Oppo A37m (Neo 9) Read Pattern code successfully done by Hydra Tool
Screen Short:
Logs:
1. Run MTK Tool and choose "Sosc"
2. Choose Brand and Module.
3. Go to "Service"–> "Tool"
4. Choose "Screen Lock Security"
5. Choose "Read Pattern " from "Method / Option" drop down menu.
6. Click on "Execute"
7. Connect device to computer using USB Data Cable.
8. Wait until the operation is completed.
2. Choose Brand and Module.
3. Go to "Service"–> "Tool"
4. Choose "Screen Lock Security"
5. Choose "Read Pattern " from "Method / Option" drop down menu.
6. Click on "Execute"
7. Connect device to computer using USB Data Cable.
8. Wait until the operation is completed.
Screen Short:
Logs:
BR=====================================
Searching for MTK Device...Found
Port Identification :DA_HIGHSPEED_VCOM
FriendlyName :MediaTek DA USB VCOM (Android) (COM106)
Device :5&356b5377&0&14
SymbolicName :\??\USB#VID_0E8D&PID_2001#5&356b5377&0&14#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0
Reading Device UniqueID, RAM and Flash Chip Info...
ERROR : ACK : 0x00010009[]
Reading GPT-EMMC [0x00008000] 130 Items
Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO A37m
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15127-user 5.1 LMY47I 1488448383 dev-keys
Device : A37
Board : full_oppo6750_15127
Display ID : A37m_11_A.18_170302
Security Patch : 2016-09-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
Fingerprint : OPPO/A37m/A37:5.1/LMY47I/1474447292:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted
-------------------------------------
Operation : Read Pattern
Processing...
Searching PatternKey : . Found
Gesture Data : 8E390861D6F37FCC9C0B745B4C24446EB3841E56
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 5326
1 2 3
4 5 6
7 8 9
Ok
Elapsed Time : 00:00:03
Mount Everest