Fastboot
is a protocol and a tool of the same name. It is included with the Android SDK package used primarily to modify the flash filesystem via a USB connection from a host computer. It requires that the device be started in If the mode is enabled, it will accept a specific set of commands sent to it via USB using a command line. Fastboot allows to boot from a custom recovery image. Fastboot does not require USB debugging to be enabled on the device. Not all Android devices have fastboot enabled. To use fastboot, a specific combination of keys must be held during boot.
Android device manufacturers are allowed to choose if they want to implement fastboot or some other protocol.
Keys pressed
The keys that have to be pressed for fastboot differ for various vendors.[1]
- HTC, Xiaomi, and Google Pixel: Power and volume down
- Sony: Power and volume up
- Google Nexus: Power, volume up and volume down
On Samsung devices, (excluding the Nexus S and Galaxy Nexus devices), power, volume down and home has to be pressed for entering ODIN mode. This is a proprietary protocol and tool as an alternative to fastboot.[2]
Commands
Some of the most commonly used fastboot commands include:
- flash – rewrites a partition with a binary image stored on the host computer.
- flashing unlock/oem unlock *** – unlocks an OEM locked bootloader for flashing custom/unsigned ROMs. The *** is a device specific unlock key.
- erase – erases a specific partition.
- reboot – reboots the device into either the main operating system, the system recovery partition or back into its boot loader.
- devices – displays a list of all devices (with the serial number) connected to the host computer.
- format – formats a specific partition; the file system of the partition must be recognized by the device.
Implementations
The fastboot protocol has been implemented in the Little Kernel fork of Qualcomm[3][non-primary source needed] and in TianoCore EDK II.[4][5][non-primary source needed]
Fastboot is a mode of the Android bootloader called ABOOT.[6]
See also
References
- ^ Tahiri, Soufiane (2016). Mastering mobile forensics : develop the capacity to dig deeper into device data acquisition. Birmingham, UK. ISBN 978-1-78528-106-8. OCLC 952135850.
{{cite book}}
: CS1 maint: location missing publisher (link) - ^ Drake, Joshua J. (2014). Android hacker's handbook. Zach Lanier, Collin Mulliner, Pau Oliva, Stephen A. Ridley, Georg Wicherski. Indianapolis, IN: Wiley. ISBN 978-1-118-60861-6. OCLC 875820167.
- ^ "fastboot.c\aboot\app - kernel/lk -". source.codeaurora.org. Retrieved 2021-09-11.
- ^ "Undocumented Fastboot Oem Commands". carlo.marag.no. 2020-09-18. Retrieved 2021-09-11.
- ^ "edk2/AndroidFastbootApp.c at master · tianocore/edk2". GitHub. Retrieved 2021-09-11.
{{cite web}}
: CS1 maint: url-status (link) - ^ Hay, R. (2017). fastboot oem vuln: Android bootloader vulnerabilities in vendor customizations. In 11th USENIX Workshop on Offensive Technologies (WOOT 17).