GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 09-15-2021, 12:35   #1 (permalink)
Freak Poster
 
Join Date: Aug 2016
Location: Peshawar Pakistan
Posts: 140
Member: 2613197
Status: Offline
Sonork: 100.1673396
Thanks Meter: 29
Vivo S1 One CLick Done By Hydra


Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1633 (COM4)
Device :5&f609c7b&0&5
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&f609c7b&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking...Ok

C:\Hydra Tool\Backup\Preloader_dump\prel.tmp
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : E974017669548AE0196945496649BCA9
Stage 1..[Size:256504]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Preloader Initialization...
Parsing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 7F5F641201D1FE6DA9C2759C13757D51
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 150100445636444D42022F066A781775 - DV6DMB
Executing : ACCEPTED...

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
ID : RP1A.200720.012
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k68v1_64-user 11 RP1A.200720.012 eng.compil.20210409.214127 release-keys
Display ID : RP1A.200720.012 release-keys
Security Patch : 2021-03-01
Platform : =MTK6768
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k68v1_64.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__091521151510\MT6768_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x13208000]64 MB ->nvdata.bin...Ok
-persist[0x17208000]48 MB ->persist.bin...Ok
-protect1[0x1A208000]8 MB ->protect1.bin...Ok
-protect2[0x1AA08000]13.969 MB ->protect2.bin...Ok
-nvram[0x1DF80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0707__091521151510
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 7F5F641201D1FE6DA9C2759C13757D51
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 150100445636444D42022F066A781775 - DV6DMB

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
ID : RP1A.200720.012
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k68v1_64-user 11 RP1A.200720.012 eng.compil.20210409.214127 release-keys
Display ID : RP1A.200720.012 release-keys
Security Patch : 2021-03-01
Platform : =MTK6768
StorageType : mtp
Userdata State : Not Encrypted

----------------------------------------------
VIVO IMEI REPAIR
----------------------------------------------
OLD IMEI..
IMEI=86369XXXXXXXXXXX
IMEI2=8636XXXXXXXXXXX
Writing New IMEI..
IMEI1 : 86369XXXXXXXXXX
IMEI2 : 86369XXXXXXXXXX
ACK : 0xFFFFFFFF[]
Verifying IMEI...
ACK : 0xFFFFFFFF[]
IMEI=863691XXXXXXXXXX
IMEI2=86369XXXXXXXXXX

Rebooting Device [Reboot To Normal]
Reboot Done!!
  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 14:45.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.13244 seconds with 8 queries

SEO by vBSEO