Tuesday, November 27, 2012

[Guide] How to unlock your HTC Droid DNA bootloader



The HTC Droid DNA has already received a rooting guide, giving owners a chance to unlock the pure power this high end device has to offer. The handset features a 5 inch full HD touch display, an 8 megapixel camera capable of 1080p HD video capture and is powered by a 1.5GHz quad-core processor with 2GB of RAM.

Previously we shared a guide on how to root your Droid DNA, but it turns out you can no longer unlock the device bootloader through HTCDev.com. It looks like the manufacturer has removed the Droid DNA from the list of support devices by Verizon just before before retail availability.

Luckily the developer community has managed to find a work around using the same tool which was previously supported. So before you get starting on the rooting guide, you can unlock your HTC Droid DNA bootloader using the following guide:

[NOTE] The content of this guide is credited to the original publishers and we do not take any credit for its content. For more information you can follow the source link at the bottom of this guide.

[NOTE] Following this guide will result in modifying the normal operation of your device. We do not recommend doing so as you may void your device warranty

[DISCLAIMER] Improper use of this guide can result in loss of data or device malfunction which cannot be reversed. Do not proceed unless you are fully aware of the consequences and know that you are proceeding at your own risk.

Requirements
  • Download backup.ab
  • Download DNA_TeamAndIRC.zip
  • Download and configure ADB for ICS or greater on your Windows or Linux computer

  1. Extract the contents of DNA_TeamAndIRC.zip and place the runme.sh, CIDGen.apk and backup.ab in the same directory where ADB is installed.
    -
  2. Launch command prompt (or terminal) and run the following command:
    adb install CIDGen.apk
    -
  3. Launch CIDGen on your device, follow the instructions on the screen and verify the existance of CIDBLOCK.img in the root of your Droid DNA SD card / internal memory using the following command:
    adb shell ls -l /sdcard/CIDBLOCK.img
    -
  4. If CIDBLOCK.img exists run the following commands in command prompt (or terminal)
    adb push runme.sh /data/local/tmp/
    adb shell chmod 755 /data/local/tmp/runme.sh
    adb shell /data/local/tmp/runme.sh

    If not try step 3 again, verify and continue with step 4
    -
  5. Open a second command prompt (or terminal) and restore the modified backup using the following command
    adb restore backup.ab
    The first windows will enter into what seems like an infinite loop and produce several errors. Just leave them as they are for now, as there is no need for alarm.
    -
  6. Once the modified backup has been restored to your device, stop the first command prompt by simply closing the window. (This should stop the run.me script).
    -
  7. In the second command prompt window which you opened, run the following set of commands
    adb shell rm /data/data/com.htc.usage/files/exploit/*
    adb shell mv /data/DxDrm /data/DxDrm_org
    adb shell mkdir /data/DxDrm
    adb shell ln -s /dev/block/mmcblk0p5 /data/DxDrm/DxSecureDB
    adb reboot adb wait-for-device

    [NOTE] rebooting, disconnection from PC or switching off the device will result in your device being bricked.
    -
  8. You will need to run the runme.sh script again, using the following command.
    adb shell /data/local/tmp/runme.sh
    You will see the endless loop once again.
    -
  9. Now launch a new command prompt and restore the modified backup once again
    adb restore backup.ab
    -
  10. Once it has been restored terminate the runme.sh exploit by closing the previous window and run these commands.
    adb shell mv /data/DxDrm /data/DxDrm_trash
    adb shell dd if=/sdcard/CIDBLOCK.img of=/dev/block/mmcblk0p5
    adb reboot


That’s it, once your device has rebooted, your Droid DNA carrier information will be changed and you will be able to unlock it once again through HTCDev.com

For more information visit the developer’s (Justin Case) post on Android Police by following the source link.



sourceAndroid Police
Anonymous Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.