MTK-bypass / bypass_utility

MIT License
459 stars 114 forks source link

Bypass does not work, what to do? #75

Open Mr4ucker opened 2 years ago

Mr4ucker commented 2 years ago

D:\mtkclient\bypass>python main.py [2022-03-13 02:34:42.685510] Waiting for device [2022-03-13 02:34:48.955530] Found device = 0e8d:0003

[2022-03-13 02:34:49.375418] Device hw code: 0x717 [2022-03-13 02:34:49.375418] Device hw sub code: 0x8a00 [2022-03-13 02:34:49.375418] Device hw version: 0xca01 [2022-03-13 02:34:49.375418] Device sw version: 0x200 [2022-03-13 02:34:49.375418] Device secure boot: False [2022-03-13 02:34:49.375418] Device serial link authorization: False [2022-03-13 02:34:49.375418] Device download agent authorization: False

[2022-03-13 02:34:49.375418] Disabling watchdog timer [2022-03-13 02:34:49.385457] Insecure device, sending payload using send_da [2022-03-13 02:34:49.435554] Found send_dword, dumping bootrom to bootrom_717.bin

Maybe there is some way to replace "bootrom.bin" with another one, already unlocked?

Or is there a way to bypass the protection?