0 Members and 1 Guest are viewing this topic.
Try Cydia's impactor method. It worked on the Avail 2.
Those two methods exploit a hole in the security system, which may be why it's temporary. Do the temp root again and pull boot/recovery for us so I can take a closer look at what's going on.
I've never heard of a locked ZTE so that helps . Even if they did, it'd likely be a simple fast boot unlock.
I'll get with you later on that, my phone's almost dead.
While rooted:give a readout of "adb shell cat /proc/partitions"Look for partitions around 8-12MB in size.For each 8-12MB partition = #Do "adb shell did if=/dev/block/mmcblk0p# of=/sdcard/#.blk" (make sure the # matches the partition you want to copy)Copy these to a computer then post them in dropbox (or similar)
Looks like 8 and 16 are good candidates.
You are not allowed to view links.
Register or LoginLooks like 8 and 16 are good candidates.D:\Smart Phone Tools\Android\Android SDK\adt-bundle-windows-x86_64-20131030\sdk\platform-tools>"adb shell did if=/dev/block/mmcblk0p8 of=/sdcard/8.blk"The system cannot find the path specified.D:\Smart Phone Tools\Android\Android SDK\adt-bundle-windows-x86_64-20131030\sdk\platform-tools>adb shell did if=/dev/block/mmcblk0p8 of=/sdcard/8.blk/system/bin/sh: did: not foundD:\Smart Phone Tools\Android\Android SDK\adt-bundle-windows-x86_64-20131030\sdk\platform-tools>
Still run into a wall, while phone seems to be temp rootedadb shellsushell@android:/ $ dd if=/dev/block/mmcblk0p8 of=/sdcard/8.blkdd if=/dev/block/mmcblk0p8 of=/sdcard/8.blk/dev/block/mmcblk0p8: cannot open for read: Permission denied1|shell@android:/ $