You might now know it by how simple it is to root most Android devices, but the amount of work required to get to the “one click root” is often immense. The time spent discovering vulnerabilities in the code and deploying exploit attempts until something finally works is often the result of days of exhaustive work. Even when the exploit is found, the step-by-step instructions that are created often rely on the user knowing exactly how to respond if something goes wrong. Now one developer has created a solution that allows him to root an Android device simply by connecting it to an ingenious box that he created.XDA developer and long time hardware hacker Adam Outler spends a lot of time on these exploits. So much time, in fact, that he wrote his own scripting language for deploying exploits over the Android Debug Bridge (ADB). The Cross-platform ADB Scripting Unified Android Loader, or CASUAL as he has named it, is a project he has been working on for some time now. CASUAL makes it easier to plug in a device and feed it exploits over ADB, which often provides a much faster root method.In theory, CASUAL doesn’t require a screen, mouse, or even a keyboard to operate. If deployed correctly, you should only need to connect a phone with a known exploit to a system running CASUAL, and stand back as the exploit takes place. Outler decided to take this notion one step further, however, by making a headless box that you could just plug a phone into.The silver box is a Raspberry Pi computer with an Arduino battery backpack, allowing it to be used just about anywhere. The box has five LEDs and a toggle switch on top of the box, and these are used to communicate with the user everything that is going on. When you connect a phone to the RasPi, the LEDs will walk you though connecting to the phone and running the exploits. Finally a pass or fail LED will glow to let you know what has just happened.During my conversation with Adam Outler, he noted that the success rate of the box is somewhere around 70% right now. The exploits loaded on the box handle nearly all standard Android firmware versions, and due to the open nature of CASUAL anyone can contribute when they have found new exploits. The box is something anyone can build for themselves, using the Headless mode designed for embedded devices like the Raspberry Pi.Anyone looking to contribute to this project can head over to the CASUAL google code page.