Oppo A37F Read Pattern Lock Done with Hydra Tool

sarfrazhusain

Friend's Martview
Aug 1, 2018
233
155
Unnao Uttar Pradesh India
Skype
sarfraz.husain1
Sonork ID
100.1608386
PayPal:

Donate money to this user
Selected Comport : Auto
Selected Loader : Auto

Searching Qualcomm 9008 Port[FOUND](COM4)
Getting device info..
Device MODE : SAHARA

Connecting to Firehose...
Ping.. Ok
Configuration......Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1

Running : Ok

Phone Information......
Model : A37f
Brand : OPPO
Android Ver : 5.1.1
Manufacturer : OPPO
Device :
Board : msm8916
Display ID : A37fEX_11_190228
Security Patch : 2018-03-01
Platform : msm8916
Kernel ID : 2018-03-01
FRPPST : /dev/block/bootdevice/by-name/config

======================================
Read Pattern Lock
Operation : Read Pattern Lock
Read Pattern Lock
Trying to search : gatekeeper.pattern.key
Trying to search : personalpattern.key
Trying to search : cm_gesture.key
Trying to search : gesture.key FOUND
Gesture Data : 455F1812DD00B042129518EF3082F6B756147142
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 7589
1 2 3
4 5 6
7 8 9
 
Top