MTK-bypass / bypass_utility

MIT License
460 stars 114 forks source link

sir please help me @chaosmaster https://github.com/chaosmaster #68

Closed Jpg73529 closed 2 years ago

Jpg73529 commented 2 years ago

[2022-01-29 15:10:51.929087] Found port = COM4

[2022-01-29 15:10:51.929087] Device hw code: 0x813 [2022-01-29 15:10:51.929087] Device hw sub code: 0x8a00 [2022-01-29 15:10:51.929087] Device hw version: 0xca00 [2022-01-29 15:10:51.929087] Device sw version: 0x0 [2022-01-29 15:10:51.929087] Device secure boot: True [2022-01-29 15:10:51.929087] Device serial link authorization: True [2022-01-29 15:10:51.929087] Device download agent authorization: True

[2022-01-29 15:10:51.929087] Disabling watchdog timer [2022-01-29 15:10:51.929087] Disabling protection Traceback (most recent call last): File "C:\Users\I'm Ps Prosen\Desktop\UnbrickRN8ProNoAuth\4.Bypass\main.py", line 65, in main() File "C:\Users\I'm Ps Prosen\Desktop\UnbrickRN8ProNoAuth\4.Bypass\main.py", line 60, in main exploit(device, watchdog_address, var_0, var_1, arguments.payload) File "C:\Users\I'm Ps Prosen\Desktop\UnbrickRN8ProNoAuth\4.Bypass\src\exploit.py", line 33, in exploit udev = usb.core.find(idVendor=0x0e8d, idProduct=0x3) File "C:\Users\I'm Ps Prosen\AppData\Local\Programs\Python\Python310\lib\site-packages\usb\core.py", line 1309, in find raise NoBackendError('No backend available') usb.core.NoBackendError: No backend available Press any key to continue . . .

Jpg73529 commented 2 years ago
  • [**[2022-01-29**]15:10:44.546371] Waiting for bootrom

[2022-01-29 15:10:51.929087] Found port = COM4

[2022-01-29 15:10:51.929087] Device hw code: 0x813 [2022-01-29 15:10:51.929087] Device hw sub code: 0x8a00 [2022-01-29 15:10:51.929087] Device hw version: 0xca00 [2022-01-29 15:10:51.929087] Device sw version: 0x0 [2022-01-29 15:10:51.929087] Device secure boot: True [2022-01-29 15:10:51.929087] Device serial link authorization: True [2022-01-29 15:10:51.929087] Device download agent authorization: True

[2022-01-29 15:10:51.929087] Disabling watchdog timer [2022-01-29 15:10:51.929087] Disabling protection Traceback (most recent call last): File "C:\Users\I'm Ps Prosen\Desktop\UnbrickRN8ProNoAuth\4.Bypass\main.py", line 65, in main() File "C:\Users\I'm Ps Prosen\Desktop\UnbrickRN8ProNoAuth\4.Bypass\main.py", line 60, in main exploit(device, watchdog_address, var_0, var_1, arguments.payload) File "C:\Users\I'm Ps Prosen\Desktop\UnbrickRN8ProNoAuth\4.Bypass\src\exploit.py", line 33, in exploit udev = usb.core.find(idVendor=0x0e8d, idProduct=0x3) File "C:\Users\I'm Ps Prosen\AppData\Local\Programs\Python\Python310\lib\site-packages\usb\core.py", line 1309, in find raise NoBackendError('No backend available') usb.core.NoBackendError: No backend available Press any key to continue . . .