So you went ahead and got Verizon’s first 4G LTE phone, the HTC Thunderbolt, eh? The phone is great, but you want to do more, do you? Well, below is a tutorial for rooting the device and unlocking the bootloader. This is by no means for someone who doesn’t know what they are doing. If you think you have what it takes, read on!
You’ll need:ADB set up correctly (some knowledge how to use it would help, too)
Patience (look through the tutorial before you begin. If using the command line is new to you, you may want to wait until a more elegant root method comes along.) Double check that you’ve typed the correct commands.
Know that this will void your warranty
This could potentially brick your phone. We take no responsibility if this happens. You’ve been warned.
Make sure your Thunderbolt is fully charged before proceeding.
1. Download the following files (mirrors are available below from the source link below)
- RUU_Mecha_VERIZON_WWE_1.03.605.10_Radio_1.02.00.01 03_2r_NV_8k_1.37_9k_1.52_release_165253 (md5sum : aae974054fc3aed275ba3596480ccd5b): DOWNLOAD
- Exploits package (md5sum : 3b359efd76aac456ba7fb0d6972de3af): DOWNLOAD
- Custom RUU mirrors (md5sum : aff07b8256628a175c40938d408fa16f): DOWNLOAD
adb push psneuter /data/local/
adb push busybox /data/local/
adb push misc.img /data/local/
adb shell chmod 777 /data/local/psneuter
adb shell chmod 777 /data/local/busybox
3. “This step will gain temp root and flash the custom misc.img. Run:”
- adb shell
- /data/local/psneuter
- adb shell
- /data/local/busybox md5sum /data/local/misc.img
If the md5 is correct, now you need to write the image
- dd if=/data/local/misc.img of=/dev/block/mmcblk0p17
- exit
After the file has been renamed, put it on the root of your SDcard (inside no folders) and run:
- adb reboot bootloader
After it’s complete, reboot the device and delete the PG05IMG.zip file from your SDcard.
Now we’re going to set up the two-part exploit to get root and unlock the MMC:
Push wpthis, busybox, and psnueter:
adb push psneuter /data/local/Now run the following:
adb push busybox /data/local/
adb push wpthis /data/local/
adb shell chmod 777 /data/local/psneuter
adb shell chmod 777 /data/local/busybox
adb shell chmod 777 /data/local/wpthis
6. Potential phone-bricking step:adb shell
/data/local/psneuter
To unlock eMMC:
adb shell
/data/local/wpthis
exit
Now we’re going to push the eng bootloader. You’re messing with system partitions right now, so this can be dangerous if you do no complete the step correctly.
Run:
adb push hbooteng.nb0 /data/local/The output number should be “6991368ee2deaf182048a3ed9d3c0fcb“. If it does not match exactly that, then stop, delete the file, and re-download it. It, too, is a part of the Exploit package. If it does match, carry on.
adb shell
/data/local/busybox md5sum /data/local/hbooteng.nb0
Run:
dd if=/data/local/hbooteng.nb0 of=/dev/block/mmcblk0p18Run the following to ensure the file was written succesfully:
/data/local/busybox md5sum /dev/block/mmcblk0p18If you don’t get “6991368ee2deaf182048a3ed9d3c0fcb” as the output code, try again. (If you’ve tried several times, seek help in the IRC chat – chat.andirc.net in channel #thunderbolt.) If you get the correct code, proceed.
Reboot the phone – place the custom RUU (PG05IMG.zip) onto the SD card again, and flash it.
Run:
adb reboot bootloader“After it flashes, you will be running release firmware with S-OFF.”
7.
Push busybox, SU, and psneuter -Run:
adb push psneuter /data/local/Time to gain root access!
adb push busybox /data/local/
adb push su /data/local/
adb shell chmod 777 /data/local/psneuter
adb shell chmod 777 /data/local/busybox
Run:
adb shell
/data/local/psneuter
Now we remount the /system and set up SU-
Run:
adb shell8.
mount -o remount,rw -t ext3 /dev/block/mmcblk0p25 /system
/data/local/busybox cp /data/local/su /system/xbin/su
chown 0:0 /system/xbin/su
chmod 6755 /system/xbin/su
Reboot your phone
Go to the Android Market and install Superuser
Reboot your phone again
You should now have full root.
9.
Now all you have to do is install ROM Manager and flash the Thunderbolt recovery. You’re done!
No comments:
Post a Comment