This tutorial & tools is meant for power users who can make use of configuring the device in fancy ways, such as running custom stuff for linux, or advanced mods to the GUI. As of v2, the package does
Devices supported
I have PB740-2 (InkPad 3 Pro), so that's pretty much the only one I can vouch for. Essentially if your firmware latest version is something like 5.20.xxxx, *it should run* (these images are all nearly identical). However I have no way to verify that for a fact. You might want to start slowly only with jailbreak su and nothing else on older devices, as bugs in older kernels can introduce nasty boot crashes, especially when configuring for combined usbnet. Chances are that for older devices significant tweaks to service scripts will be necessary.
How to install
Extract the 3 app files from pbjb*.zip release on github into applications folder of your device.
Then from app menu:
* Launch @Jailbreak. If it succeeds, it will install su binary and reboot the device. If it silently exits, chances are the exploit doesn't run on your firmware. After reboot finishes,
* Launch @Services. This will install the service files and start scripts.
Once the device boots after @Services install, you can ssh into root@169.254.0.1 with connected usbnet and look around. The root password is randomly generated, stored in 'password.txt' document the install process generated. If you want it changed, simply edit that file and reboot again for services to take note. All other services (smbd, ftpd) expect the same username=root and password.txt pair.
Samba share
Troubleshoot
Low level internals
- install public su binary
- install iptables binary, and script to load firewall rules on startup
- install ssh, smb, ftp services and launch those at boot
- permanetly enable usbnet (even when mass storage is on, usbnet runs alongside)
- runtime patch out the worst of wifi glitches of stock firmware (arbitrary disconnects)
Devices supported
I have PB740-2 (InkPad 3 Pro), so that's pretty much the only one I can vouch for. Essentially if your firmware latest version is something like 5.20.xxxx, *it should run* (these images are all nearly identical). However I have no way to verify that for a fact. You might want to start slowly only with jailbreak su and nothing else on older devices, as bugs in older kernels can introduce nasty boot crashes, especially when configuring for combined usbnet. Chances are that for older devices significant tweaks to service scripts will be necessary.
How to install
Extract the 3 app files from pbjb*.zip release on github into applications folder of your device.
Then from app menu:
* Launch @Jailbreak. If it succeeds, it will install su binary and reboot the device. If it silently exits, chances are the exploit doesn't run on your firmware. After reboot finishes,
* Launch @Services. This will install the service files and start scripts.
Once the device boots after @Services install, you can ssh into root@169.254.0.1 with connected usbnet and look around. The root password is randomly generated, stored in 'password.txt' document the install process generated. If you want it changed, simply edit that file and reboot again for services to take note. All other services (smbd, ftpd) expect the same username=root and password.txt pair.
Samba share
Spoiler:
Troubleshoot
Spoiler:
Low level internals
Spoiler: