Gadgetory


All Cool Mind-blowing Gadgets You Love in One Place

How to Root Your Galaxy Nexus Without Unlocking the Bootloader

2012-10-10
some of the cooler things that we talked about on Pocket now at least Android related stuff requires that you have root permissions on your Android powered phone or tablet that's not terribly difficult but it does require that you unlock your bootloader or does it today I want to show you a way that you can route your Galaxy Nexus without unlocking your bootloader it's not for that faint of heart but hopefully it won't be too bad for you let's go take a look first of all let's throw out some credit this is based on an article that was posted on xda-developers by e Frant who gives credit to binary bi n4r why that's liek for binary I think basically what they've done is they put together an ADB restore that kind of is an exploit and kind of does some cool stuff so what you're gonna need of course is a computer because this involves ADB and some commands you're gonna need your Galaxy Nexus you're going to need a USB cable micro USB plug into your computer you're gonna need some patience you're gonna need the Android SDK so yeah that's that's the main stuff let's get to it next thing you're gonna do is download some files or one file on a zip from the XDA post I'll have a link to that over at pocketnow.com you're going to put that somewhere easily accessible then you're gonna come over to your Android powered device your Galaxy Nexus in this case we're gonna open up developer options that's in settings we're gonna turn those on yes we know we want to do that and we are going to enable USB debugging just like that say yes again that's gonna let us use adb that Android debugging bridge to do some of this stuff next we're gonna push some files over step number four we want to get this fake backup started so we're gonna paste that in again adb is our friend here we're gonna run the restore command and pass to it the fake backup a b which is this file right here but we don't want to hit restore on our device we just want to enter this and then press the return key to make sure that's correct just enter the command in the command prompt on your PC press Enter okay command entered and enter there we go now I look down here on my Nexus you'll notice I've got this full restore prompt I do not want to hit restore my data at this point I want to leave it right here very important step so the next thing step 5 is we're going to run an ADB shell command with a nice while loop inside it and that is going to look just like this now essentially what we're doing here is we're running the exploit while that's running we want to hit restore on on our on our device on our Galaxy Nexus so let's go ahead hit enter it's running now let's it restore restore is starting once it's finished which it looks like it is then I want to reboot my device so it's all done at that point all right to do this I want to do an ADB reboot so again I'm going to copy and I'm going to paste just to make this easy and once I've done that my device turns off it comes up and you'll notice I do not have an unlock down here ok so it's still just regular bootloader locked all that fun stuff I still have some time to go so all kinds of fun once it's rebooted I'll by the way when this reboots it's gonna be running in in debug mode that are in emulator mode rather so it's gonna be really laggy the screens gonna flicker don't worry about that that's normal we just want to get to adb shell once it's booted back up I have a black screen on my device I don't know if that's what I'm supposed to have or not but I'm gonna go ahead and try and invoke this adb shell see what I get I do have access to the device even though I don't have anything on the screen in fact it's an octave thort some people call that the hash key or the pound symbol it's the octothorpe you can look it up now that's a good thing because once I've completed step eight my prompt should be an octave Thorpe and not a dollar sign if it's a dollar sign it didn't work go back to step four try again okay now what we want to do is Mount our system partition as readwrite and that again we're going to just copy and paste here we're gonna mount - Oh space remount comma our W space - T our type is going to be ext4 and this is what we're going to mount so we'll go ahead and enter on that we're all mounted next thing we're gonna copy su over to our system folder just like that next we are gonna change permissions on that to zero six seven five five just like that we're up to step twelve if you're following along at this point we're going to set up a symbolic link to su or rather symbolically link su to X bin slash su and that's not how you do it you right click and hit paste by the way guys okay so symbolically created next we're going to copy our super user apk over to our system folder so that's now done let's try and change mod this guy so that we can do what we need to with it this time that worked just fine next if you're following along we're on step 15 we're going to delete the file that our exploit created which is a file called local dot prop in our data folder again copy and paste that from our article and there we go next up step 16 we are going to exit this now you may need to exit twice sometimes you have to exit out of your super user and then exit back but in this case I just had to do just one so that's good step 16 complete step 17 is we need to type the following it might not be necessary on the Galaxy Nexus but it is on other phones that use this so we're gonna go ahead and do it anyway this is simply an ATV shelled to sink sink sink and there we go it has sunk sunk sunk next up we're going to reboot again and I hope this will take us out of emulator mode step 19 now says done you should now have root without having to unlock your bootloader if you want to unlock now you can without wiping anything so in this post again that will have linked at pocketnow.com there is a link to a bootloader unlocker that you can use once you've gone through this whole exploit and essentially it's just gonna unlock your phone without doing a wipe if you do that the regular OAM unlock that'll unlock your bootloader but it it's also gonna wipe everything you can relock it it's also going to wipe everything so if you don't want to do that then you can go ahead and install this and then go through all of the process so all kinds of fun now if we didn't have root access after doing all of that we have another step we can do so let's go ahead and fire up our device here and see what we have shall we now probably the easiest way to see if we have root is to launch up an Android terminal window so that's what I've done here you can download any one of dozens of terminal apps from the market or the the Play Store I'm an old school guy that way so now what you'll see is I'm at a dollar sign prompt and if you remember when we talked about that it doesn't mean much so how can we come over here and find out if we've got super user access we type in su and we hit enter it sits and thinks and then hey look at this we've got a super user request let's allow that and now if you notice we have an octa thorpe symbol so yes indeed we do have super user we do have root access on our device so there we go we can now do all the cool stuff install all the cool apps without going through and om or unlocking the bootloader not really OEM unlocking but unlocking the bootloader that's that's what we've been able to do here big long a hairy Wow all kinds of craziness we didn't have to use step 10 B in this process which changes the owner of super user luckily yay so if we did we'd have to go back and do steps 10 through 19 again but that shows us we can do it we're done we can now enjoy route and super user and all kinds of stuff and we haven't had to wipe or unlock or anything like that whoo all right for the full instructions head over to pocketnow.com we're gonna give you the the brief rundown there we're also gonna link over to the article at xda-developers comm which is where we were copying and pasting everything from that's where the files are gonna be for you to download and copy over onto the device using ADB so you can run through the exploits and whatnot did you like what you see if so please give us a big thumbs up it's always kind of scary to go through and do all kinds of untested stuff at least untested by us on our devices but we do it so you don't have to be as scared or as worried about it if you like us doing that and yeah big thumbs up right there for potentially breaking my device but I didn't yay if you have any questions or comments head over to pocketnow.com it and leave a comment for us the link to the article is gonna be right down there if you're watching this on YouTube of course if you're watching this video on pocket now you're probably already there so you can just leave a comment down below we like having all of the conversations over there so everybody's all in one place not scattered between PocketNow and YouTube and who knows where else you could be thanks very much for watching for pocket now I'm Joe Levi
We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites.