Rooting Your Android Phone

Read it completely before you start doing anything)
Rooting, for those of you that don’t know, means giving yourself root permissions on your phone. It’s similar running programs as administrators in Windows, or running a command with sudo in Linux. With a rooted phone, you can run more apps (like backup or tethering apps ), as well as flash custom ROMs to your phone, which add all sorts of extra features.

There are a ton of different
Android phones out there, and while some rooting methods might work for multiple phones, there is
no one-size-fits-all guide for rooting every phone out there. As such, we can’t show you how to root every phone in existence,
especially since we can’t test every method.
Rooting Terms
Root:
Rooting means you have
root access to your device—that
is, it can run the sudo command, and has enhanced privileges allowing it to run
apps like Wireless Tether or
SetCPU. You can root either by installing the Superuser application—which many of the below root processes include—
or by flashing a custom ROM that has root access included.
ROM :
A ROM is a modified
version of Android. It may
contain extra features, a
different look, speed
enhancements, or even a
version of Android that hasn’t been released yet. We won’t discuss ROMs in depth here,but if you want to use one once
you’re rooted, you can read
more about doing that on this page .
Flash:
Flashing essentially
means installing something on your device, whether it be a ROM, a kernel , or something else that comes in the form of a ZIP file. Sometimes the rooting
process requires flashing ZIP file, sometimes it doesn’t.
Bootloader:
Your bootloader is
the lowest level of software on your phone, running all the code that’s necessary to start up your operating system.
Most bootloaders come locked, which keeps you from rooting your phone. Unlocking your bootloader doesn’t root your phone directly, but it does
allow you to root, then flash custom ROMs if you so desire.
Recovery : Your recovery is
the software on your phone
that lets you make backups,
flash ROMs, and perform other system-level tasks. The default
recoveries can’t do much, but you can flash a custom
recovery—like ClockworkMod
—after you’ve unlocked your bootloader that will give you much more control over your
device. This is often an integral
part of the rooting process.
ADB:
ADB stands for Android
Debug Bridge, and it’s a
command line tool for your
computer that can
communicate with an Android device you’ve connected to it.
It’s part of the Android
Software Developers Kit (SDK) . Many of the root tools below use ADB, whether you’re
typing the commands yourself or not. Unless the instructions call for installing the SDK and
running ADB commands, you won’t need to mess with it— you’ll just need to know that it’s what most of the tools use to root your phone.
S-OFF :
HTC phones use a
feature called Signature
Verification in HBOOT, their
bootloader. By default, your phone has S-ON, which means
it blocks you from flashing
radio images—the code that manages your data, Wi-Fi, and GPS connections. Switching your phone to S-OFF lets you flash new radios. Rooting
doesn’t require S-OFF, but
many rooting tools will give
you S-OFF in addition to root access, which is nice.
RUU and SBF: ROM Upgrade
Utilities (for HTC phones) and
System Boot Files (for Motorola
phones) are files direct from
the manufacturer that change
the software on your phone.
RUU and SBF files are how the
manufacturers deliver your
over-the-air upgrades, and
modders often post leaked RUU
and SBF files for flashing when
the updates haven’t been
released yet. They’re also
handy when downgrading your phone, if a rooting method isn’t available for the newest software version yet. You can flash RUUs right from your HTC phone, but Motorola users will need a Windows program called RSD Lite to flash SBF files.
There are basically three ways to root your android phone !
1.using commands from PC
2.using softwares from phone !
3.booting using device specific .zip file(recovery mode)
But out of these 1st and the 3rd works fine on the most of the android devices !
(IMP: before using any of these methods please turn on your usb debugging from your android device
Application=settings=applications=development=check usb debugging)
Method 1.using commands from pc !
You need not to do original commands as
There is software that runs fine !
“Superoneclick”
You can download officially it here !
DOWNLOAD

Before you run make sure that you have android SDK installed on your PC.
While installing please allow default path specified in SDK…
You can find it on google developers site !
(Just sdk should be installed no more components are needed)
Method 2: using an app for rooting your android !
There are many apps available at Market place for doing this !
ginger break is trusted one and works on most of devices !
but if it didn’t worked try our 1st method of rooting !
Gingerbreak :
exlusively for gingerbread android rooting ,
About
The GingerBreak APK is a wrapper around the newly released GingerBreak exploit (credits to The Android Exploid Crew), which is meant to attain root access on GingerBread. This specific exploit may work on various Froyo and Honeycomb versions as well.
What the APK and exploit do is as follows:
– The APK puts the right files in the right place to run the exploit
– The APK runs the exploit
– The exploit attempts to attain root access
– If it succeeds, the exploit remounts /system as read-write and runs the installer script
– The installer script attempts to install the su binary and superuser APK, and reboots
Some important things to know:
– You must have USB debugging enabled on your device
– You need to have an SD card (formatted and) inserted – if it doesn’t work, try formatting the SD card in your computer, or switching it with a different (or old, etc) SD card
– The APK must be installed to device, NOT SD card
– The exploit may take a while to run, but not more than 10 minutes, if it does, get me a logcat, and reboot the device. In rare occasions, even if the device does not reboot, you may still have root. So check that out after you manually pull battery after 15 minutes or so of being stuck.
– Always reboot between root attempts!
– While (temporary?) root access may be attained, due to locked bootloaders, efuses, S-ON, and whatnot this may still not work on your device. For temproot purposes, use the raw binary exploit (linked below), not this APK.
– The GingerBreak exploit should not be used to attain temproot and continue using the device. It fscks vold, you do not want to be running like that. You want to reboot! So if the root doesn’t stick, you (still) have a problem.
Installation
– Make sure USB debugging is enabled
– Make sure you have an SD card (formatted and) inserted
– Get the APK on the phone somehow, and install it
– Open the APK, press the root button
– Wait a few minutes. If there are no problems, the device will reboot (note that the reboot itself can take like 10 minutes due to cache wipe)
– Make sure the Superuser app is install and working !!!
WARNING: Apparently on some devices the root exploit causes the SD card (internal or external) to be formatted. Also, if it gets stuck but you do see the card mounting/unmounting, try formatting your SD card yourself and try again (or use a different SD card) – often this works (a fix for both issues is being looked at)

Download Gingerbreak v1.20 :
DOWNLOAD HERE

Leave a comment