Thread: NTool sneakpeak
View Single Post
Old 04-09-2018, 17:20   #1 (permalink)
the_laser
No Life Poster
 
Join Date: Feb 2002
Location: Russia
Age: 44
Posts: 2,681
Member: 9519
Status: Offline
Thanks Meter: 2,150
NTool sneakpeak

cooking degree : medium rare

Code:
RUNNING NTool 0.01
HMD PHONE "PL2Gxxxxxxxxxxxx" CONNECTED
model=P2A
sub_model=none
software version=PL2-213B-0-00WW-B09
SW model=00WW
build number=B09
hardware version=5.0
RF band id=G_850_900_1800_1900^W_1_2_5_8^L_1_3_5_7_8_20_28_
secure:yes
reported max download size: 536870912
getBootloaderType:commercial
SecVer:4
getBootloaderType:commercial
challenge:D611A10DD5955148ADE2077F13D8FB2AE0A37B0E
dm-veracity passed
extract and flash "B2N-0-213B-xbl_service.zip" to "xbl_a"
Extracted 2563273 bytes
extract and flash "B2N-0-213B-xbl_service.zip" to "xbl_b"
Extracted 2563273 bytes
extract and flash "B2N-0-213B-abl_service.zip" to "abl_a"
Extracted 380928 bytes
extract and flash "B2N-0-213B-abl_service.zip" to "abl_b"
Extracted 380928 bytes
device PL2Gxxxxxxxxxxxx removed
HMD phone "PL2Gxxxxxxxxxxxx" removed
HMD PHONE "PL2Gxxxxxxxxxxxx" CONNECTED
perform auth routine
SecVer:4
getBootloaderType:service
ProjectCode:PL2
UID:xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Using cached signature
service key auth passed
flash "B2N-0-213B-gpt_both0.bin" to "partition"
skip flashing B2N-0-213B-xbl_service.elf
skip flashing B2N-0-213B-xbl_service.elf
extract and flash "B2N-0-213B-xbl_service.zip" to "xbl_a"
Extracted 2563273 bytes
extract and flash "B2N-0-213B-xbl_service.zip" to "xbl_b"
Extracted 2563273 bytes
skip flashing B2N-0-213B-abl_service.elf
skip flashing B2N-0-213B-abl_service.elf
extract and flash "B2N-0-213B-abl_service.zip" to "abl_a"
Extracted 380928 bytes
extract and flash "B2N-0-213B-abl_service.zip" to "abl_b"
Extracted 380928 bytes
flash "B2N-0-213B-tz.mbn" to "tz_a"
flash "B2N-0-213B-rpm.mbn" to "rpm_a"
flash "B2N-0-213B-hwcfg.img" to "hwcfg"
flash "B2N-0-213B-hyp.mbn" to "hyp_a"
flash "B2N-0-213B-pmic.elf" to "pmic_a"
flash "B2N-0-213B-keymaster64.mbn" to "keymaster_a"
flash "B2N-0-213B-cmnlib.mbn" to "cmnlib_a"
flash "B2N-0-213B-cmnlib64.mbn" to "cmnlib64_a"
flash "B2N-0-213B-dspso.bin" to "dsp_a"
flash "B2N-0-213B-devcfg.mbn" to "devcfg_a"
flash "B2N-0-213B-sec.dat" to "sec"
flash "B2N-0-213B-mdtpsecapp.mbn" to "mdtpsecapp_a"
flash "B2N-0-213B-storsec.mbn" to "storsec"
flash "systeminfo.img" to "systeminfo_a"
perform "reboot-bootloader"
device PL2Gxxxxxxxxxxxx removed
HMD phone "PL2Gxxxxxxxxxxxx" removed
HMD PHONE "PL2Gxxxxxxxxxxxx" CONNECTED
perform auth routine
SecVer:4
getBootloaderType:service
ProjectCode:PL2
UID:xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Using cached signature
service key auth passed
flash "B2N-1-213B-NON-HLOS.bin" to "modem_a"
flash "B2N-0-213B-00WW-mdtp.img" to "mdtp_a"
flash "PL2-0-213B-00WW-boot.img" to "boot_a"
erase "boot_b"
flash "PL2-0-213B-00WW-system.img" to "system_a"
TotalSize: 0000003221225472
flash "PL2-0-213B-00WW-system_other.img" to "system_b"
TotalSize: 0000003221225472
flash "B2N-0-213B-BTFM.bin" to "bluetooth_a"
flash "B2N-0-213B-00WW-persist.img" to "persist"
TotalSize: 0000000033554432
erase "userdata" if not retain user data
flash "PL2-00WW-001-sutinfo.img" to "sutinfo"
flash "B2N-0-213B-NV-default.mbn" to "nvdef_a"
flash "C1N-0-0020-0001-hidden.img.ext4" to "hidden_a"
flash "PL2-00WW-018-cda.img" to "cda_a"
erase "ssd" if not retain user data
erase "misc" if not retain user data
erase "sti" if not retain user data
flash "PL2-00WW-018-splash.img" to "splash_a"
flash "PL2-00WW-018-multi-splash.img" to "splash2"
erase "ddr"
erase "securefs" on factory
skip, options: 0000000000000001 bootName "KEY_INFO"
skip, options: 0000000000000001 bootName "box"
flash "PL2-0-213B-00WW-vendor.img" to "vendor_a"
TotalSize: 0000001073741824
flash "B2N-0-213B-xbl.elf" to "xbl_a"
flash "B2N-0-213B-xbl.elf" to "xbl_b"
flash "B2N-0-213B-abl.elf" to "abl_a"
flash "B2N-0-213B-abl.elf" to "abl_b"
perform "oem set_active _a"
perform "oem enable-charger-screen"
skip, options: 0000000000000001 bootName "cda"
skip, options: 0000000000000001 bootName "e2p_package"
skip, options: 0000000000000001 bootName "e2p_script"
flash "md4.dat" to "md4"
Elapsed: 201 secs.
any HMD smartphones supported: nokia1, nokia2, nokia3, nokia5, nokia6, nokia6.1, nokia7, nokia 7+, nokia8, nokia8 sirocco

EDL mode not required.

IMEI/BT/MAC change, which do not damage network.
bootloader unlock.
.....

reasonable cheap
really soon
  Reply With Quote
The Following 15 Users Say Thank You to the_laser For This Useful Post:
Show/Hide list of the thanked
 
Page generated in 0.09950 seconds with 7 queries