ob: Reset FRP
Mode: Brom security bypass
Connect Device in BROM Mode using VOL UP + DOWN and insert cable.
New device need TESTPOINT for BROM Mode.
Waiting for device...Found
Port Info : MediaTek USB Port (COM56) [\\?\usb#vid_0e8d&pid_0003#6&3a34e632&0&1#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1512.0 [usb2ser.sys]
: BROM PORT
Hw ID : MT6768 [0707] Helio P65/G85 k68v1
Details : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : 66A4E56E3037CD434D78709867D0A5AA
SoC ID[0] : 7D7D11713F5E620CCC1E2C7D7D4CD5A2
SoC ID[1] : 20280B4A06C94F0526870EC0FC8563D7
Executing Exploit...Done
Reading Preloader...OK
Saved as : preloader_v551a.bin
Loading EMI Config from Preloader...OK
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : brom
Speed : HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID : C4010D545753432020B3150547BB7C47
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
HRID : BDD4C49D0AB194EDB199AAC1E2EAC171
Int. RAM : 0x0000000000070000 [448.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : TWSC
CID : C4010D545753432020B3150547BB7C47
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E90000000 [58.25 GB]
Reading Parititon Info...OK
SuperPartList: odm_dlkm_a begin: 0x4B900000
SuperPartList: odm_dlkm_b begin: 0x4BA00000
SuperPartList: product_a begin: 0x4BA00000
SuperPartList: product_b begin: 0xA0F00000
SuperPartList: system_a begin: 0xA0F00000
SuperPartList: system_b begin: 0xE0200000
SuperPartList: system_dlkm_a begin: 0xE0200000
SuperPartList: system_dlkm_b begin: 0xE0900000
SuperPartList: system_ext_a begin: 0xE0900000
SuperPartList: system_ext_b begin: 0xF5F00000
SuperPartList: vendor_a begin: 0xF5F00000
SuperPartList: vendor_b begin: 0x104800000
SuperPartList: vendor_dlkm_a begin: 0x104800000
SuperPartList: vendor_dlkm_b begin: 0x4B800000
IMEI 1: 862640083974907
IMEI 2: 862640084074905
Reset FRP Data...Done
If FRP remain on Phone, Then Try Reset FRP 2025
Process finished
[NCK MTK Exploit Tool v2.2]