Home
Samsung

How to Root ANY Samsung Galaxy S5 Variant (Even AT&T & Verizon) in 20 Seconds Flat

Jun 16, 2014 11:42 PM
Jun 17, 2014 03:27 PM
635385336512250929.jpg

With a root bounty of over $18,000 up for the taking, developers were highly motivated to get the AT&T and Verizon Wireless variants of the Samsung Galaxy S5 rooted. Legendary hacker George Hotz, aka Geohot, has won the race and can now step up to claim his prize.

Hotz is not just your average developer, he's the guy who brought jailbreak to the original iPhone and unlocked the PlayStation 3. So when he hacks a device, he does it in style. Not only does Hotz's exploit root the G900A G900V S5 variants, it can root any Galaxy S5 and works on almost any Android device with a kernel build date of June 3rd, 2014 or older.

Geohot's Towelroot uses an exploit found by fellow hacker Pinkie Pie that causes the kernel to crash on Linux-based systems such as Android. While the kernel is in this crashed state, an app can ask for superuser permissions and be granted them, even though root isn't normally accessible to the current user. Towelroot induces this kernel crash, gains superuser permissions from Android, then uses them to copy over the requisite files so that other apps can get superuser permissions in the future.

What's more, the Towelroot exploit doesn't require a PC or complicated ADB commands—it's an app that can be sideloaded like any other. This makes Geohot's root method the easiest one yet. And if user reports are to be believed, the exploit doesn't even trip Samsung's Knox. Nonetheless, you should still proceed as if your warranty will be voided as soon as you root your device.

Step 1: Enable Unknown Sources

Since Towelroot is not available on the Google Play Store, you'll need to ready your device for the installation of sideloaded apps. From Settings, under the System section, tap Security. In here, just tick the box next to Unknown Sources and press OK.

635385221366321022.jpg
635385221535068700.jpg
635385221679464628.jpg
635385221366321022.jpg
635385221535068700.jpg
635385221679464628.jpg

Step 2: Download Towelroot

Hotz has made his root exploit app available to all through its website. Just open your Galaxy's web browser and navigate to towelroot.com. From here, tap the lambda symbol to download the installer file.

635385223556944129.jpg
635385223735550446.jpg
635385223556944129.jpg
635385223735550446.jpg

When the download is finished, tap the notification to initiate the install process. From here, hit Install, and when finished, tap Open.

635385224712413751.jpg
635385224837571262.jpg
635385225003037825.jpg
635385224712413751.jpg
635385224837571262.jpg
635385225003037825.jpg

Step 3: Root Your Device

When you open Towelroot, you'll notice that there's not very much to the app's UI. Just a single button that says make it ra1n.

635385226296787827.jpg
635385226419913716.jpg
635385226296787827.jpg
635385226419913716.jpg

Just tap this button and you're device will be rooted. That's it. Seriously.

Give the app about 15 seconds to perform Pinkie Pie's exploit and copy over the necessary files, and your phone will automatically reboot. When it comes back up, you'll be rooted. If you know you're way around an Android device, then all of the steps above shouldn't take longer than 20 seconds, though it will vary from device to device.

Step 4: Verify the Root Was Successful (Optional)

If you'd like to test out your new root privileges, you can download Root Checker from Google Play. With the app open, tap on Verify Root to confirm that the procedure went down without a hitch.

635385233814444026.jpg
635385233924601482.jpg
635385233814444026.jpg
635385233924601482.jpg

When you're doing that, though, you may notice that you weren't asked to grant Root Checker superuser permissions. This is because Towelroot doesn't install a root management app—it just gives root to any app that asks for it.

This is a serious security risk, because malware apps can do some significant damage to your phone with root permissions. An app that covertly installed itself on your phone could automatically receive root privileges without you ever knowing.

Step 5: Install a Root Management App (Recommended)

To remedy the above issue, simply install a root management app. Chainfire's SuperSU is the best app out there in this category, and it's available for free on Google Play. As I'm writing this, though, the current version hasn't been updated to work with the Verizon or AT&T variants of the Galaxy S5.

635385247219443907.jpg

But Chainfire has updated the app to include support for the G900A and G900V models of the Galaxy S5, and I've uploaded that version for you to grab.

Using your Galaxy S5, tap this link to download the updated SuperSU. When the download is finished, tap the notification to launch the installer, then press Install and Open.

635385251447104495.jpg
635385251593037783.jpg
635385251721943974.jpg
635385251447104495.jpg
635385251593037783.jpg
635385251721943974.jpg

Step 6: Update the Superuser Binaries (Recommended)

When you first launch SuperSU, you'll be asked to update the Superuser binaries. Just tap Continue to begin, then choose Normal as your method of installation.

635385252674913832.jpg
635385252791318704.jpg
635385252674913832.jpg
635385252791318704.jpg

At this point, you may see a screen asking you to delete Samsung's Knox security feature. If prompted, just tell it No thanks.

When the process is finished, you'll get a confirmation dialog. As it says, for the changes to take effect, you'll need to reboot your phone—go ahead and do that at this time.

635385253875851210.jpg
635385253991318676.jpg
635385253875851210.jpg
635385253991318676.jpg

When you're back up, any root app will have to explicitly ask your permission to gain access to the system partition of your phone. Just press Grant for an app that you trust, and any suspicious apps can be denied root access by choosing Deny on the same dialog.

635385254912256390.jpg

Step 7: Disable Security Policy Updates (AT&T Version Only)

As some users have noted, once rooted, AT&T's Security Policy Update service might ask you to update your Security Policies. This nagging notification apparently has the potential to unroot your phone, and we don't want that.

To prevent any issues with Security Policy Update, you'll just need to disable the app. Go ahead and grab one of the many free root-enabled file browsers from the Play Store to get the process underway. I'll be using Sliding Explorer to demonstrate, which is available on Google Play here.

First, be sure to enable root mode on your file browser. With Sliding Explorer, hit the 3-dot menu button and tap Settings. From here, just tick the box next to Enable Root Mode.

635385392891164170.jpg
635385393048193863.jpg
635385392891164170.jpg
635385393048193863.jpg

Next, use the navigation menu on the left to select Root Directory. SuperSU will pop up asking you to give Sliding Explorer root permission. Tap Grant on this prompt.

635385394470226786.jpg
635385394576631231.jpg
635385394470226786.jpg
635385394576631231.jpg

Next, navigate to the /system/priv-app folder and locate the SPDClient.apk file.

635385395852568930.jpg
635385395953663767.jpg
635385395852568930.jpg
635385395953663767.jpg

Tap the 3-dot menu button directly to the right of this file and select Rename. From here, simply append a .bak to the end of the filename and press Rename. Afterwards, just reboot your phone and you'll no longer have to worry about AT&T's Security Policy Update service.

635385396730693912.jpg
635385396876475491.jpg
635385397011631411.jpg
635385396730693912.jpg
635385396876475491.jpg
635385397011631411.jpg

And that's about all there is to it. Your Galaxy S5 should now be rooted, and it can handle root requests in a secure manner.

This is by far the easiest root procedure that I've ever performed. It literally took me less than a minute to get root, and just a couple more to install SuperSU. How long did it take you? Let us know in the comments section below.

Comments

No Comments Exist

Be the first, drop a comment!