|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
11-16-2018, 10:59 | #1 (permalink) |
Freak Poster Join Date: Jun 2006 Location: Uzbekistan Bukhara
Posts: 109
Member: 300929 Status: Offline Thanks Meter: 27 | Samsung SM-J400F unlock question [Solved] Please keep phone's screen active! Initializing exploit...OK Инициализация...OK Считывание HWID...OK Считывание NV Data...OK Проверка зоны безопасности... Unknown security type! Резервная копия сохранена как файл C:\Program Files\Octoplus\Octoplus_Samsung\BACKUP\ReadCode*** *nosServerDump-SM-J400F-16-11-2018_12-56-52.oct Чтение кодов не удалось Выполнено с помощью ПО версии 2.7.4.3 Last edited by Octopus box; 11-16-2018 at 14:52. |
11-16-2018, 11:39 | #2 (permalink) |
Product Supporter Join Date: Oct 2009 Location: Romania, Bucharest
Posts: 99,841
Member: 1146942 Status: Offline Sonork: 100.1587278 Thanks Meter: 27,411 | Post here full Software log, not reduced, we will check in details. Also upload somewhere dump file "Dump-SM-J400F-16-11-2018_12-56-52.oct" and post here link, we will research it and will inform You the result. |
11-16-2018, 12:31 | #3 (permalink) | |
Freak Poster Join Date: Jun 2006 Location: Uzbekistan Bukhara
Posts: 109
Member: 300929 Status: Offline Thanks Meter: 27 | Quote:
INFO : 16.11.2018 13:08:27 > Platform: Samsung Android INFO : 16.11.2018 13:08:27 > Selected port: COM11 INFO : 16.11.2018 13:08:27 > Selected model: SM-J400F INFO : 16.11.2018 13:08:27 > Operation: Read Codes - Server WARN : 16.11.2018 13:08:28 > Please, press "OK" button on the phone to allow USB debugging. INFO : 16.11.2018 13:08:31 > Detected phone model: SM-J400F INFO : 16.11.2018 13:08:31 > Firmware compiled date: Tue May 15 22:40:22 KST 2018 INFO : 16.11.2018 13:08:31 > PDA version: J400FXXU1ARE8 INFO : 16.11.2018 13:08:31 > CSC version: J400FOJM1ARE8 INFO : 16.11.2018 13:08:31 > SW version: J400FXXU1ARE1 INFO : 16.11.2018 13:08:32 > Phone SN: RV8K70DB8WA INFO : 16.11.2018 13:08:32 > Android version: 8.0.0 (R16NW) INFO : 16.11.2018 13:08:32 > Sales code: KSA INFO : 16.11.2018 13:08:32 > Country: KSA INFO : 16.11.2018 13:08:32 > HW platform: exynos5 INFO : 16.11.2018 13:08:32 > HW Chip: exynos7570 INFO : 16.11.2018 13:08:32 > HW Modem: SHANNON305 INFO : 16.11.2018 13:08:32 > Security patch level: 2018-05-01 INFO : 16.11.2018 13:08:32 > Warranty Void: 0 INFO : 16.11.2018 13:08:32 > SIM 1 status: absent INFO : 16.11.2018 13:08:32 > SIM 2 status: absent INFO : 16.11.2018 13:08:32 > Codename: j4ltejx INFO : 16.11.2018 13:08:32 > ----------------------------------------------------------------------------------- WARN : 16.11.2018 13:08:32 > Connecting to server .. INFO : 16.11.2018 13:08:32 > Username: azizbuhSE_2018_1 INFO : 16.11.2018 13:08:34 > Connect to server successfull. INFO : 16.11.2018 13:08:34 > Checking smart card... INFO : 16.11.2018 13:08:38 > Smart card successfully checked. INFO : 16.11.2018 13:08:40 > Your balance: 100 credits. INFO : 16.11.2018 13:08:40 > ----------------------------------------------------------------------------------- INFO : 16.11.2018 13:08:40 > Checking operation... INFO : 16.11.2018 13:08:40 > OK INFO : 16.11.2018 13:08:40 > Rebooting phone INFO : 16.11.2018 13:08:44 > Searching for a phone. Please wait... INFO : 16.11.2018 13:10:03 > OK WARN : 16.11.2018 13:10:04 > Please keep phone's screen active! INFO : 16.11.2018 13:10:04 > Initializing exploit... INFO : 16.11.2018 13:10:22 > OK INFO : 16.11.2018 13:10:22 > Initializing... INFO : 16.11.2018 13:10:49 > OK INFO : 16.11.2018 13:10:49 > Reading HWID... INFO : 16.11.2018 13:10:51 > OK INFO : 16.11.2018 13:10:53 > Reading NV Data... INFO : 16.11.2018 13:13:49 > OK INFO : 16.11.2018 13:13:49 > Security checking... ERROR : 16.11.2018 13:13:55 > Unknown security type! INFO : 16.11.2018 13:13:56 > Backup saved as C:\Program Files\Octoplus\Octoplus_Samsung\BACKUP\ReadCode*** *nosServerDump-SM-J400F-16-11-2018_13-13-55.oct file ERROR : 16.11.2018 13:13:56 > Read codes failed INFO : 16.11.2018 13:14:01 > Performed by 2.7.4.3 Software version. dump file https://yadi.sk/d/PU3NG_8nf0hTdQ | |
11-16-2018, 14:11 | #4 (permalink) |
Product Supporter Join Date: Oct 2009 Location: Romania, Bucharest
Posts: 99,841
Member: 1146942 Status: Offline Sonork: 100.1587278 Thanks Meter: 27,411 | We have prepared and sent You test Software to PM. Try to perform the operation using this Software version and post here the result. Last edited by Octopus box; 11-16-2018 at 14:52. |
11-16-2018, 14:43 | #5 (permalink) | |
Freak Poster Join Date: Jun 2006 Location: Uzbekistan Bukhara
Posts: 109
Member: 300929 Status: Offline Thanks Meter: 27 | Quote:
INFO : 16.11.2018 16:32:02 > Selected port: COM11 INFO : 16.11.2018 16:32:02 > Selected model: SM-J400F INFO : 16.11.2018 16:32:02 > Operation: Read Codes - Server WARN : 16.11.2018 16:32:03 > Please, press "OK" button on the phone to allow USB debugging. WARN : 16.11.2018 16:32:09 > Please, press "OK" button on the phone to allow USB debugging. INFO : 16.11.2018 16:32:16 > Detected phone model: SM-J400F INFO : 16.11.2018 16:32:16 > Firmware compiled date: Fri Jul 13 22:01:54 KST 2018 INFO : 16.11.2018 16:32:16 > PDA version: J400FXXU2ARG7 INFO : 16.11.2018 16:32:16 > CSC version: J400FOJM2ARG7 INFO : 16.11.2018 16:32:16 > SW version: J400FXXU2ARG7 INFO : 16.11.2018 16:32:21 > Phone SN: RV8K70DB8WA INFO : 16.11.2018 16:32:21 > Android version: 8.0.0 (R16NW) INFO : 16.11.2018 16:32:21 > Sales code: KSA INFO : 16.11.2018 16:32:21 > Country: KSA INFO : 16.11.2018 16:32:21 > HW platform: exynos5 INFO : 16.11.2018 16:32:21 > HW Chip: exynos7570 INFO : 16.11.2018 16:32:21 > HW Modem: SHANNON305 INFO : 16.11.2018 16:32:21 > Security patch level: 2018-07-01 INFO : 16.11.2018 16:32:21 > Warranty Void: 0 INFO : 16.11.2018 16:32:22 > SIM 1 status: absent INFO : 16.11.2018 16:32:22 > SIM 2 status: absent INFO : 16.11.2018 16:32:22 > Codename: j4ltejx INFO : 16.11.2018 16:32:22 > ----------------------------------------------------------------------------------- WARN : 16.11.2018 16:32:22 > Connecting to server .. INFO : 16.11.2018 16:32:22 > Username: azizbuhSE_2018_1 INFO : 16.11.2018 16:32:23 > Connect to server successfull. INFO : 16.11.2018 16:32:23 > Checking smart card... INFO : 16.11.2018 16:32:27 > Smart card successfully checked. INFO : 16.11.2018 16:32:28 > Your balance: 100 credits. INFO : 16.11.2018 16:32:28 > ----------------------------------------------------------------------------------- INFO : 16.11.2018 16:32:28 > Checking operation... INFO : 16.11.2018 16:32:28 > OK INFO : 16.11.2018 16:32:28 > Rebooting phone INFO : 16.11.2018 16:32:32 > Searching for a phone. Please wait... INFO : 16.11.2018 16:33:52 > OK WARN : 16.11.2018 16:33:52 > Please keep phone's screen active! INFO : 16.11.2018 16:33:52 > Initializing exploit... INFO : 16.11.2018 16:34:11 > OK INFO : 16.11.2018 16:34:11 > Initializing... INFO : 16.11.2018 16:34:38 > OK INFO : 16.11.2018 16:34:38 > Reading HWID... INFO : 16.11.2018 16:34:40 > OK INFO : 16.11.2018 16:34:41 > Reading NV Data... INFO : 16.11.2018 16:37:32 > OK INFO : 16.11.2018 16:37:32 > Security checking... INFO : 16.11.2018 16:37:38 > OK INFO : 16.11.2018 16:37:46 > "Read Codes" operation will take 100 credits. Continue? WARN : 16.11.2018 16:37:46 > Sending request... INFO : 16.11.2018 16:37:52 > Calculating codes. Please wait... WARN : 16.11.2018 16:38:21 > FREEZE: 83174258 WARN : 16.11.2018 16:38:21 > NET LOCK: 79579286 WARN : 16.11.2018 16:38:21 > SUB LOCK: 00000000 WARN : 16.11.2018 16:38:21 > SP LOCK: 00000000 WARN : 16.11.2018 16:38:21 > CP LOCK: 00000000 INFO : 16.11.2018 16:38:21 > Performed by 2.7.4.6 Software version. worked, thank you very much Last edited by Octopus box; 11-16-2018 at 14:51. | |
The Following User Says Thank You to Azizbuh For This Useful Post: |
Bookmarks |
| |
|