What's new
DroidForums.net | Android Forum & News

This is a sample guest message. Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

[HACKS] TBH Free Wireless Tethering Hack Instructions

I ran the radiocomm hack on my droid 2 global and it went off without a hitch. The problem I'm having is constantly having to restart the phone because I keep getting kicked off the internet. When this happens and I attempt to restart wireless tether, I end up having to restart the phone. I am running a Motorola Droid 2 Global with Gingerbread 2.3.3, hacked and rooted with Droid 2 Bootstraper. I've been reading and reading and can't seem to find anyone else even having this problem.

Any and all advice would be more than welcome.

Try just switching to Flight mode and back. I don't know what the problem is though.
 
Green light but can't get version

I installed radiocomm and all necessary drivers and i'm using windows XP. I'm getting a green light with my rooted droid 3 plugged in but when I click "GET" I don't get my phone's software version like the guide says I should. I'm not sure if I should continue on to the next step as I don't want to brick my phone! Also, The phone is not activated.. Could this be the reason? (I'm planning to send this phone across the country to my son as a gift to let him activate) Please help!
 
Use Verizon DROID BIONIC in Barbados

"This thread is intended to explain the principles behind tethering and how to use RadioComm to modify the NVM to allow tethering via all methods
on any Motorola Droid device by all users, regardless of whether they are rooted or not.

This is the method we at TeamBlackHat used to create the Tether_Repair patches that were released recently for rooted DX/D2 users in update.zip format
and applied via the Koush bootstrap recovery.

It is based on years old knowledge developed in the early days of CDMA Motorola hacking on the V710/V3c/e815 devices.

All of the information, techniques and software tools to do this are in the public domain already.
What we did is simply take that knowledge and apply it with the latest Service software and methods to the Droid generation devices and packaged it
in a new format for delivery that was never previously available to us before the advent of Android.

We will be releasing the manual method for RadioComm when we have worked through all the details for doing it on Win 7.
Currently the versions of RadioComm available on the net are for Win XP only.

We did it initially as a Proof of Concept of methods for writing to NV items via update.zip using Motorola's own binaries that we have recently developed.
We were not intending to release it at all and all agreed that it would be very controversial and raise many ethical questions as well as attracting the wrong
kind of attention to us as a group at a time when we had just been served a C&D for leaking the 2.3.9 update.zip file.

All of this really came about as a direct result of the examination of the NVM we did investigating nenolod's claims about an Engineering mode "switch"
that unlocked the bootloader on DX/D2. Those claims turned out to be unfounded and false and our work, and in particular MotoCache1's incisive analysis
of the boot process with help from [mbm], was instrumental in revealing that fact.

Not exactly what we had in mind to do but we were among the few who had the tools and wherewithall to determine the validity of what nenolod was claiming,
particularly in the beginning when he had released very little hard data to back up his suggestion that there was such a string hiding in the NVM.

Nonetheless, while revisiting the NVM and exploring methods to dump the memory we came upon this set of NV items that determines how the radio builds the
authentication strings it autowrites at bootup for data services. I was aware of their existence for month's since they were revealed in a thread
I participated in on HoFo for service programming on the original Droid. That thread was directed towards the methods required to get the Droid on
a different carrier like Cricket or Metro.

In any event, I knew what they would do if modified in this way and decided to use that as a test of MotoCache1's work with the update.zip binaries.

I used RadioComm to edit them individually and MotoCache1 did the really brilliant work of turning this very old school hack into a beautiful,
elegantly delivered package. This proved the power of what we were capable of as a team and we still unanimously decided against releasing
a packaged theft of services hack as not the right thing to do.

We have reconsidered now in the light of these other exploits surfacing which utilize various software level tricks for getting "Free" tethering
with the new 3G Mobile Hotspot app included on DX and D2. I had always felt that this was inevitable and that others would soon put the pieces together
in the same way we had done.

This is a fundamentally different modality but accomplishes exactly the same thing as any other exploit designed to subvert VZW's intent
to differentiate between externally routed modem data and internal data use and charge for that service.
This includes all forms of exploits and applications like PDAnet and WMWiFiRouter(WinMo 6.1) and now Barnacle, whose entire business model is to use
software level methods to mask tethered data and have marketed them as such for years.

All of these methods absolutely violate the TOS agreement with VZW.

This method simply alters that behavior at the lowest level possible on the device, the radio NVM.
It works because of the way VZW chose to setup authentication on their network when they released the first EvDO capable phones in late 2004-2005.
The methods and software tools to access the NVM as well as the blocks put in place by Qualcomm and Motorola for protecting these
authentication components have evolved dynamically over the years with advancements in chipset design and software, but the principles
have always remained the same. Hex editing the NVM items via a given tool to make the Tethered NAI(Network Access Identifier) strings
match the NAI strings for internal data.

These are basically your user name on the network and consist of the MIP profile byte, a line length byte and your 10 digit telephone number
followed by either @dun.vzw3g.com for tethered NAI or @vzw3g.com for the NAI. By removing the "dun." from the tethered NAI string
you enable all forms of data use to appear to the network as internal and using the normal NAI string.

The difference between the current technique and former methods is that the items edited for this hack are not those strings themselves,
but actually where the default values are stored that the radio uses to build the full strings that it autowrites to the fixed, protected locations in the NVM
for the authentication components in the MIP(Mobile Internet Protocol) profile itself, which happens at bootup.

This is the means by which they prevented the items from being modified by typical service programming tools like QPST.
But, because we know the location for those hidden partial strings, it actually makes our work much simpler.
After editing these four strings, the phone itself uses those values to autowrite the properly configured MIP profile strings for you.

It couldn't be any easier!

Despite our initial concern about releasing this publicly, we have decided after much discussion to do so anyway.
With all of the recent exploits that are directly targeting the 3g Mobile Hotspot app we feel that revealing the way to do it properly
will level the playing field for everyone as well as giving the community a truer and more complete understanding of how it works.
This way users can make up their own minds as to whether to use any of the available methods of "free" tethering with a clear view
of the ethical and technical issues involved.

Hopefully this thread will generate a healthy discussion about the issues.

We at TeamBlackHat believe in providing the knowledge so users can make their own decisions with the best information available.

Please use your own judgment about whether to use this or any tethering modifications.

Enjoy!

CellZealot

TeamBlackHat
"

Dear Sir,
you are a real guru (no doubt about it) I have a request/challenge to propose you. And I am willing to pay if this becomes too hard to achieve.
I have recently bought a rooted Verizon (out of warranty) Droid Bionic XT875. Phone was mailed to me here in B, unlocked, but looks like it was unlocked for the USA use only and not for global GSM use. Here in B, both service provider LIME & DIGICEL claim to have 4G network working. As well as 3G and so on.
I really love this phone (a lot) and I want to use it anywhere I travel. This operator restriction are a real crap, and in most European countries are becoming a thing of the past. I believe like me there are tons of other people in B who need to utilize this device as phone (and not as mp3 player).
Here I am asking your help into this matter.
I have followed your instructions but I have two strange things happening.
Light never goes green but stays purple (Radiocomm)
When i connect my phone i have three option to choose from my device screen

1. Mass storage
2. MTP
3. PTP

USB Debugging is on

What am I doing wrong?

With regards

Nick
 
Back
Top