Here you will find how to ROOT your Android phone or tablet with Exynos Abuse.
Steps of the rooting method exynos abuse
- Download Exynos Abuse -v1.40.apk
- If you have downloaded the apk on your pc, connect the device to your PC and copy it into the SD card. If you have downloaded it directly on the device, go to step 3
- Make sure that this enabled the resources of other platforms apart from Google Play. You can look at the following path: Menu Settings Unknown sources (ON)
- After this is done, use any File Manager t(Astro File Manager, ES File Explorer,Solid Explorer,…) to install the file. You can install any file manager from Google Play.
- From your device, click on the Exynos Abuse -v1.40.apk file and then follow all the on-screen instructions you see.
- Once the app is installed on your phone, launch Exynos Abuse -v1.40 app and when it will be opened, click on the “Root” button in the application.
- Wait a few minutes for the process to finish.
- If you want to check if you are already root or superuser in your Android phone or tablet you can download HowToRoot app from Google Play Store and click over the padlock in the top-right of the screen. It will show you a message about if your device is rooted or not.
Remember, you must root your device at your own risk.
Other important informations to read before rooting
Please, note that patching the exploit may break camera functionality, depending on the device and firmware. Also note that if you use the patch method without rooting, or keep enabled “patching the exploit at boot” when unrooting, you need an alternate method to re-root the device to disable this feature (like CF-Auto-Root) – you cannot use Exynos Abuse to do this since it patched the exploit. Unlike other patch authors, it does not believe in keeping an invisible rooted process running in the background while pretending you aren’t rooted, to be able to unpatch in this way.
While the exploit patches work (aside from possibly disabling your camera), these are more work than actual fixes. A proper patch would be a kernel fix, either from a third party or Samsung themselves (hopefully one day…)
The exploit is used by this APK in unmodified form. You should be very worried of this exploit – any app can use it to gain root without asking and without any permissions on a vulnerable device. Let’s hope for some fixes ASAP !
If your camera keeps working, depends on your device/firmware combination. Affected are mostly the SGS3. But there are good news too, there is a potential fix here: http://forum.xda-developers.com/show….php?t=2052675 SGS3 I9300 ONLY.
It seems to work for a number of people. It replaces some system libraries with libraries from a different firmware version that does not rely on /dev/exynos-mem. Do not attempt this unless your camera actually breaks due to the exploit. And beware, it may cause you to have to reflash your firmware. Also beware that, even though this change will not prevent OTAs from downloading, it can possibly prevent OTAs from flashing succesfully.
Using this patch may turn your device status into modified. There’s not really a proper solution to that at the moment, but you can restore status by removing the patch (and SuperSU) again and rebooting your phone. This will however leave you unprotected again. Doing all sorts of weird stuff (like, for example, wiping data) to get rid of this modified status while you’re still have the patch applied at boot or keep SuperSU around, is an exercise in futility. If you want to go ahead and do this, that is fine, but do not litter my thread with your comments. Because eventually, the modified status is likely to return
Hexamob is not responsible for any damages caused directly or indirectly by a rooting method. Any action for rooting your device is done it only under your responsibility.
We recommend that you read all the instructions related to each root method and follow them step by step as indicated by the developers. If you have any question or need support, on every page there are links to the developers of each method.
Android Rooting method: Exynos Abuse