View Single Post
Old 02-10-2021, 04:59   #1191 (permalink)
Dipendra Pathak
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Poco M2 (shiva) FRP successfully removed by Hydra Tool

Xiaomi Poco M2 (shiva) FRP successfully removed by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : XIAOMI Model : POCO M2 (shiva) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM9]

TPortConnection.Create...(COM9)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707 (0000)MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0707
#Executing Exploit..
#SUCCESS..

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707 (0000)MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6768.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_shiva.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : AED0FCAF7B8AD468782B398164D7C6AF
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116.484 GB
eMMC CID : 90014A68444561503303000B1155675F - hDEaP3

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_shiva.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\__0707--__040221152623\MT6768_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-nvram[0x19F80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\__0707--__040221152623
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : AED0FCAF7B8AD468782B398164D7C6AF
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116.484 GB
eMMC CID : 90014A68444561503303000B1155675F - hDEaP3

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove MiAccount[Erase Method] + FRP
Processing...
-persist.bin[0x104A2000]48 MB ->persist.bin...Ok
-frp.bin[0x05508000]1024 KB ->frp.bin...Ok
__020421152646
Backing up Partition for safety...
-__020421152646[0x104A2000]48 MB ->persist.img...OkOk
Saved to :
C:\Hydra Tool\Backup\Persist\__020421152646.bin
Erasing FRP Partition...
-persist.bin[0x104A2000]48 MB ->persist.bin...Ok
-frp.bin[0x05508000]1024 KB ->frp.bin...Ok Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:01:37
BR
Dipendra Pathak

  Reply With Quote
 
Page generated in 0.09123 seconds with 7 queries