Hydra Oppo F1S Screen Lock Security Read successfully done by Hydra Tool

Hydra Tool

Mount Everest

Friend's Martview
Dec 26, 2020
1,273
546
Kathmandu, Nepal
Oppo F1S Screen Lock Security Read successfully done by Hydra Tool

Screen Short:



Logs:


=====================================
Searching for MTK Device...Found
Port Identification :DA_HIGHSPEED_VCOM
FriendlyName :MediaTek DA USB VCOM (Android) (COM47)
SymbolicName :\??\USB#VID_0E8D&PID_2001#5&2108ad5d&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 88B17F934CF97EB60A50FA19276FB2A5
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100525831424D4207177DC8319391 - RX1BMB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : A1601
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15331-user 5.1 LMY47I 1577332894 release-keys
Device : A1601
Board : full_oppo6750_15331
Display ID : A1601EX_11_A.41_191226
Security Patch : 2018-01-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

-------------------------------------
Operation : Read Pattern
Processing...
Searching PatternKey : . Found
Gesture Data : 06CF96F30A7283FF7258FCEF5CF587ED51156C37
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 1478
1 2 3
4 5 6
7 8 9

Ok

Elapsed Time : 00:00:03​

BR
Mount Everest
 
Top