Oppo A59st Read Screen Security done With by Hydra
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM5)
Device : 6&e72cee4&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#6&e72cee4&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Opened handle..
Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 6BA1353CCD30BCCC62CCBC3FF2B686C6
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A4024524DFB349 - HBG4a2
Reading GPT -EMMC [0x00008000] 130 Items
Reading System Info
Brand : OPPO
Vendor : OPPO
Model : A1601
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15331-user 5.1 LMY47I 1473107983 release-keys
Device : A1601
Board : full_oppo6750_15131
Display ID : A1601EX_11_A.20_170715
Security Patch : 2016-08-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Not Encrypted
-------------------------------------
Operation : Read Pattern
Processing...
Searching PatternKey : .0 Found
Gesture Data : C4303A8C6C7C3CE77D406F3823E3055CD0B1609E
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 159637
1 2 3
4 5 6
7 8 9
Action Result : Ok
Elapsed Time : 00:00:03