Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bypass does not work, what to do? #75

Open
Mr4ucker opened this issue Mar 12, 2022 · 0 comments
Open

Bypass does not work, what to do? #75

Mr4ucker opened this issue Mar 12, 2022 · 0 comments

Comments

@Mr4ucker
Copy link

D:\mtkclient\bypass>python main.py
[2022-03-13 02:34:42.685510] Waiting for device
[2022-03-13 02:34:48.955530] Found device = 0e8d:0003

[2022-03-13 02:34:49.375418] Device hw code: 0x717
[2022-03-13 02:34:49.375418] Device hw sub code: 0x8a00
[2022-03-13 02:34:49.375418] Device hw version: 0xca01
[2022-03-13 02:34:49.375418] Device sw version: 0x200
[2022-03-13 02:34:49.375418] Device secure boot: False
[2022-03-13 02:34:49.375418] Device serial link authorization: False
[2022-03-13 02:34:49.375418] Device download agent authorization: False

[2022-03-13 02:34:49.375418] Disabling watchdog timer
[2022-03-13 02:34:49.385457] Insecure device, sending payload using send_da
[2022-03-13 02:34:49.435554] Found send_dword, dumping bootrom to bootrom_717.bin

Maybe there is some way to replace "bootrom.bin" with another one, already unlocked?

Or is there a way to bypass the protection?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant