious because nobody knows who Kingo are. It is suspicious because the process is not transparent and it was not known what kind of information is collected from your device (or why) and what information is received (and possibly installed on your PC/ device). The exploit that they use for rooting is also kept secret. The server's IP they use is chinese. Some of the information they collect is arguably not necessary (for example your device's IMEI). The communication with Kingo is over a facebook page. Hmm.. can't think of more suspicious things right now, but that is plenty I think
2. "It is most likely just.." yes that is true. and for 99% of users that is good enough. Myself, I will lose my job if my clients/ employers find such a huge security hole which I am aware of and ignore. But then again they also expect me to never get near the WWW with my work phone or computer, I am not allowed to have a wifi module in my work laptop! You can see why a "probably just a harmless connection to China" is just not good enough in some situations.
3. If you do a search on XDA for Kingo, you will see that all threads were closed by admins.
4. Time for you to get a new firewall, or tinker with the settings!
Zionator said:
I have no idea what you are talking about.
Click to expand...
Click to collapse
With firmware before MJ3 there is a separate method called Universal Root De La Vega (URDLV) which is a lot more transparent and which (as long as you keep updating with Mobile Odin Pro and you do not change stock kernel and stock recovery) is giving you full root while keeping your Knox 0x0 (if you had it 0x0 before URDLV).
xclub_101 said:
With firmware before MJ3 there is a separate method called Universal Root De La Vega (URDLV) which is a lot more transparent and which (as long as you keep updating with Mobile Odin Pro and you do not change stock kernel and stock recovery) is giving you full root while keeping your Knox 0x0 (if you had it 0x0 before URDLV).
Click to expand...
Click to collapse
Oh ok but i have already flashed a custom recovery and rom. To hell with the warranty. I have never liked any stock roms and i like my freedom so my knox will most likely look like 0x2 now.
Kingo : Well if it's that bad then i am sure the moderators will close this and had i known this was the issue then i wouldn't have made this thread. However i would still have used this method if i knew this before as i never stay on stock rom and after finding out about the stupid chip that cant be recoded i didn't wanna wait for someone to come with a solution in one years time so i flashed the rom and recovery and now enjoying the phone
So if the Kingo really is that bad it has been wiped from my phone when i flashed a new rom.
Does not belong in Original Development, you did not create Kingo.
Moved to General
Use at your own risk. Rooting process has been known to collect and transmit IMEI and Serial numbers to China
FNSM
Before I even read the posts and start asking questions, I would like to know one thing. That is what does that United Arab Emirates mean in the pic below, its my screen after entering "About"
and can I root my device without any sort of issues?
iTTi said:
Before I even read the posts and start asking questions, I would like to know one thing. That is what does that United Arab Emirates mean in the pic below, its my screen after entering "About"
and can I root my device without any sort of issues?
Click to expand...
Click to collapse
http://www.tra.gov.ae/mynumber.php
Regardless of TRA ID - at this point you can not root MJ7 and keep knox 0x0.
kennyglass123 said:
Does not belong in Original Development, you did not create Kingo.
Moved to General
Use at your own risk. Rooting process has been known to collect and transmit IMEI and Serial numbers to China
FNSM
Click to expand...
Click to collapse
Just FYI - but Kingo stopped collecting the IMEI numbers a few versions ago.
mvansomeren said:
Just FYI - but Kingo stopped collecting the IMEI numbers a few versions ago.
Click to expand...
Click to collapse
That is great news! Our security expert has not been available to confirm this and Kingo has not sent us any correspondence to notify us of that. Has anyone confirmed this by recording data traffic while rooting?
Ok i have been reading around the net and all the reported security issues comes back to XDA.
wmshua.com is the site the connection is sent out to but is it possible that the app connects to their servers only in order to download the appropriate phone/device drivers.
On there web site under F.A.Q's
Q. Why don't you publish your source code?
A1. We kind of hope, in the future, Kingo Android Root could generate revenue to support our staff (STILL FREE FOR USERS). We all know that, in the long run, interest alone cannot make a living. To develop better software, we need to be financially motivated aside from being driven by passion.
A2. We manage to obtain root privilege of Android by exploiting certain undisclosed vulnerabilities, which we believe would be patched in no time once made public. And that would dysfunction this software that we've worked so hard for.
Click to expand...
Click to collapse
However it pushes Chainfires SuperSU to the device's and apparently they didn't ask him for his permission to use his work.
All in all i don't think isn't a matter of security issue anymore but more likely a matter of hard fellings that they stole Chainfires SuperSU to use in there app without asking him.
Correct me if i am wrong ?
xclub_101 said:
http://www.tra.gov.ae/mynumber.php
Regardless of TRA ID - at this point you can not root MJ7 and keep knox 0x0.
Click to expand...
Click to collapse
Knox 0x0 is the warranty thingy right? I have no warranty. So whats next?
xclub_101 said:
http://www.tra.gov.ae/mynumber.php
Regardless of TRA ID - at this point you can not root MJ7 and keep knox 0x0.
Click to expand...
Click to collapse
Is it not possible to root MJ7 using knigo! or rooting MJ7 using kingo will trigger knox ?
I NEED HELP , It is Not a HOW TO , My Question is How to Do It ?
My Device: [Not Rooted]
Moto G - XT 1033
Android 5.1
+
Android Security Patch Level : 2016-03-01
System Version:
221.201.2.falcon_umtsds.AsiaRetail.en.03
My Primary Aim:
Do a Temp Root (Temporary Root - Which Reverts back to Non Rooted when Rebooted)
Take Titanium Backups
Want to give Lucky Patcher more freedom and root access.
Till Now I tried to Root Using the following
---------------------------------------------------------------------------------------------------------------------------------
Framaroot
http://forum.xda-developers.com/apps/framaroot/root-framaroot-one-click-apk-to-root-t2130276
Z4root
http://forum.xda-developers.com/showthread.php?t=833953
KingoRoot - Tried 3 Times
https://www.kingoapp.com/
TowelRoot
https://towelroot.com/
KingRoot - Tried 2 Times - It Rebooted my Device Though but without any rooting success .
https://kingroot.net/
---------------------------------------------------------------------------------------------------------------------------------
All of the Above failed to Root my Device
Questions:
Are there any other tools for Temp Root which would be applicable to me ?
Do you guys have any solutions to achieve Temp Root ?
Any Other Apps that can help me here ?
IMPORTANT:
I dont want to lose any data at present , thats why i am not doing full permanent root because flashing requires a full smartphone format .
I am going to take backups first so i can restore them after i Permanent Root it .
Thats the reason of Wanting Temp Root .
Later Plan:
I am planning to do a Full Bootloader Unlock and Permanent Root Later On , Now
I need to learn About the terms and know more about them: (i keep seeing these terms in most of the rooting guides)
Flashing , ODIN flash , Knox , Recovery etc
If you guys have a Tutorial somewhere for my build and device , feel free to let me know about it .
Does XDA does not have users anymore ?
Perhaps the Title is Misleading People !
Help is Required Please
So you often see coverage in the media about security bugs in Android, we saw quite a few cases in 2016. A lot of it is saying Android is insecure, your data isn't safe etc. Yet none of these 'exploits' or bugs seem to be used to help us get root access.
For example I want to root a family members Xperia M4 (locked bootloader) and there's a root method for 5.1 (although it does twrp as well which I don't want) but the Marshmallow firmware still has no root even though it is vulnerable to quadrooter and other exploits. I've also had a so far impossible challenge to root my Polaroid (RK3188) tablet on 4.4.
I'm just curious why we have multiple exploits but no-one has managed to make a root method or tool to actually use them?
This applies to lots of other phones as well, recent exploits include:
Quadrooter
Dirty Cow
Rowhammer
Hiee Guys ! I have used lots of android phones since 10 years and also familiar with them . I always try to root every phone but a problem is that every android phone cannot be rooted . So, please anyone tell me that how i can make root for any device and how i can make twrp for any device .
Thank You in Advance......
As far as compiling TWRP, you can start with this thread. Any device such as pixels upgraded to A10 don't have TWRP so because recovery has changed drastically and development of TWRP had not yet caught up.
Root is available for any device that is rootable. Magisk does a pretty good job of covering the bases and is under active development so properly reported issues are generally addressed.
Finding an exploit to be able to root a device is a different matter. Some, like pixels, are straightforward to root since if bought from Google (not a carrier directly) they have unlockable bootloaders allowing the installation of non-stock images. On a device that does not allow the bootloader to be unlocked, an exploit to achieve root must be found. That is often the issue combined with many of these devices do not attract developers to purchase them and thus no attempts are made.
Animesh._.Mamgain said:
Hiee Guys ! I have used lots of android phones since 10 years and also familiar with them . I always try to root every phone but a problem is that every android phone cannot be rooted . So, please anyone tell me that how i can make root for any device and how i can make twrp for any device .
Thank You in Advance......
Click to expand...
Click to collapse
If the device is a device that has a locked bootloader that can not be unlocked, you will not be able to use TWRP. These devices can only be rooted if there is a rooting app or rooting program available for PC or android that has an exploit that works on the device.
If the bootloader is locked, you won't be able to install TWRP or use TWRP to root the device and you will not be able to flash a Magisk patched boot.img to achieve root.
If there are no exploits available that are proven to work on the device, you won't be able to root the device.
Sent from my SM-S767VL using Tapatalk