Another Oppo A37F Read Pattern Done With Hydra Tool

sarfrazhusain

Friend's Martview
Aug 1, 2018
233
155
Unnao Uttar Pradesh India
Skype
sarfraz.husain1
Sonork ID
100.1608386
PayPal:

Donate money to this user
Selected Comport : Auto
Selected Loader : Auto

Searching Qualcomm 9008 Port[FOUND](COM4)
Getting device info.......
Serial No.: 0x24608E81
MSM ID : 0x007050E1
PBL Ver : 00000000
PK HASH : CC3153A80293939B90D02D3BF8B23E0292E452FEF662C74998421ADAD42A380F

Sending Firehose Loader[8916.mbn]Ok

Connecting to Firehose...
Ping... Ok
Configuration......Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1

Running : Ok

Phone Information........
Model : A37f
Brand : OPPO
Android Ver : 5.1.1
Board : msm8916
Display ID : A37fEX_11_170522
Security Patch : 2017-03-01
Emmc_size :
Platform : msm8916
Kernel ID : 2017-03-01
Marketname :
OTA Version Name : A37fEX_11_170522
SYS USB CONFIG :
FRPPST : /dev/block/bootdevice/by-name/config

======================================
All Done
======================================
Elapsed Time : 00:00:08


Selected Comport : Auto
Selected Loader : Auto

Searching Qualcomm 9008 Port[FOUND](COM4)
Getting device info.......
Serial No.: 0x24608E81
MSM ID : 0x007050E1
PBL Ver : 00000000
PK HASH : CC3153A80293939B90D02D3BF8B23E0292E452FEF662C74998421ADAD42A380F

Sending Firehose Loader[8916.mbn]Ok

Connecting to Firehose...
Ping... Ok
Configuration......Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1

Running : Ok

Phone Information........
Model : A37f
Brand : OPPO
Android Ver : 5.1.1
Board : msm8916
Display ID : A37fEX_11_170522
Security Patch : 2017-03-01
Emmc_size :
Platform : msm8916
Kernel ID : 2017-03-01
Marketname :
OTA Version Name : A37fEX_11_170522
SYS USB CONFIG :
FRPPST : /dev/block/bootdevice/by-name/config

======================================
Reading Pattern lock...
Trying to search : gatekeeper.pattern.key
Trying to search : personalpattern.key
Trying to search : cm_gesture.key
Trying to search : gesture.key FOUND
Gesture Data : D99F470CC3312D20EB38F5374CCA6971F69171E8
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 56328
1 2 3
4 5 6
7 8 9



All Done
======================================
Elapsed Time : 00:00:08
 
  • Like
Reactions: WEIRDIODE and FAROK
Top