PS D:\A to Z mastery\bypass_utility-master> python main.py
[2022-05-31 18:57:40.003579] Waiting for device
[2022-05-31 18:57:48.599056] Found device = 0e8d:0003
[2022-05-31 18:57:49.843940] Disabling watchdog timer
[2022-05-31 18:57:50.003847] Disabling protection
Traceback (most recent call last):
File "D:\A to Z mastery\bypass_utility-master\main.py", line 237, in
main()
File "D:\A to Z mastery\bypass_utility-master\main.py", line 78, in main
result = exploit(device, config, payload, arguments)
File "D:\A to Z mastery\bypass_utility-master\src\exploit.py", line 77, in exploit
ptr_send = from_bytes(da_read(config.ptr_usbdl, 4), 4, '<') + 8;
File "D:\A to Z mastery\bypass_utility-master\src\exploit.py", line 11, in da_read
return da_read_write(0, address, length, None, check_result)
File "D:\A to Z mastery\bypass_utility-master\src\exploit.py", line 36, in da_read_write
return device.cmd_da(direction, address - 0x40, length, data, check_result)
File "D:\A to Z mastery\bypass_utility-master\src\device.py", line 330, in cmd_da
raise RuntimeError("status is {}".format(status.hex()))
RuntimeError: status is 1d1a
PS D:\A to Z mastery\bypass_utility-master>
// This is the error log
PS D:\A to Z mastery\bypass_utility-master> python main.py [2022-05-31 18:57:40.003579] Waiting for device [2022-05-31 18:57:48.599056] Found device = 0e8d:0003
[2022-05-31 18:57:49.470948] Device hw code: 0x766 [2022-05-31 18:57:49.513426] Device hw sub code: 0x8a00 [2022-05-31 18:57:49.569042] Device hw version: 0xca00 [2022-05-31 18:57:49.605020] Device sw version: 0x0 [2022-05-31 18:57:49.674981] Device secure boot: True [2022-05-31 18:57:49.751000] Device serial link authorization: True [2022-05-31 18:57:49.793968] Device download agent authorization: True
[2022-05-31 18:57:49.843940] Disabling watchdog timer [2022-05-31 18:57:50.003847] Disabling protection Traceback (most recent call last): File "D:\A to Z mastery\bypass_utility-master\main.py", line 237, in
main()
File "D:\A to Z mastery\bypass_utility-master\main.py", line 78, in main
result = exploit(device, config, payload, arguments)
File "D:\A to Z mastery\bypass_utility-master\src\exploit.py", line 77, in exploit
ptr_send = from_bytes(da_read(config.ptr_usbdl, 4), 4, '<') + 8;
File "D:\A to Z mastery\bypass_utility-master\src\exploit.py", line 11, in da_read
return da_read_write(0, address, length, None, check_result)
File "D:\A to Z mastery\bypass_utility-master\src\exploit.py", line 36, in da_read_write
return device.cmd_da(direction, address - 0x40, length, data, check_result)
File "D:\A to Z mastery\bypass_utility-master\src\device.py", line 330, in cmd_da
raise RuntimeError("status is {}".format(status.hex()))
RuntimeError: status is 1d1a
PS D:\A to Z mastery\bypass_utility-master>