How to: Root the HTC Thunderbolt and Unlock the Bootloader

We may earn a commission when you click links to retailers and purchase goods. More info.

NOTE:  AN EASY ROOT METHOD HAS BEEN RELEASED.

The amazing hackers in the Android community took on the HTC Thunderbolt the minute it was released and stumbled upon some not-so-exciting news.  It had been completely locked down like no other HTC device in history.  While many were quick to yell at HTC, I’m pointing fingers at Verizon and will save further comment for another time.  The good news is, Team AndIRC and Scotty2 weren’t about to be stopped and permanently rooted it while also unlocking the bootloader and providing S-OFF.

So who’s ready for some TBolt unlocking?  Before you say yes, you need to be thoroughly warned.  This requires adb, a mega-list of commands and is one of the most intense rooting procedures I’ve seen in a long time.  You are essentially, flashing old system software, unlocking the bootloader, and then re-flashing the release software with S-OFF to open your phone up.  Again, this is intense and should only be attempted by those familiar with adb.  

*This is not for beginners.

*Fully charge your device before proceeding.

*Read the entire list of instructions at least once through.

*I have not attempted this, but our man Picolas has with success.

*Again, this is not for beginners. This could brick your phone.

Step 1

CLICK HERE FOR A VIDEO WALK-THROUGH

First, download these files:

RUU_Mecha_VERIZON_WWE_1.03.605.10_Radio_1.02.00.01 03_2r_NV_8k_1.37_9k_1.52_release_165253 (md5sum : aae974054fc3aed275ba3596480ccd5b):

  • Multiupload mirror
  • GalaxySense mirror
  • DroidSite mirror

Mirrors for the package (contains busybox, wpthis, psneuter, su, readme.txt, misc.img, and hbooteng.nb0) (md5sum : 3b359efd76aac456ba7fb0d6972de3af):

  • Multiupload mirror
  • GalaxySense mirror
  • DroidSite mirror

Custom RUU mirrors (md5sum : aff07b8256628a175c40938d408fa16f):

  • Multiupload mirror
  • GalaxySense mirror

Step 2

Note that adb is required.

Push misc.img, busybox, and psnueter using the following commands:

adb push psneuter /data/local/
adb push busybox /data/local/
adb push misc.img /data/local/
adb shell chmod 777 /data/local/psneuter
adb shell chmod 777 /data/local/busybox

Step 3

This step will gain temp root and flash the custom misc.img. Run:

adb shell

Now the shell should display “$”.

Run:

/data/local/psneuter

You will now be kicked out of adb, and adb will restart as root. Let’s confirm the md5 of misc.img:

adb shell

At this point, the shell should display “#”.

Run:

/data/local/busybox md5sum /data/local/misc.img

Output should be “c88dd947eb3b36eec90503a3525ae0de.” If it’s anything else, re-download the file and try again.

Now let’s write misc.img:

dd if=/data/local/misc.img of=/dev/block/mmcblk0p17
exit

Step 4

Here you will rename the downgrade RUU as PG05IMG.zip and place it on your SD card. Then, run the following command:

adb reboot bootloader

Choose the bootloader option and press power; let the ROM flash. When asked to upgrade, choose yes. Don’t freak, it’s a long reboot.  Once done, reboot and delete PG05IMG.zip from your SD card.

Set up the two part exploit, to gain root and unlock MMC.

Push wpthis, busybox, and psnueter:

adb push psneuter /data/local/
adb push busybox /data/local/
adb push wpthis /data/local/
adb shell chmod 777 /data/local/psneuter
adb shell chmod 777 /data/local/busybox
adb shell chmod 777 /data/local/wpthis

Step 5

Next, enter the following commands:

adb shell
/data/local/psneuter
To unlock eMMC:
adb shell
/data/local/wpthis
exit

Step 6

Please pay attention – this is very important. This step involves a small chance of bricking if you mess up.

To push the eng bootloader:

adb push hbooteng.nb0 /data/local/
adb shell
/data/local/busybox md5sum /data/local/hbooteng.nb0

If the output does not match “6991368ee2deaf182048a3ed9d3c0fcb” exactly, stop, delete it, and re-download it. Otherwise, continue.

Now we will write the new bootloader.

dd if=/data/local/hbooteng.nb0 of=/dev/block/mmcblk0p18

Confirm proper write:

/data/local/busybox md5sum /dev/block/mmcblk0p18

If the output does not match “6991368ee2deaf182048a3ed9d3c0fcb,” try again; if it still doesn’t work, seek help from chat.andirc.net in channel #thunderbolt.
DO NOT REBOOT.

Now, reboot your phone and put the custom RUU (PG05IMG.zip) on your SD card. Then flash it. This will upgrade you to release firmware with an S-OFF bootloader.

Next, run this command:

adb reboot bootloader

After it flashes, you will be running release firmware with S-OFF.

Step 7

Push SU, busybox, and psneuter:

adb push psneuter /data/local/
adb push busybox /data/local/
adb push su /data/local/
adb shell chmod 777 /data/local/psneuter
adb shell chmod 777 /data/local/busybox

To gain root:

adb shell
/data/local/psneuter

The following will remount /system and set up SU:

adb shell
mount -o remount,rw -t ext3 /dev/block/mmcblk0p25 /system
/data/local/busybox cp /data/local/su /system/xbin/su
chown 0:0 /system/xbin/su
chmod 6755 /system/xbin/su

Step 8

Install Superuser from the Market.

Reboot your phone. You should now have full root permissions.

Step 9

Finally, install ROM Manager and flash the ThunderBolt recovery.

CLICK HERE FOR A VIDEO WALK-THROUGH

If you have problems getting SU to work, a couple extra reboots will likely fix it. If you still have problems, come to the chat: irc.andirc.net #thunderbolt or use http://chat.andirc.net:9090/?channels=#thunderbolt.

And for those of you that have completed this, please leave any tips you can in the comments.

*Last note* – We’ll sit back and hope for something simpler from the guys at unrevoked, but it could be a bit.

Via:  XDA, Android Police

Categories

Collapse Show Comments
114  Comments