View Single Post
Old 10-12-2021, 08:29   #1 (permalink)
diosa
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Oppo F1 Plus Read Screen Security With by Hydra

Oppo F1 Plus Read Screen Security With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : DA_HIGHSPEED_VCOM
FriendlyName : MediaTek DA USB VCOM (Android) (COM68)
Device : 6&2550cee7&0&4
SymbolicName :??USB#VID_0E8D&PID_2001#6&2550cee7&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : E49E7326A020745C2E9CC406613AF5BC
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A434F2E8337393 - HBG4a2

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : A1601
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15331-user 5.1 LMY47I 1502723706 release-keys
Device : A1601
Board : full_oppo6750_15331
Display ID : A1601EX_11_A.33_170814
Security Patch : 2017-08-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

-------------------------------------
Operation : Read Pattern
Processing...
Searching PatternKey : .0 Found
Gesture Data : C8C0B24A15DC8BBFD411427973574695230458F0
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 14789
1 2 3
4 5 6
7 8 9
Action Result : Ok

Elapsed Time : 00:00:03
  Reply With Quote
The Following User Says Thank You to diosa For This Useful Post:
 
Page generated in 0.10763 seconds with 7 queries