Hydra Oppo F1 Plus Read Screen Security With by Hydra

Hydra Tool

sero408

Friend's Martview
Sep 26, 2021
683
66
türkiye
Oppo F1 Plus Read Screen Security With by Hydra

190400000609_HMTKTool.exe_FM_ScreenLock_Read_Pattern_10-12-2021-110301.jpeg


=====================================
Searching for MTK Device... Found
Port Identification : DA_HIGHSPEED_VCOM
FriendlyName : MediaTek DA USB VCOM (Android) (COM68)
Device : 6&2550cee7&0&4
SymbolicName :??USB#VID_0E8D&PID_2001#6&2550cee7&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : E49E7326A020745C2E9CC406613AF5BC
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A434F2E8337393 - HBG4a2

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : A1601
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15331-user 5.1 LMY47I 1502723706 release-keys
Device : A1601
Board : full_oppo6750_15331
Display ID : A1601EX_11_A.33_170814
Security Patch : 2017-08-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

-------------------------------------
Operation : Read Pattern
Processing...
Searching PatternKey : .0 Found
Gesture Data : C8C0B24A15DC8BBFD411427973574695230458F0
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 14789
1 2 3
4 5 6
7 8 9
Action Result : Ok

Elapsed Time : 00:00:03



 
Top