The Nexus Root Toolkit is Super Easy and Straightforward

I had to root an Android device for a recent engagement, and I found myself using the Nexus Root Toolkit for this.

Nexus Root Toolkit - Introduction

If you've never used the Nexus Root Toolkit, or it has been awhile since you have rooted an Android device, then you are in luck.

You can find the tool here, and I'll walk through the simple process of rooting my Nexus 7.

Device Detection and Preparation

First, I set the mode type by clicking the "Change" button in that section.

Nexus Root Toolkit - Set Model

While these settings probably would have worked, I opted for the auto-detect mode.

Nexus Root Toolkit - Auto Detect Model

Next up, the tool prompted me to enable USB debugging. For more information on this, you can see my post about extracting Android Chrome tabs.

Nexus Root Toolkit - USB Debugging

Finally, the build was properly set in the top left section of the application.

Nexus Root Toolkit - Model set

Dependency Failures

Next, I clicked on the "Root" button to begin the process. That said, I first had to update some dependencies on my end.

Nexus Root Toolkit - Dependencies

That said, when I tried to use the NRT File Downloader, I was getting a hash mismatch error.

Nexus Root Toolkit - Hash Mismatch

Additionally, I was also receiving an error about the application having trouble connecting to the update server.

Nexus Root Toolkit - Update Server Error

That said, once the dependency finally failed, I received an error message that would also allow me to download the file manually.

Nexus Root Toolkit - Failed Download

Nexus Root Toolkit - Updates

First, I had to manually update the masterlists.

Nexus Root Toolkit - Masterlist Update

As you can see from my earlier log output, the application was setup with the version 3135 masterlists.

Nexus Root Toolkit v2.1.9

Masterlists:
- LatestToolkitFiles.ini    3135
- AndroidDeviceListFull.ini    3135
- AndroidDeviceListFlash.ini    3135

RAZOR-FLO: Android 6.0.1 - Build: MOB30X

Live log initiated [2018-05-23]:

That said, once I went to the download page, I started to download v3150.

Nexus Root Toolkit - Masterlist v3150

Once I updated the masterlist, I had to update the TWRP dependency.

Nexus Root Toolkit - TWRP Dependency

After I completed the manual process, and clicked "Apply", it was time to update SuperSU.

Nexus Root Toolkit - SuperSU Dependency

With these processes completed, my dependencies were finally met!

Rooting

Now, when I clicked the "Root" button, there were no more errors and I was able to go ahead.

Nexus Root Toolkit - Root Device

With my device connected, I was able to begin the process.

Nexus Root Toolkit - Connected

First, once the device rebooted, I clicked the "Start" button.

Nexus Root Toolkit - Start

This eventually brought up TWRP, and I allowed it to modify my system partition.

Nexus Root Toolkit - TWRP

Once I followed the steps, the log started displaying the files being pushed to the device.

Nexus Root Toolkit - Root Logs

Finally, the process completed, and I received a success message!

Nexus Root Toolkit - Rooting Complete

Nexus Root Toolkit - Verification and Conclusion

Once my device rebooted, I first verified that I had installed SuperSU.

Nexus Root Toolkit - SuperSU

Next, I attempted to open BusyBox and allowed it root access.

Nexus Root Toolkit - BusyBox Root Request

Finally, I updated all the packages inside of BusyBox.

Nexus Root Toolkit - BusyBox

While I ran into a few issues here and there, this was still the easiest rooting process that I have gone through.

I've now got my tablet setup for Android engagements, and engagements will be easier in the future!

doyler on Githubdoyler on Twitter
doyler
Ray Doyle is an avid pentester/security enthusiast/beer connoisseur who has worked in IT for almost 16 years now. From building machines and the software on them, to breaking into them and tearing it all down; he's done it all. To show for it, he has obtained an OSCP, eCPPT, eWPT, eWPTX, eMAPT, Security+, ICAgile CP, ITIL v3 Foundation, and even a sabermetrics certification!

He currently serves as a Senior Penetration Testing Consultant for Secureworks. His previous position was a Senior Penetration Tester for a major financial institution.

When he's not figuring out what cert to get next (currently GXPN) or side project to work on, he enjoys playing video games, traveling, and watching sports.

Leave a Comment

Filed under Security Not Included

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.