Thursday, May 18, 2017

Kindle Fire HDX Root: How to roam the Amazon tablet

Rooten can also be devices from the Kindle series. The most recent example is the Kindle Fire HDX with a 7-inch display, which can be opened in a few minutes. Even better, with Safestrap now providing a stable restoration system based on the recovery classic TWRP, users can back up and restore the stock ROM right after the rooting.


Caution


We put the sample on the example and the new Kindle gerootet. In this workshop an Amazon Kindle Fire HDX 7 is used, on which the operating system version 13.3.1.0 is installed. Users can find out which version is running on the device by tapping Device in Device Preferences and then choosing Systemupdate.


More control with SuperSU


The requested information is listed under Current version. The Rooten is not complicated. First, Crackers fully load the tablet and install the ADB drivers, which they download directly from the XDA-Developers forum. Then connect the Kindle to the PC on which they have installed the ADB drivers using a USB cable.


Recovery system


In the settings of the Kindle select Device and then switch on the Enable ADB option. The automatically displayed warning message is closed with Activate. The cracker will now change to the system control on the PC, open the device manager and check whether the Kindle is listed under Portable devices or if the entry Kindle Fire is present. If not, double-click Other Devices, right-click the Kindle entry, and enter the drivers manually.


Also interesting is


To roam the device, the cracker then downloads the file root13.zip from the XDA-Developers-Forum. Unzip the archive and double-click the runme.bat batch file. As soon as the command line shows the message Press any key, he taps a key. Then type it in su and confirm with the Enter key to check if it has root privileges. In the command line root @ android: / #, everything worked.


After the device is now rooted, the manual installation of SuperSU is on the program. The app is important in that it draws attention to components that are trying to adapt to superuser rights. The user can then decide for himself whether he wants to grant these rights to an app. But first, he has to turn on the Apps of unknown origin option, which he gets through settings and applications.


Subsequently, the Kindle user starts the Silk Browser, opens the website 1Mobile and taps on the button Install. In the following dialog, he is informed that he must first download the file to the device. Confirm with OK. After download, he needs to import a file manager to get access to the download folder.


Perfectly suited is the free app ES File Explorer. The user opens the Amazon app shop, searches for ES File Explorer and plays the file manager. Then he starts the app, switches to the Download folder, taps the previously downloaded 1MobileMarket_eu.chainfire.supersu_304.apk file and confirms the installation with Continue and Install to download the Google Play alternative 1Mobile Market. Super-SU is then automatically installed. To update the app, tap Next, then Normal.


The next step on the way to the pimpled Kindle Fire HDX is through the installation of a recovery system, with which the user can create a complete backup. All required prerequisites have already been fulfilled: The device has been rooted, the App SuperSU is installed, and it is allowed to import apps of unknown origin.


The user opens the Silk browser and loads the current Safestrap-Thor version of Goo.im onto the Kindle, for example Safestrap-Thor-3.70-B01.apk. After the download, he starts the installation and in the Superuser dialog, type "Allow" to allow the app to get the required rights. He confirms the message with Agree and then enters the recovery system by tapping Install Recovery.


After the installation, he taps Reboot to Recovery to start the device in Restore mode and create a full backup of the system. To do this, the user selects Backup, then Data and System and drags the slider to Swipe to Back Up to the right to start the full backup. After completing the process, which takes several minutes, he taps the Back button twice to return to the main menu.


Then he taps on Boot Options, selects ROM-slot-1 and confirms the settings with Create ROM Slot to create a new memory space. Use the Back button to return to the main menu, select Restore, and under Select Package to Restore, tap the entry that starts with stock to restore the complete backup created in the first step in ROM slot-1. It starts as before with Swipe to Restore.


Finally, press the Back button three times to return to the Safestrap main menu. It then selects Boot Options and ROM-Slot-1 and checks whether the message Active Active is displayed. Now the user has a complete backup of the rooted original system, which he can restore at any time if problems occur. Then restart the Kindle Fire HDX by tapping on Reboot, then on System. As an additional backup, it can transfer the folder in which the complete backup of the rooted stock ROM is stored to the PC. The corresponding directory can be found in the internal memory of the Kindle Fire HDX under TWRP / BACKUPS


Block Amazon updates


To ensure that the updates that are automatically deployed by Amazon do not affect root access, Kindle cracker blocks contact with the appropriate servers. To do this, you load the Android Firewall from the 1Mobile Market and install it as SuperSU. After launching the app, you will scroll to the bottom of the app and turn it off. (Any application) - Same as selecting all applications. Then tap the menu icon and select Save rules. Then tap the app icon and select Set your own script. Now, enter the following three code lines to prevent contact with the Amazon update servers


Iptables -A "droidwall" -s72.21.194.208 -j "droidwall-reject


Import Google Apps


Iptables -A "droidwall" -s72.21.195.233 -j "droidwall-reject


Iptables -A "droidwall" -s176.32.195.233 -j "droidwall-reject


The cracker confirms with OK, taps the menu icon and chooses to save rules, then activate firewall.


For Professionals only: Custom-ROMs


Experimenting with users who want to go a step further can also import Google Apps, such as using Gmail or shopping at the Google Play Store. However, some standard components are removed, so you can no longer use all Amazon services and apps, including the App Store.


If serious problems occur, simply play back the secure ROM. The user loads the complete package onto the PC and copies the file to the memory card of the Kindle Fire HDX. It opens the App Safestrap and selects Reboot to Recovery. In the restoration system, he taps Install, changes to the folder where the ZIP archive is stored, and selects the file.


He drags the slider to the right to initiate the flash. He then reboots the system via Reboot System. After the device has booted up, it can be seen that everything has worked out: the user interface now looks as it is accustomed to by Android devices. App-Drawer includes all popular Google Apps.


Also for the Kindle Fire HDX, there are already custom ROMs, which change or expand the functionality of the device. Unfortunately, they are still unstable.


The operating system alternatives are not yet mature enough to be suitable for use on productive devices. It also eliminates the need for all Amazon apps and services. The best known example is AOSP 4.2.2 Thor. To install the Custom-ROM, users create a new ROM slot with Safestrap, as described in the Google Apps application to flasher the Custom-ROM.



On the first start, they are greeted by the well-known Google facility assistant. After completing the basic configuration, they have a Kindle Fire HDX running Android 4.2.2. Also the Amazon advertising advertised depending on the device is gone. Important: To be able to boot into the recovery environment, such as to enable the Stock ROM, users must install Safestrap.

No comments:

Post a Comment