GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Hard/Software Products (official support) > Octopus/Octoplus > Octopus Samsung/Octoplus Samsung


Reply
 
LinkBack Thread Tools Display Modes
Old 11-16-2018, 10:59   #1 (permalink)
Freak Poster
 
Join Date: Jun 2006
Location: Uzbekistan Bukhara
Posts: 109
Member: 300929
Status: Offline
Thanks Meter: 27
Thumbs up Samsung SM-J400F unlock question [Solved]


Проверка операции...OK
Please keep phone's screen active!
Initializing exploit...OK
Инициализация...OK
Считывание HWID...OK
Считывание NV Data...OK
Проверка зоны безопасности...
Unknown security type!
Резервная копия сохранена как файл C:\Program Files\Octoplus\Octoplus_Samsung\BACKUP\ReadCode*** *nosServerDump-SM-J400F-16-11-2018_12-56-52.oct
Чтение кодов не удалось
Выполнено с помощью ПО версии 2.7.4.3

Last edited by Octopus box; 11-16-2018 at 14:52.
  Reply With Quote
Old 11-16-2018, 11:39   #2 (permalink)
Product Supporter
 
Octopus box's Avatar
 
Join Date: Oct 2009
Location: Romania, Bucharest
Posts: 99,841
Member: 1146942
Status: Offline
Sonork: 100.1587278
Thanks Meter: 27,411
Post here full Software log, not reduced, we will check in details.

Also upload somewhere dump file "Dump-SM-J400F-16-11-2018_12-56-52.oct" and post here link, we will research it and will inform You the result.
  Reply With Quote
Old 11-16-2018, 12:31   #3 (permalink)
Freak Poster
 
Join Date: Jun 2006
Location: Uzbekistan Bukhara
Posts: 109
Member: 300929
Status: Offline
Thanks Meter: 27
Quote:
Originally Posted by Octopus box View Post
Post here full Software log, not reduced, we will check in details.

Also upload somewhere dump file "Dump-SM-J400F-16-11-2018_12-56-52.oct" and post here link, we will research it and will inform You the result.
INFO : 16.11.2018 13:08:26 > -----------------------------------------------------------------------------------
INFO : 16.11.2018 13:08:27 > Platform: Samsung Android
INFO : 16.11.2018 13:08:27 > Selected port: COM11
INFO : 16.11.2018 13:08:27 > Selected model: SM-J400F
INFO : 16.11.2018 13:08:27 > Operation: Read Codes - Server
WARN : 16.11.2018 13:08:28 > Please, press "OK" button on the phone to allow USB debugging.
INFO : 16.11.2018 13:08:31 > Detected phone model: SM-J400F
INFO : 16.11.2018 13:08:31 > Firmware compiled date: Tue May 15 22:40:22 KST 2018
INFO : 16.11.2018 13:08:31 > PDA version: J400FXXU1ARE8
INFO : 16.11.2018 13:08:31 > CSC version: J400FOJM1ARE8
INFO : 16.11.2018 13:08:31 > SW version: J400FXXU1ARE1
INFO : 16.11.2018 13:08:32 > Phone SN: RV8K70DB8WA
INFO : 16.11.2018 13:08:32 > Android version: 8.0.0 (R16NW)
INFO : 16.11.2018 13:08:32 > Sales code: KSA
INFO : 16.11.2018 13:08:32 > Country: KSA
INFO : 16.11.2018 13:08:32 > HW platform: exynos5
INFO : 16.11.2018 13:08:32 > HW Chip: exynos7570
INFO : 16.11.2018 13:08:32 > HW Modem: SHANNON305
INFO : 16.11.2018 13:08:32 > Security patch level: 2018-05-01
INFO : 16.11.2018 13:08:32 > Warranty Void: 0
INFO : 16.11.2018 13:08:32 > SIM 1 status: absent
INFO : 16.11.2018 13:08:32 > SIM 2 status: absent
INFO : 16.11.2018 13:08:32 > Codename: j4ltejx
INFO : 16.11.2018 13:08:32 > -----------------------------------------------------------------------------------
WARN : 16.11.2018 13:08:32 > Connecting to server ..
INFO : 16.11.2018 13:08:32 > Username: azizbuhSE_2018_1
INFO : 16.11.2018 13:08:34 > Connect to server successfull.
INFO : 16.11.2018 13:08:34 > Checking smart card...
INFO : 16.11.2018 13:08:38 > Smart card successfully checked.
INFO : 16.11.2018 13:08:40 > Your balance: 100 credits.
INFO : 16.11.2018 13:08:40 > -----------------------------------------------------------------------------------
INFO : 16.11.2018 13:08:40 > Checking operation...
INFO : 16.11.2018 13:08:40 > OK
INFO : 16.11.2018 13:08:40 > Rebooting phone
INFO : 16.11.2018 13:08:44 > Searching for a phone. Please wait...
INFO : 16.11.2018 13:10:03 > OK
WARN : 16.11.2018 13:10:04 > Please keep phone's screen active!
INFO : 16.11.2018 13:10:04 > Initializing exploit...
INFO : 16.11.2018 13:10:22 > OK
INFO : 16.11.2018 13:10:22 > Initializing...
INFO : 16.11.2018 13:10:49 > OK
INFO : 16.11.2018 13:10:49 > Reading HWID...
INFO : 16.11.2018 13:10:51 > OK
INFO : 16.11.2018 13:10:53 > Reading NV Data...
INFO : 16.11.2018 13:13:49 > OK
INFO : 16.11.2018 13:13:49 > Security checking...
ERROR : 16.11.2018 13:13:55 > Unknown security type!
INFO : 16.11.2018 13:13:56 > Backup saved as C:\Program Files\Octoplus\Octoplus_Samsung\BACKUP\ReadCode*** *nosServerDump-SM-J400F-16-11-2018_13-13-55.oct file
ERROR : 16.11.2018 13:13:56 > Read codes failed
INFO : 16.11.2018 13:14:01 > Performed by 2.7.4.3 Software version.


dump file

https://yadi.sk/d/PU3NG_8nf0hTdQ
  Reply With Quote
Old 11-16-2018, 14:11   #4 (permalink)
Product Supporter
 
Octopus box's Avatar
 
Join Date: Oct 2009
Location: Romania, Bucharest
Posts: 99,841
Member: 1146942
Status: Offline
Sonork: 100.1587278
Thanks Meter: 27,411
We have prepared and sent You test Software to PM. Try to perform the operation using this Software version and post here the result.

Last edited by Octopus box; 11-16-2018 at 14:52.
  Reply With Quote
Old 11-16-2018, 14:43   #5 (permalink)
Freak Poster
 
Join Date: Jun 2006
Location: Uzbekistan Bukhara
Posts: 109
Member: 300929
Status: Offline
Thanks Meter: 27
Quote:
Originally Posted by Octopus box View Post
We have prepared and sent You test Software to PM. Try to perform the operation using this Software version and post here the result.
INFO : 16.11.2018 16:32:02 > Platform: Samsung Android
INFO : 16.11.2018 16:32:02 > Selected port: COM11
INFO : 16.11.2018 16:32:02 > Selected model: SM-J400F
INFO : 16.11.2018 16:32:02 > Operation: Read Codes - Server
WARN : 16.11.2018 16:32:03 > Please, press "OK" button on the phone to allow USB debugging.
WARN : 16.11.2018 16:32:09 > Please, press "OK" button on the phone to allow USB debugging.
INFO : 16.11.2018 16:32:16 > Detected phone model: SM-J400F
INFO : 16.11.2018 16:32:16 > Firmware compiled date: Fri Jul 13 22:01:54 KST 2018
INFO : 16.11.2018 16:32:16 > PDA version: J400FXXU2ARG7
INFO : 16.11.2018 16:32:16 > CSC version: J400FOJM2ARG7
INFO : 16.11.2018 16:32:16 > SW version: J400FXXU2ARG7
INFO : 16.11.2018 16:32:21 > Phone SN: RV8K70DB8WA
INFO : 16.11.2018 16:32:21 > Android version: 8.0.0 (R16NW)
INFO : 16.11.2018 16:32:21 > Sales code: KSA
INFO : 16.11.2018 16:32:21 > Country: KSA
INFO : 16.11.2018 16:32:21 > HW platform: exynos5
INFO : 16.11.2018 16:32:21 > HW Chip: exynos7570
INFO : 16.11.2018 16:32:21 > HW Modem: SHANNON305
INFO : 16.11.2018 16:32:21 > Security patch level: 2018-07-01
INFO : 16.11.2018 16:32:21 > Warranty Void: 0
INFO : 16.11.2018 16:32:22 > SIM 1 status: absent
INFO : 16.11.2018 16:32:22 > SIM 2 status: absent
INFO : 16.11.2018 16:32:22 > Codename: j4ltejx
INFO : 16.11.2018 16:32:22 > -----------------------------------------------------------------------------------
WARN : 16.11.2018 16:32:22 > Connecting to server ..
INFO : 16.11.2018 16:32:22 > Username: azizbuhSE_2018_1
INFO : 16.11.2018 16:32:23 > Connect to server successfull.
INFO : 16.11.2018 16:32:23 > Checking smart card...
INFO : 16.11.2018 16:32:27 > Smart card successfully checked.
INFO : 16.11.2018 16:32:28 > Your balance: 100 credits.
INFO : 16.11.2018 16:32:28 > -----------------------------------------------------------------------------------
INFO : 16.11.2018 16:32:28 > Checking operation...
INFO : 16.11.2018 16:32:28 > OK
INFO : 16.11.2018 16:32:28 > Rebooting phone
INFO : 16.11.2018 16:32:32 > Searching for a phone. Please wait...
INFO : 16.11.2018 16:33:52 > OK
WARN : 16.11.2018 16:33:52 > Please keep phone's screen active!
INFO : 16.11.2018 16:33:52 > Initializing exploit...
INFO : 16.11.2018 16:34:11 > OK
INFO : 16.11.2018 16:34:11 > Initializing...
INFO : 16.11.2018 16:34:38 > OK
INFO : 16.11.2018 16:34:38 > Reading HWID...
INFO : 16.11.2018 16:34:40 > OK
INFO : 16.11.2018 16:34:41 > Reading NV Data...
INFO : 16.11.2018 16:37:32 > OK
INFO : 16.11.2018 16:37:32 > Security checking...
INFO : 16.11.2018 16:37:38 > OK
INFO : 16.11.2018 16:37:46 > "Read Codes" operation will take 100 credits. Continue?
WARN : 16.11.2018 16:37:46 > Sending request...
INFO : 16.11.2018 16:37:52 > Calculating codes. Please wait...
WARN : 16.11.2018 16:38:21 > FREEZE: 83174258
WARN : 16.11.2018 16:38:21 > NET LOCK: 79579286
WARN : 16.11.2018 16:38:21 > SUB LOCK: 00000000
WARN : 16.11.2018 16:38:21 > SP LOCK: 00000000
WARN : 16.11.2018 16:38:21 > CP LOCK: 00000000
INFO : 16.11.2018 16:38:21 > Performed by 2.7.4.6 Software version.

worked, thank you very much

Last edited by Octopus box; 11-16-2018 at 14:51.
  Reply With Quote
The Following User Says Thank You to Azizbuh For This Useful Post:
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 01:25.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.16264 seconds with 9 queries

SEO by vBSEO