|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
06-05-2018, 12:05 | #1 (permalink) |
No Life Poster Join Date: May 2013 Location: Far From Home..:(
Posts: 2,001
Member: 1948608 Status: Offline Thanks Meter: 1,743 | GALAXY S6 SM-G920F Write CERT Successfully DONE By Octopus ----------------------------------------------------------------------------------- Platform: Samsung Android Selected port: COM12 Selected model: SM-G920F Operation: Read Cert Please, press "OK" button on the phone to allow USB debugging. Detected phone model: SM-G920F Firmware compiled date: Fri Jan 27 19:36:16 KST 2017 PDA version: G920FXXU5DQAJ CSC version: G920FXFV5DQA1 SW version: G920FXXU5DQA2 Phone SN: RF8H72NZ30Y Android version: 6.0.1 (MMB29K) Sales code: XFV Country: South Africa HW platform: exynos5 HW Chip: exynos7420 HW Modem: SHANNON333 Security patch level: 2017-02-01 SIM 1 status: absent Codename: zerofltexx Initializing exploit...OK Executing exploit...OK Exploit has been executed successfully MSL deactivate successfully Reading Certificate... Checking Certificate file... Phone KeyID: 346 Certificate file successfully checked Certificate read successfully Performed by 2.6.9 Software version. ----------------------------------------------------------------------------------- Platform: Samsung Android Selected port: COM12 Selected model: SM-G920F Operation: Write Cert Selected file: D:\CERTI\New certi\PAID CERTI 1\SM-G920F_PAID_ 359845062631929_27-10-2016_22-23-41.cert Detected phone model: SM-G920F Firmware compiled date: Fri Jan 27 19:36:16 KST 2017 PDA version: G920FXXU5DQAJ CSC version: G920FXFV5DQA1 SW version: G920FXXU5DQA2 Phone SN: RF8H72NZ30Y Android version: 6.0.1 (MMB29K) Sales code: XFV Country: South Africa HW platform: exynos5 HW Chip: exynos7420 HW Modem: SHANNON333 Security patch level: 2017-02-01 SIM 1 status: not ready Codename: zerofltexx Checking Root: Phone is Rooted. Reading security backup, please wait... Backup saved as C:\Program Files (x86)\Octoplus\Octoplus_Samsung \BACKUP\Security-SM-G920F-RF8H72NZ30Y-05-06-2018_12-47- 52-.asec file Checking Certificate file... Checking Certificate failed Writing Certificate failed Performed by 2.6.9 Software version. ----------------------------------------------------------------------------------- Platform: Samsung Android Selected port: COM12 Selected model: SM-G920F Operation: Write Cert Selected file: D:\CERTI\New certi\PAID CERTI 1\SM-G920F_ 35xxxxxxxxxxxxx.cert Detected phone model: SM-G920F Firmware compiled date: Fri Jan 27 19:36:16 KST 2017 PDA version: G920FXXU5DQAJ CSC version: G920FXFV5DQA1 SW version: G920FXXU5DQA2 Phone SN: RF8H72NZ30Y Android version: 6.0.1 (MMB29K) Sales code: XFV Country: South Africa HW platform: exynos5 HW Chip: exynos7420 HW Modem: SHANNON333 Security patch level: 2017-02-01 SIM 1 status: not ready Codename: zerofltexx Checking Root: Phone is Rooted. Reading security backup, please wait... Backup saved as C:\Program Files (x86)\Octoplus\Octoplus_Samsung \BACKUP\Security-SM-G920F-RF8H72NZ30Y-05-06-2018_12-48- 49-.asec file Checking Certificate file... Certificate file successfully checked Initializing exploit...OK Executing exploit...OK Exploit has been executed successfully Certificate has been written successfully Please, restart the phone to apply changes Performed by 2.6.9 Software version. Last edited by Octopus box; 06-05-2018 at 15:01. |
The Following User Says Thank You to -Mosin- For This Useful Post: |
Bookmarks |
| |
|