Download sources:DOWNLOAD ExynosAbuse-v1.40.apk DOWNLOAD DRIVERS Remember, you must root your device at your own risk.
Steps method:1.- Download ExynosAbuse-v1.40.apk 2.- If you downloaded the apk on your pc connect the device to your PC and copy it into the SD card. if you have downloaded directly on the device to go to step 3 3.- Make sure that this enabled the resources of other platforms are google play. I can look at the following path: Menu> Settings> Unknown sources (ON) 4.- After this is done, use any File Manager t(Astro File Manager, ES File Explorer,Solid Explorer,…) to install the file. You can install any file manager from Google Play. 5.- From your device, click on the ExynosAbuse-v1.40.apk file and then follow all the on-screen instructions you see. 6.- Once the app is installed on your phone, launch ExynosAbuse-v1.40 app and when it will be opened click on the “Root” button in application. 7.- Once the app is installed on your phone, launch GingerBreak app and when it will be opened and click over Root device. 8.- Wait a few minutes for the process to finish.
Other important informations read before rooting:Please note that patching the exploit may break camera functionality, depending on device and firmware. Also note that if use the patch method without rooting, or keep patching the exploit at boot enabled when unrooting, you need an alternate method to re-root the device to disable this feature (like CF-Auto-Root) – you cannot use ExynosAbuse to do this since it patched the exploit. Unlike other patch authors, I do not believe in keeping an invisible rooted process running in the background while pretending you aren’t rooted, to be able to unpatch this way. While the exploit patches work (aside from possibly disabling your camera), these are more work-around than actual fixes. A proper patch would be a kernel fix, either from a third party or Samsung themselves (hopefully one day…) Exploit For more details on the exploit itself, see this thread: http://forum.xda-developers.com/show….php?t=2048511. The exploit is used by this APK in unmodified form. You should be very afraid of this exploit – any app can use it to gain root without asking and without any permissions on a vulnerable device. Let’s hope for some fixes ASAP ! Camera If your camera keeps working depends on your device/firmware combination. Affected are mostly the SGS3, but there is good news too, there is a potential fix here: http://forum.xda-developers.com/show….php?t=2052675 SGS3 I9300 ONLY. It seems to work for a number of people. It replaces some system libraries with libraries from a different firmware version that does not rely on /dev/exynos-mem. Do not attempt this unless your camera actually breaks due to the exploit, and beware it may cause you to have to reflash your firmware. Also beware that even though this change will not prevent OTAs from downloading, it can possibly prevent OTAs from flashing succesfully.
Available Android rooting guides
Legal conditions:Hexamob not responsible for any damages caused directly or indirectly by a rooting method . Any action for rooting your device are doing it only under your responsibility. We recommend that you read all instructions related to each root method and follow step by step instructions as indicated by the developers. If you have questions or need support on every page there are links to the developers of each method.