Solved Post All Your Success Stories With Your EFT Dongle

This topic has been solved

rajsingh

Winner
Aug 21, 2018
919
250
india
Redmi 2014818 Flashing with eft

 

rajsingh

Winner
Aug 21, 2018
919
250
india
Note N950F free unlock 2x

Waiting For Android Device.....Done
Reading Device Info...
Device Model: SM-N950F
Device Manufacturer: samsung
Device Firmware: FA71_N950FXXU5ARI1
Device Serial: R58JB3WCMXX
Device Chipset: Exynos
Device IMEI: 3540750919801XX
Android Version: 7.1.1
Android SDK: 25
Firmware Country:
Firmware Code:
Checking Root.....Not Rooted!
Checking Device Environment.....Done
Calculating Encryption Code.....Done
Unlocking.....Done


Waiting For Android Device.....Done
Reading Device Info...
Device Model: SM-N950F
Device Manufacturer: samsung
Device Firmware: FA71_N950FXXU5ARI1
Device Serial: R58JC1CPYXX
Device Chipset: Exynos
Device IMEI: 3540750930791XX
Android Version: 7.1.1
Android SDK: 25
Firmware Country:
Firmware Code:
Checking Root.....Not Rooted!
Checking Device Environment.....Done
Calculating Encryption Code.....Done
Unlocking.....Done

Thx to orignal poster
 

rajsingh

Winner
Aug 21, 2018
919
250
india
Connecting Fastboot .......
Connecting Fastboot .......Ok
Model Phone: HUAWEI SCL-L21
SW: SCL-L21C432B130
Connecting Server .....RECEIVED
Connecting Server .....READY
Erase Done , The Device Will Reboot And Factory Reset
Reboot ...............OK
By EFT Dongle OK
 

rajsingh

Winner
Aug 21, 2018
919
250
india
Opening Port COM7...........OK
Verifying Download Mod
OK
Initialization.......OK
Reading Phone Partitation Table........OK
Partition Size : 8192
Unpak pit .......OK
FLASHING FIRMWARE TO PHONE.....
Sending data: ..........OK
FLASHING DONE!
Rebooting PDA TO NORMAL MODE........OK
Waiting For ADB Device.....Detecting Device Info.....DONE
Device Model: adb server is out of date. killing... * daemon started successfully * adb server is out of date. killing... * daemon started successfully * SM-G930F
Device CPU: adb server is out of date. killing... * daemon started successfully * adb server is out of date. killing... * daemon started successfully * arm64-v8a
Android SDK: adb server is out of date. killing... * daemon started successfully * adb server is out of date. killing... * daemon started successfully * 26
Android Version: adb server is out of date. killing... * daemon started successfully * adb server is out of date. killing... * daemon started successfully * 8.0.0
Resetting FRP.......OK
 

rajsingh

Winner
Aug 21, 2018
919
250
india
How to root new Samsung devices with EFT Dongle ( New Exclusive Method 2018)



Rooting with our new method needs the following conditions :

1- Device MUST be unlocked bootloader , FRP OFF , OEM OFF

2- RMM State MUST be Normal or Unavailable

3- Boot MUST be taken from same firmware as in device .





Br
Martview Team
 

rajsingh

Winner
Aug 21, 2018
919
250
india
Wating Device..........OK
CPU: MT6582
Chip Version: 0x0000ca01
Chip Ext Clock: EXT_26M
Writing Mode..........OK
Internal RAM:
Internal SRAM Size: 128.00 KB
External RAM: Type DRAM
External Ram Size: 1.00 GB
EMMC:
EMMC PART BOOT1 Size: 4.00 MB
EMMC PART BOOT2 Size: 4.00 MB
EMMC PART RPMB Size: 4.00 MB
EMMC PART USER Size: 7.28 GB
Battery:
Battery Voltage: 3864
Injection..........OK
Detecting Parts info............OK
[ID: 255] [PRELOADER] BaseAddr(0x00000000) Size(0x00c00000)
[ID: 255] [MBR] BaseAddr(0x00c00000) Size(0x00080000)
[ID: 255] [EBR1] BaseAddr(0x00c80000) Size(0x00080000)
[ID: 255] [PRO_INFO] BaseAddr(0x00d00000) Size(0x00300000)
[ID: 255] [NVRAM] BaseAddr(0x01000000) Size(0x00500000)
[ID: 255] [PROTECT_F] BaseAddr(0x01500000) Size(0x00a00000)
[ID: 255] [PROTECT_S] BaseAddr(0x01f00000) Size(0x00a00000)
[ID: 255] [SECCFG] BaseAddr(0x02900000) Size(0x00020000)
[ID: 255] [UBOOT] BaseAddr(0x02920000) Size(0x00060000)
[ID: 255] [BOOTIMG] BaseAddr(0x02980000) Size(0x01000000)
[ID: 255] [RECOVERY] BaseAddr(0x03980000) Size(0x01000000)
[ID: 255] [SEC_RO] BaseAddr(0x04980000) Size(0x00600000)
[ID: 255] [MISC] BaseAddr(0x04f80000) Size(0x00080000)
[ID: 255] [LOGO] BaseAddr(0x05000000) Size(0x00300000)
[ID: 255] [EXPDB] BaseAddr(0x05300000) Size(0x00a00000)
[ID: 255] [ANDROID] BaseAddr(0x05d00000) Size(0x3e800000)
[ID: 255] [CACHE] BaseAddr(0x44500000) Size(0x07e00000)
[ID: 255] [USRDATA] BaseAddr(0x4c300000) Size(0x185400000)
[ID: 255] [BMTPOOL] BaseAddr(0xffff00a8) Size(0x01500000)
Detecting Device info.......OK
Product: Micromax
Device Model: Micromax Q371
ID: KOT49H release-keys
Sw Internal:
Build Date: 2015年 01月 16日 星期五 17:48:50 CST
Chip Ver: S01
Android Version: 4.4.2
Architecture: armeabi-v7a
Formating... [USERDATA] .....OK
All Done By EFT Dongle
 
Last edited:

rajsingh

Winner
Aug 21, 2018
919
250
india
#711

Wating Device..........OK
CPU: MT6582
Chip Version: 0x0000ca01
Chip Ext Clock: EXT_26M
Writing Mode..........OK
Internal RAM:
Internal SRAM Size: 128.00 KB
External RAM: Type DRAM
External Ram Size: 1.00 GB
EMMC:
EMMC PART BOOT1 Size: 4.00 MB
EMMC PART BOOT2 Size: 4.00 MB
EMMC PART RPMB Size: 4.00 MB
EMMC PART USER Size: 7.28 GB
Battery:
Battery Voltage: 3855
Injection..........OK
Flashing images.............OK
All Done
Flash Done By EFT Dongle


Thx to orignal poster
 

rajsingh

Winner
Aug 21, 2018
919
250
india
Wating Device..........OK
CPU: MT6582
Chip Version: 0x0000ca01
Chip Ext Clock: EXT_26M
Writing Mode..........OK
Internal RAM:
Internal SRAM Size: 128.00 KB
External RAM: Type DRAM
External Ram Size: 1.00 GB
EMMC:
EMMC PART BOOT1 Size: 4.00 MB
EMMC PART BOOT2 Size: 4.00 MB
EMMC PART RPMB Size: 4.00 MB
EMMC PART USER Size: 7.28 GB
Battery:
Battery Voltage: 3864
Injection..........OK
Detecting Parts info............OK
[ID: 255] [PRELOADER] BaseAddr(0x00000000) Size(0x00c00000)
[ID: 255] [MBR] BaseAddr(0x00c00000) Size(0x00080000)
[ID: 255] [EBR1] BaseAddr(0x00c80000) Size(0x00080000)
[ID: 255] [PRO_INFO] BaseAddr(0x00d00000) Size(0x00300000)
[ID: 255] [NVRAM] BaseAddr(0x01000000) Size(0x00500000)
[ID: 255] [PROTECT_F] BaseAddr(0x01500000) Size(0x00a00000)
[ID: 255] [PROTECT_S] BaseAddr(0x01f00000) Size(0x00a00000)
[ID: 255] [SECCFG] BaseAddr(0x02900000) Size(0x00020000)
[ID: 255] [UBOOT] BaseAddr(0x02920000) Size(0x00060000)
[ID: 255] [BOOTIMG] BaseAddr(0x02980000) Size(0x01000000)
[ID: 255] [RECOVERY] BaseAddr(0x03980000) Size(0x01000000)
[ID: 255] [SEC_RO] BaseAddr(0x04980000) Size(0x00600000)
[ID: 255] [MISC] BaseAddr(0x04f80000) Size(0x00080000)
[ID: 255] [LOGO] BaseAddr(0x05000000) Size(0x00300000)
[ID: 255] [EXPDB] BaseAddr(0x05300000) Size(0x00a00000)
[ID: 255] [ANDROID] BaseAddr(0x05d00000) Size(0x3e800000)
[ID: 255] [CACHE] BaseAddr(0x44500000) Size(0x07e00000)
[ID: 255] [USRDATA] BaseAddr(0x4c300000) Size(0x185400000)
[ID: 255] [BMTPOOL] BaseAddr(0xffff00a8) Size(0x01500000)
Detecting Device info.......OK
Product: Micromax
Device Model: Micromax Q371
ID: KOT49H release-keys
Sw Internal:
Build Date: 2015年 01月 16日 星期五 17:48:50 CST
Chip Ver: S01
Android Version: 4.4.2
Architecture: armeabi-v7a
Formating... [USERDATA] .....OK
All Done By EFT Dongle

Thx To Orignal Poster
 

rajsingh

Winner
Aug 21, 2018
919
250
india
Wating Device..........OK
CPU: MT6582
Chip Version: 0x0000ca01
Chip Ext Clock: EXT_26M
Writing Mode..........OK
Internal RAM:
Internal SRAM Size: 128.00 KB
External RAM: Type DRAM
External Ram Size: 1.00 GB
EMMC:
EMMC PART BOOT1 Size: 4.00 MB
EMMC PART BOOT2 Size: 4.00 MB
EMMC PART RPMB Size: 4.00 MB
EMMC PART USER Size: 7.28 GB
Battery:
Battery Voltage: 3864
Injection..........OK
Detecting Parts info............OK
[ID: 255] [PRELOADER] BaseAddr(0x00000000) Size(0x00c00000)
[ID: 255] [MBR] BaseAddr(0x00c00000) Size(0x00080000)
[ID: 255] [EBR1] BaseAddr(0x00c80000) Size(0x00080000)
[ID: 255] [PRO_INFO] BaseAddr(0x00d00000) Size(0x00300000)
[ID: 255] [NVRAM] BaseAddr(0x01000000) Size(0x00500000)
[ID: 255] [PROTECT_F] BaseAddr(0x01500000) Size(0x00a00000)
[ID: 255] [PROTECT_S] BaseAddr(0x01f00000) Size(0x00a00000)
[ID: 255] [SECCFG] BaseAddr(0x02900000) Size(0x00020000)
[ID: 255] [UBOOT] BaseAddr(0x02920000) Size(0x00060000)
[ID: 255] [BOOTIMG] BaseAddr(0x02980000) Size(0x01000000)
[ID: 255] [RECOVERY] BaseAddr(0x03980000) Size(0x01000000)
[ID: 255] [SEC_RO] BaseAddr(0x04980000) Size(0x00600000)
[ID: 255] [MISC] BaseAddr(0x04f80000) Size(0x00080000)
[ID: 255] [LOGO] BaseAddr(0x05000000) Size(0x00300000)
[ID: 255] [EXPDB] BaseAddr(0x05300000) Size(0x00a00000)
[ID: 255] [ANDROID] BaseAddr(0x05d00000) Size(0x3e800000)
[ID: 255] [CACHE] BaseAddr(0x44500000) Size(0x07e00000)
[ID: 255] [USRDATA] BaseAddr(0x4c300000) Size(0x185400000)
[ID: 255] [BMTPOOL] BaseAddr(0xffff00a8) Size(0x01500000)
Detecting Device info.......OK
Product: Micromax
Device Model: Micromax Q371
ID: KOT49H release-keys
Sw Internal:
Build Date: 2015年 01月 16日 星期五 17:48:50 CST
Chip Ver: S01
Android Version: 4.4.2
Architecture: armeabi-v7a
Formating... [USERDATA] .....OK
All Done By EFT Dongle
 

rajsingh

Winner
Aug 21, 2018
919
250
india
Device..........OK
CPU: MT6582
Chip Version: 0x0000ca01
Chip Ext Clock: EXT_26M
Writing Mode..........OK
Internal RAM:
Internal SRAM Size: 128.00 KB
External RAM: Type DRAM
External Ram Size: 1.00 GB
EMMC:
EMMC PART BOOT1 Size: 4.00 MB
EMMC PART BOOT2 Size: 4.00 MB
EMMC PART RPMB Size: 4.00 MB
EMMC PART USER Size: 7.28 GB
Battery:
Battery Voltage: 3855
Injection..........OK
Flashing images.............OK
All Done
Flash Done By EFT Dongle
 

rajsingh

Winner
Aug 21, 2018
919
250
india
CPU: MT6571
Chip Version: 0x0000ca01
Chip Ext Clock: EXT_26M
Writing Mode..........OK
Internal RAM:
Internal SRAM Size: 128.00 KB
External RAM: Type DRAM
External Ram Size: 512.00 MB
EMMC:
EMMC PART BOOT1 Size: 4.00 MB
EMMC PART BOOT2 Size: 4.00 MB
EMMC PART RPMB Size: 4.00 MB
EMMC PART USER Size: 7.22 GB
Battery:
Battery Voltage: 3729
Injection..........OK
Detecting Parts info............OK
[ID: 255] [PRELOADER] BaseAddr(0x00000000) Size(0x04000000)
[ID: 255] [MBR] BaseAddr(0x04000000) Size(0x00080000)
[ID: 255] [EBR1] BaseAddr(0x04080000) Size(0x00080000)
[ID: 255] [PRO_INFO] BaseAddr(0x04100000) Size(0x00300000)
[ID: 255] [NVRAM] BaseAddr(0x04400000) Size(0x00500000)
[ID: 255] [PROTECT_F] BaseAddr(0x04900000) Size(0x00a00000)
[ID: 255] [PROTECT_S] BaseAddr(0x05300000) Size(0x00a00000)
[ID: 255] [SECCFG] BaseAddr(0x05d00000) Size(0x00020000)
[ID: 255] [UBOOT] BaseAddr(0x05d20000) Size(0x00080000)
[ID: 255] [BOOTIMG] BaseAddr(0x05da0000) Size(0x00600000)
[ID: 255] [RECOVERY] BaseAddr(0x063a0000) Size(0x00600000)
[ID: 255] [SEC_RO] BaseAddr(0x069a0000) Size(0x00040000)
[ID: 255] [MISC] BaseAddr(0x069e0000) Size(0x00080000)
[ID: 255] [LOGO] BaseAddr(0x06a60000) Size(0x00300000)
[ID: 255] [EXPDB] BaseAddr(0x06d60000) Size(0x00a00000)
[ID: 255] [ANDROID] BaseAddr(0x07760000) Size(0x40000000)
[ID: 255] [CACHE] BaseAddr(0x47760000) Size(0x08000000)
[ID: 255] [USRDATA] BaseAddr(0x4f760000) Size(0x60000000)
[ID: 255] [FAT] BaseAddr(0xaf760000) Size(0x11e0a0000)
[ID: 255] [BMTPOOL] BaseAddr(0xffff00a8) Size(0x01500000)
Detecting Device info.......OK
Product: alps
Device Model: D705
ID: ALPS.KK1.MP7.V1.25
Sw Internal:
Build Date: Fri Feb 26 17:38:27 CST 2016
Chip Ver: S01
Android Version: 4.4.2
Architecture: armeabi-v7a
Formating... [USERDATA] .....OK
All Done By EFT Dongle
 
Top