Anda ingin melakukan root di perangkat Android Anda? Kini ada cara mudah untuk melakukannya. Bila sebelumnya Anda harus mengikuti langkah-langkah yang cukup rumit, Anda mungkin harus mencoba Framaroot.
Framaroot merupakan sebuah aplikasi berformat .apk yang didesain untuk secara mudah me-root sebuah perangkat Android. Caranya, Anda hanya diminta untuk mengunduh aplikasi Framaroot tersebut dan menyalin berkas hasil unduhan tersebut ke dalam perangkat Anda via SD Card atau penyimpanan lain.
Perhatian! CHIP tak akan bertanggung jawab saat terjadi kerusakan pada perangkat Anda. Risiko tanggung sendiri!
Setelah dimasukkan, Anda juga cukup memasang Framaroot layaknya sedang memasang aplikasi lainnya via .apk. Setelah terpasang, Anda sudah dapat melakukan root di perangkat Android dengan 3 langkah mudah.
- Buka aplikasi Framaroot
- Pilih antara Superuser/SuperSU
- Klik Aragorn/Gandalf`
Tampilan Framaroot di perangkat Android
Setelah melakukan 3 langkah mudah tersebut, Anda hanya harus menunggu sampai muncul tulisan "Superuser and su binary installed. You have to reboot your device". Artinya, perangkat Anda sudah di-root dan Anda harus me-restart perangkat. Framaroot juga dapat melakukan proses unroot. Caranya juga sama seperti saat ingin melakukan root. Bedanya, Anda bukan memilih antara Superuser/SuperSU, melainkan pilihan unroot.
Tanda perangkat telah berhasil di-root
Saya sendiri sempat mencobanya di perangkat Sony Xperia E dual. Hasilnya sangat memuaskan. Xperia E dual hanya membutuhkan waktu kurang dari 5 menit untuk di-root.
Tanda setelah root berhasil: muncul "SuperSU" (ki) dan lolos pengujian menggunakan aplikasi Root Checker (ka)
Saat ini, Framaroot sudah masuk ke versi 1.6.1 Untuk penjelasan mengenai versi-versi Framaroot, Anda bisa melihatnya di bawah ini.
Version 1.6.1: Remove Superuser as it fail to install. Add execution support from adb command line.
Version 1.6.0: Add Pippin exploit (potentially affect Huawei K3V2 based devices)
Version 1.5.3: An attempt to fix Gandalf error#10
Version 1.5.2: Revert to exploitation fix included in 1.4.1. Add Slovakian and Italian languages. Error # added in toast message when exploit failed (report the error number in this thread so I could give you the reason of failure). Previously fix for Framaroot crash was a dirty hack, with this version you shouldn't encounter crash.
Version 1.5.1: Should fix Framaroot crashes.
Version 1.5.0: Add Boromir exploit (potentially affect many Mediatek based devices).
Version 1.4.3: Update SuperSU to 1.34. Rewrote the fix include in 1.4.1 for better but slower exploitation.
Version 1.4.2: Add Russian and French languages. Add scrollbar for exploit list. Update SuperSU to 1.30
Version 1.4.1: Fix a bug in exploitation due to the different kernel data alignement between version and devices, so if exploits didn't work before it "may" work with this version if your device is vulnerable
Version 1.4: Add Gandalf exploit (potentially affect Qualcomm based devices, tested on Nexus 4, as always feedbacks are welcome)
Version 1.3: Add Aragorn and Legolas exploits (could affect wide range of samsung devices including non exynos devices, please give feedbacks for your devices. Thanks)
Version 1.2.1: Fix unroot bug. Improvements for exploitation. Embed SuperSU 1.25
Version 1.2: Add possibility to Install Superuser, Install SuperSU and Unroot
Version 1.1: Frodo exploit added
Version 1.0: Initial release
Version 1.6.0: Add Pippin exploit (potentially affect Huawei K3V2 based devices)
Version 1.5.3: An attempt to fix Gandalf error#10
Version 1.5.2: Revert to exploitation fix included in 1.4.1. Add Slovakian and Italian languages. Error # added in toast message when exploit failed (report the error number in this thread so I could give you the reason of failure). Previously fix for Framaroot crash was a dirty hack, with this version you shouldn't encounter crash.
Version 1.5.1: Should fix Framaroot crashes.
Version 1.5.0: Add Boromir exploit (potentially affect many Mediatek based devices).
Version 1.4.3: Update SuperSU to 1.34. Rewrote the fix include in 1.4.1 for better but slower exploitation.
Version 1.4.2: Add Russian and French languages. Add scrollbar for exploit list. Update SuperSU to 1.30
Version 1.4.1: Fix a bug in exploitation due to the different kernel data alignement between version and devices, so if exploits didn't work before it "may" work with this version if your device is vulnerable
Version 1.4: Add Gandalf exploit (potentially affect Qualcomm based devices, tested on Nexus 4, as always feedbacks are welcome)
Version 1.3: Add Aragorn and Legolas exploits (could affect wide range of samsung devices including non exynos devices, please give feedbacks for your devices. Thanks)
Version 1.2.1: Fix unroot bug. Improvements for exploitation. Embed SuperSU 1.25
Version 1.2: Add possibility to Install Superuser, Install SuperSU and Unroot
Version 1.1: Frodo exploit added
Version 1.0: Initial release
Apakah perangkat Anda kompatibel?
Untuk dapat menggunakan Framaroot, Anda tentunya harus mengecek apakah perangkat Anda kompatibel dengannya. Untuk itu, Anda harus mengeceknya di bawah ini.
Perangkat Qualcomm (Hanya Gandalf exploit) :
- Asus Padfone 1/2
- Asus Padfone Infinity
- BW T18+ (Fortis Evo)
- Cloudfone Thrill 430x
- Disgo 8400g
- DNS S4504/S4503/S4502
- FAEA F1
- Gigabyte GSmart G1315 Skate
- Gigabyte GSmart Rio R1
- Google Nexus 4
- Highscreen Spark/Blast/Strike/Boost
- HTC One S
- Huawei Honor Pro (U8950-1)
- Huawei U8815/U8816 Ascend G300/G301
- Huawei U8825D Ascend G330D
- Karbonn Titanium S5
- LG Nitro HD
- LG L7 II P710/P714/P715
- LG Optimus G E970
- LG Optimus L3 II E425
- LG Optimus L5 E610/612/615
- LG Optimus L7 II P710/P713/ P714/P715
- LG Optimus L7 P700/Р705
- LG Optimus LTE 2
- MEDION LIFE P4013
- Micromax A111 Canvas Doodle
- Orange Nivo
- Samsung Galaxy Win I8552
- Sharp Aquos Phone SH930W
- Sony Xperia E C1505/Dual C1605
- Sony Xperia L C210X
- teXet TM-3204R
- teXet TM-4677
- ZTE V880G/ZTE V955
Perangkat MT65XX (Hanya Boromir exploit) :
- Micromax Canvas HD
Perangkat Samsung (Legolas dan Aragorn exploits) :
- Samsung Galaxy Core GT-I8262
- Samsung Galaxy Proclaim S720C
- Samsung Galaxy Young GT-S6312/GT-S6310
- Samsung Lightray SCH-R940
Perangkat Exynos (Sam, Frodo, Legolas and Aragorn exploits) :
- AT&T Galaxy Note 2 SGH-I317
- Highscreen Explosion
- Hyundai T7s
- Impression 9702 (Exynos 4412)
- Lenovo K860
- Newman N2
- Meizu MX2
- Samsung Galaxy Camera EK-GC100
- Samsung Galaxy Note 10.1 GT-N8000, GT-N8010, GT-N8013, GT-N8020
- Samsung Galaxy Note 2 GT-N7100
- Samsung Galaxy Note 2 LTE GT-N7105
- Samsung Galaxy Note 8.0
- Samsung Galaxy Note GT-N7000
- Samsung Galaxy S GT-i9000
- Samsung Galaxy S2 AT&T SGH-I777
- Samsung Galaxy S2 Epic 4G Touch - SPH-D710
- Samsung Galaxy S2 GT-I9100
- Samsung Galaxy S3 GT-I9300
- Samsung Galaxy S3 LTE GT-I9305
- Samsung Galaxy Tab Plus GT-P6200/GT-P6210
- Samsung Galaxy Tab 7.7 GT-P6800/GT-P6810
- Samsung SGH-i997 Infuse 4G
- T-Mobile Galaxy Note 2 T-889
- Verizon Galaxy Note 2 SCH-I605
- iBerry Auxus CoreX2 3G and CoreX4 3G
Perangkat Omap36XX (Gimli exploit) :
- Archos Gen8
- Cliq 2 MB611
- Coolpad Quattro 4G
- Droid 2 (a955)
- Droid 2 Global (a956)
- Droid X (MB810)
- LG Marquee LS855
- LG P970 Optimus Black
- Motorola DEFY+ (MB525 / MB526)
- Motorola Droid PRO
- Motorola Droid X
- Parrot ASTEROID Smart
- R2D2 (a957)
No comments:
Post a Comment