Qnt T702 Reading Pattern successfully done by Hydra Tool
Screen Short:
Logs:
Screen Short:
Logs:
BRBrand : AUTO Model : AUTO Connection : Flash Mode
=====================================
Connection
-Please wait...
-Found...[COM19]
TPortConnection.Create...(COM19)..Opening...Ok
Reading System Info
Brand : Qnet
Vendor : alps
Model : T702
ID : LMY47I
SDK : 22
Release : 5.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : full_hct6580_weg_a_l-user 5.1 LMY47I 1560392930 test-keys
Device : Glory_G5
Display ID : LMY47I test-keys
Security Patch : 2016-06-01
Platform : mt6580
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
Fingerprint : alps/full_hct6580_weg_a_l/hct6580_weg_a_l:5.1/LMY47I/1560392930:user/test-keys
StorageType : mtp
Userdata State : Not Encrypted
-------------------------------------
Operation : Read Pattern
Processing...
Searching PatternKey : . Found
Gesture Data : 5F59ED28AD9F83E7D808B76F1003FDA7EABC2FFC
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 235789
1 2 3
4 5 6
7 8 9
Ok
TPortConnection.Destroy.....Closing...Ok..
Elapsed Time : 00:00:04
Mount Everest