Offline
Código:
Erase Userdata]
Connect Device in BROM Mode using VOL UP + DOWN and insert cable.
New device need TESTPOINT for BROM Mode.
Waiting for device...Found
Port Info : MediaTek USB Port (COM11) [\\?\usb#vid_0e8d&pid_0003#6&26bde6ad&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.2.0.0 [usb2ser.sys]
: BROM PORT
Hw ID : MT6877 [0959] Dimensity 900/1080
Details : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Active] [DAA Active]
MEID : 71C24FC72BE4E204CA2DE1FBB3FF5602
SoC ID[0] : 8B9A04608924AFE91DD53503A45BB311
SoC ID[1] : 00BC0C23CDB50940203E23A24DF8A50D
Executing Exploit...Done
Reading Preloader...OK
Saved as : preloader_ruby.bin
Loading EMI Config from Preloader...OK
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : brom
Speed : HIGH-SPEED
Reading EMI Configuration...OK
UFS CID : CE014B4D3846393030314A4D2D423831
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
HRID : B38DB9E706F54E029F89D0088BCE3FCA
Int. RAM : 0x0000000000070000 [448.00 KB]
Ext. RAM : 0x0000000200000000 [8.00 GB]
Flash ID : KM8F9001JM-B81
CID : CE014B4D3846393030314A4D2D423831
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000000400000 [4.00 MB]
USERAREA : 0x0000003B96000000 [238.34 GB]
Reading Parititon Info...OK
Formating Userdata...Done
Process finished
[NCK MTK Exploit Tool v1.6]
LOG TXT : 20250505_094636.txt
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FRP
Logs:
[Reset FRP]
Connect Device in BROM Mode using VOL UP + DOWN and insert cable.
New device need TESTPOINT for BROM Mode.
Waiting for device...Found
Port Info : MediaTek USB Port (COM11) [\\?\usb#vid_0e8d&pid_0003#6&26bde6ad&0&3#{f9f3ff14-ae21-48a0-8a25-8011a7a931d9}]
: MediaTek Inc., 3.2.0.0 [usb2ser.sys]
: BROM PORT
Hw ID : MT6877 [0959] Dimensity 900/1080
Details : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Active] [DAA Active]
MEID : 71C24FC72BE4E204CA2DE1FBB3FF5602
SoC ID[0] : 8B9A04608924AFE91DD53503A45BB311
SoC ID[1] : 00BC0C23CDB50940203E23A24DF8A50D
Executing Exploit...Done
Reading Preloader...OK
Saved as : preloader_ruby.bin
Loading EMI Config from Preloader...OK
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : brom
Speed : HIGH-SPEED
Reading EMI Configuration...OK
UFS CID : CE014B4D3846393030314A4D2D423831
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
HRID : B38DB9E706F54E029F89D0088BCE3FCA
Int. RAM : 0x0000000000070000 [448.00 KB]
Ext. RAM : 0x0000000200000000 [8.00 GB]
Flash ID : KM8F9001JM-B81
CID : CE014B4D3846393030314A4D2D423831
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000000400000 [4.00 MB]
USERAREA : 0x0000003B96000000 [238.34 GB]
Reading Parititon Info...OK
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.6]
LOG TXT : 20250505_095512.txt