Hydra Huawei DUA-L22 writing NVDATA successfully done by Hydra Tool

Hydra Tool

Mount Everest

Friend's Martview
Dec 26, 2020
1,273
546
Kathmandu, Nepal
Huawei DUA-L22 writing NVDATA successfully done by Hydra Tool

Screen Short:



Logs:

=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM19)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&223f1529&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0699MT6739[6739]
BROM HW_SW_VER : 8A00 CB00 0002 0000
getMTKPayloadExploit : 0699
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0699MT6739[6739]
BROM HW_SW_VER : 8A00 CB00 0002 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6739.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
C0
Protocol : New
Synchronization...
SYNCSYNC
Mode : brom
Preloader Initialization...
Parsing preloader_dura64.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 5075DBEEF027DF5FB0B739AEACFAD5CB
ERAM Size : 0x0000000000020000 -128 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14,676 GB
eMMC CID : 90014A484147346132D439A31E4B56A9 - HAG4a2

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : HONOR
Vendor : HUAWEI
Model : DUA-L22
ID : HONORDUA-L22
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : "DUA-L22-user 8.1.0 HONORDUA-L22 1.0.0.132(C461) release-keys"
Device : HWDUA-M
Board : DUA-L22
Display ID : DUA-L22 1.0.0.132(C461)
Security Patch : 2018-11-05
Fingerprint : HONOR/DUA-L22/HWDUA-M:8.1.0/HONORDUA-L22/1.0.0.132(C461):user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_dura64.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0699_HONOR_DUA-L22_HWDUA-M_8.1.0_HONORDUA-L22_1.0.0.132(C461)_031821110048\MT6739_Android_scatter.txt
-pgpt[0x00000000]512 KB ->pgpt.bin...Ok
-frp[0x01600000]1024 KB ->frp.bin...Ok
-nvdata[0x01F00000]32 MB ->nvdata.bin...Ok
-nvram[0x0F700000]5 MB ->nvram.bin...Ok
-oeminfo[0x10DE0000]8 MB ->oeminfo.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0699_HONOR_DUA-L22_HWDUA-M_8.1.0_HONORDUA-L22_1.0.0.132(C461)_031821110048
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 5075DBEEF027DF5FB0B739AEACFAD5CB
ERAM Size : 0x0000000000020000 -128 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14,676 GB
eMMC CID : 90014A484147346132D439A31E4B56A9 - HAG4a2

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : HONOR
Vendor : HUAWEI
Model : DUA-L22
ID : HONORDUA-L22
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : "DUA-L22-user 8.1.0 HONORDUA-L22 1.0.0.132(C461) release-keys"
Device : HWDUA-M
Board : DUA-L22
Display ID : DUA-L22 1.0.0.132(C461)
Security Patch : 2018-11-05
Fingerprint : HONOR/DUA-L22/HWDUA-M:8.1.0/HONORDUA-L22/1.0.0.132(C461):user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Write NVDATA
Processing...
Writing nvdata file [nvdata.bin] Ok

Elapsed Time : 00:00:37
BR
Mount Everest

 
  • Like
Reactions: salahsal
Top