Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
Port - Hint:
Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
...........
Port - Device detected :)
Preloader - CPU: ()
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x200000
Preloader - Var1: 0xa
Preloader - Disabling Watchdog...
Preloader - HW code: 0x1208
Preloader - Target config: 0xe5
Preloader - SBC enabled: True
Preloader - SLA enabled: False
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: 254FAD98C7C1725F35170161C8855887
PLTools - Loading payload from generic_patcher_payload.bin, 0x56c bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Traceback (most recent call last):
File "C:\mtkclient-gui\mtkclient\mtk", line 695, in
mtk = Main(args).run()
File "C:\mtkclient-gui\mtkclient\mtkclient\Library\mtk_main.py", line 514, in run
mtk = da_handler.configure_da(mtk, preloader)
File "C:\mtkclient-gui\mtkclient\mtkclient\Library\mtk_da_cmd.py", line 82, in configure_da
mtk = mtk.bypass_security()
File "C:\mtkclient-gui\mtkclient\mtkclient\Library\mtk.py", line 146, in bypass_security
if plt.runpayload(filename=self.config.payloadfile):
File "C:\mtkclient-gui\mtkclient\mtkclient\Library\pltools.py", line 100, in runpayload
if self.kama.payload(payload, addr, True, exploittype):
File "C:\mtkclient-gui\mtkclient\mtkclient\Library\kamakiri.py", line 135, in payload
if self.exploit2(payload, addr):
File "C:\mtkclient-gui\mtkclient\mtkclient\Library\kamakiri.py", line 113, in exploit2
ptr_send = unpack("<I", self.da_read(self.mtk.config.chipconfig.send_ptr[0][1], 4))[0] + 8
TypeError: 'NoneType' object is not subscriptable
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
Port - Hint:
Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
...........
Port - Hint:
Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
Hello, MT6789 isn't supported? ` C:\mtkclient-gui\mtkclient>py -3 mtk r cache cache.bin --preloader=preloader_x676b_h891.bin MTK Flash/Exploit Client V1.54 (c) B.Kerler 2018-2021
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
Port - Hint:
Power off the phone before connecting. For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb. For preloader mode, don't press any hw button and connect usb.
........... Port - Device detected :) Preloader - CPU: () Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x200000 Preloader - Var1: 0xa Preloader - Disabling Watchdog... Preloader - HW code: 0x1208 Preloader - Target config: 0xe5 Preloader - SBC enabled: True Preloader - SLA enabled: False Preloader - DAA enabled: True Preloader - SWJTAG enabled: True Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: True Preloader - Mem write auth: True Preloader - Cmd 0xC8 blocked: True Preloader - Get Target info Preloader - BROM mode detected. Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xca00 Preloader - SW Ver: 0x0 Preloader - ME_ID: 254FAD98C7C1725F35170161C8855887 PLTools - Loading payload from generic_patcher_payload.bin, 0x56c bytes PLTools - Kamakiri / DA Run Kamakiri - Trying kamakiri2.. Traceback (most recent call last): File "C:\mtkclient-gui\mtkclient\mtk", line 695, in mtk = Main(args).run() File "C:\mtkclient-gui\mtkclient\mtkclient\Library\mtk_main.py", line 514, in run mtk = da_handler.configure_da(mtk, preloader) File "C:\mtkclient-gui\mtkclient\mtkclient\Library\mtk_da_cmd.py", line 82, in configure_da mtk = mtk.bypass_security() File "C:\mtkclient-gui\mtkclient\mtkclient\Library\mtk.py", line 146, in bypass_security if plt.runpayload(filename=self.config.payloadfile): File "C:\mtkclient-gui\mtkclient\mtkclient\Library\pltools.py", line 100, in runpayload if self.kama.payload(payload, addr, True, exploittype): File "C:\mtkclient-gui\mtkclient\mtkclient\Library\kamakiri.py", line 135, in payload if self.exploit2(payload, addr): File "C:\mtkclient-gui\mtkclient\mtkclient\Library\kamakiri.py", line 113, in exploit2 ptr_send = unpack("<I", self.da_read(self.mtk.config.chipconfig.send_ptr[0][1], 4))[0] + 8 TypeError: 'NoneType' object is not subscriptable
C:\mtkclient-gui\mtkclient>py -3 mtk r cache cache.bin --preloader=preloader_x676b_h891.bin MTK Flash/Exploit Client V1.54 (c) B.Kerler 2018-2021
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
Port - Hint:
Power off the phone before connecting. For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb. For preloader mode, don't press any hw button and connect usb.
...........
Port - Hint:
Power off the phone before connecting. For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb. For preloader mode, don't press any hw button and connect usb.
.Preloader Preloader - [LIB]: Status: Handshake failed, retrying... `