Offline
cuenta Google Tablet Alcatel 8092 frp con nck
con nck seleccionas CPU MT8167 selecccionas la casilla bypass security
Exe version: NCKDongle AndroidMTK 2.7.9
Selected model: 0-By CPU MT8167
[auto]Action: Reset FRP
Phone must be off with battery inside.
Battery must be charged
Please insert USB cable now...
Keep "VOL-" button untill inserting USB cable.
For some phones need to keep "VOL+ and VOL-" button untill inserting USB cable.
For some phones need to keep "VOL+" button untill inserting USB cable.
Detected(14) : MediaTek USB Port_V1632 (COM14)
[14] \\?\usb#vid_0e8d&pid_0003#5&2191cfca&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
CPU: MT8167 CPU code: 8167 Target config: e7
***********************
Secure boot enabled: true
Need serial link authorization: true
Need download agent authorization: true
SWJTAG enabled: true
EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: false
Root cert required: false
Memory read authorization: true
Memory write authorization: true
Cmd 0xC8 blocked: true
***********************
Executing exploit, do not disconnect phone
Exploit has been executed successfully.
[2b800]Dumping phone preloader.
Preloader: C:\ProgramData\Android_MTK_Backup_Folder\preloader_backup\preloader_t6730_p4mme_32b.bin
Waiting for handle to become active......
Reseived active handle repply from phone......
Booting phone
Detected(14) : MediaTek USB Port_V1632 (COM14)
[14] \\?\usb#vid_0e8d&pid_0003#5&2191cfca&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Boot mode: Brom
Phone detected...Please wait
BBCHIP: 8167 1 cb00
Using Algo 1.
Helio MT8167 phone detected, swithing to helio api
Helio enabled DRAM in First Da: FALSE
Sending loader.....
BBCHIP MT8167
[1]Storage EMMC
Block size: 512
EMMC FW VERSION: 00:00:00:00:00:00:00:00
EMMC CID: 880103534C4433 : 000000000000000000
EMMC UA SIZE: 0x73a000000
BOOT STYLE: EMMC BOOT
FULL LENGTH: 0x73ac00000 [28.918 GB]
High speed disabled by user, continue with this settings.
[EMMC]FORMAT
[0]FRP Reset Done.
[helio]Wait untill phone will start charging.
[0]All done.
con nck seleccionas CPU MT8167 selecccionas la casilla bypass security
Exe version: NCKDongle AndroidMTK 2.7.9
Selected model: 0-By CPU MT8167
[auto]Action: Reset FRP
Phone must be off with battery inside.
Battery must be charged
Please insert USB cable now...
Keep "VOL-" button untill inserting USB cable.
For some phones need to keep "VOL+ and VOL-" button untill inserting USB cable.
For some phones need to keep "VOL+" button untill inserting USB cable.
Detected(14) : MediaTek USB Port_V1632 (COM14)
[14] \\?\usb#vid_0e8d&pid_0003#5&2191cfca&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
CPU: MT8167 CPU code: 8167 Target config: e7
***********************
Secure boot enabled: true
Need serial link authorization: true
Need download agent authorization: true
SWJTAG enabled: true
EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: false
Root cert required: false
Memory read authorization: true
Memory write authorization: true
Cmd 0xC8 blocked: true
***********************
Executing exploit, do not disconnect phone
Exploit has been executed successfully.
[2b800]Dumping phone preloader.
Preloader: C:\ProgramData\Android_MTK_Backup_Folder\preloader_backup\preloader_t6730_p4mme_32b.bin
Waiting for handle to become active......
Reseived active handle repply from phone......
Booting phone
Detected(14) : MediaTek USB Port_V1632 (COM14)
[14] \\?\usb#vid_0e8d&pid_0003#5&2191cfca&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Boot mode: Brom
Phone detected...Please wait
BBCHIP: 8167 1 cb00
Using Algo 1.
Helio MT8167 phone detected, swithing to helio api
Helio enabled DRAM in First Da: FALSE
Sending loader.....
BBCHIP MT8167
[1]Storage EMMC
Block size: 512
EMMC FW VERSION: 00:00:00:00:00:00:00:00
EMMC CID: 880103534C4433 : 000000000000000000
EMMC UA SIZE: 0x73a000000
BOOT STYLE: EMMC BOOT
FULL LENGTH: 0x73ac00000 [28.918 GB]
High speed disabled by user, continue with this settings.
[EMMC]FORMAT
[0]FRP Reset Done.
[helio]Wait untill phone will start charging.
[0]All done.