Frp Blu G71 |
Bienvenido, invitado ( Identificarse | Registrarse )
Frp Blu G71 |
Jul 16 2023, 05:18 PM
Publicado:
#1
|
|
Miembro del Clan Grupo: Miembros Mensajes: 21 Agradecimientos: 98 Registrado: 10-July 16 Desde: México Miembro No.: 848,618 Pais: |
Buen día a todos, les traigo un aporte para un Blu G71.
Este modelo es relativamente sencillo de realizar. Abrimos UnlockTool en la pestaña de MediaTek Damos click a Erase FRP y conectamos el equipo apagado. CÓDIGO ERASE FRP Initializing usb... OK Waiting for device... COM6 [PRELOADER:0E8D:2000] Jumping to BROM... OK Bypassing authentication... OK Analyzing... preloader_k62v1_64_bsp.bin [MT6765:1:272] [Internal] Handshaking... OK Reading hardware info... OK Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000 Security Config : SCB SLA DAA MEID : ABE9EA3E61891676E10CC9980F290E37 Sending Download-Agent [1]... OK Syncing with device... OK Booting device... OK Syncing with DA... OK Storage : EMMC - CID : 49010104.4F434F53.E44164D.65C72F86 Vendor : Samsung - Name : ISOCOM - Serial : 797314628 - Rev : 22 Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 57.62 GiB Reading partition info... OK [44] Reading device info... OK [super] Model Name : G71 Manufacturer : BLU Platform : k62v1_64_bsp Android Version : 10 Security Patch : 2023-02-01 Build ID : BLU_G0430WW_V10.0.04.10_GENERIC Build : 170 Build Date : Tue Feb 7 22:20:26 CST 2023 Erasing FRP... OK UNLOCKTOOL 2023.07.12.0 Elapsed time : 1 minute 14 seconds Agrader no cuesta nada. |
|
|
A continuacion 6 usuario(s) le Agradece(n) a canguiri por su Colaboracion: CK791, ESTANIS, GERALD ESPINOZA, josewilhelm, LAB_SANTACRUZ, ZoRt |
Anunciante Autorizado |
Jul 16 2023, 05:18 PM
Publicado:
#
|
Estas ofertas pudieran interesarte. |
|
|
|
Aug 22 2024, 02:47 PM
Publicado:
#2
|
|
Miembro del Clan Grupo: Miembros Mensajes: 10 Agradecimientos: 38 Registrado: 2-April 20 Desde: MEXICO Miembro No.: 1,167,514 Pais: |
Nck modulo MTK tambien lo hace.
solo conectamos pagado presionando ambos de volumen en 0-BY CPU y AUTO Dejo aca el log Exe version: NCKDongle AndroidMTK 2.8.3 Selected model: 0-By CPU AUTO [auto]Action: Reset FRP Phone must be off with battery inside. Battery must be charged Please insert USB cable now... Keep "VOL-" button untill inserting USB cable. For some phones need to keep "VOL+ and VOL-" button untill inserting USB cable. For some phones need to keep "VOL+" button untill inserting USB cable. Detected(19) : MediaTek USB Port (COM19) [19] \\?\usb#vid_0e8d&pid_0003#5&2d6700bf&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} CPU: MT6765 CPU code: 766 Target config: 0 *********************** Secure boot enabled: false Need serial link authorization: false Need download agent authorization: false SWJTAG enabled: false EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: false Root cert required: false Memory read authorization: false Memory write authorization: false Cmd 0xC8 blocked: false *********************** Executing exploit, do not disconnect phone Exploit has been executed successfully. [3ce00]Dumping phone preloader. Preloader: C:\ProgramData\Android_MTK_Backup_Folder\preloader_backup\preloader_k62v1_64_bsp.bin Waiting for handle to become active...... Reseived active handle repply from phone...... Booting phone Detected(19) : MediaTek USB Port (COM19) [19] \\?\usb#vid_0e8d&pid_0003#5&2d6700bf&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Boot mode: Brom Phone detected...Please wait BBCHIP: 6765 0 ca00 Using Algo 1. Helio MT6765 phone detected, swithing to helio api Helio enabled DRAM in First Da: FALSE Sending loader..... BBCHIP MT6765 [1]Storage EMMC Block size: 512 EMMC FW VERSION: 00:00:00:00:00:00:00:00 EMMC CID: 04010149534F43 : 000000000000000000 EMMC UA SIZE: 0xe67800000 BOOT STYLE: EMMC BOOT FULL LENGTH: 0xe68400000 [57.629 GB] Resetting userdata. [EMMC]FORMAT [0]FRP Reset Done. [helio]Wait untill phone will start charging. [0]All done. |
|
|
Ver Visitas | Fecha y Hora actual: 20th November 2024 - 12:40 PM |