Closed Hackatoan closed 2 months ago
I'm in the same situation when I put python mtk.py payload, I want to get my nothing phone 2a out of brom mode, but I haven't been able to because of that error
Port - Device detected :)
Preloader - CPU: MT6886(Dimensity 7200 Ultra)
Preloader - HW version: 0x0
Preloader - WDT: 0x1c007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x2001000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0xa
Preloader - Disabling Watchdog...
Preloader - HW code: 0x1229
Preloader - Target config: 0xe5
Preloader - SBC enabled: True
Preloader - SLA enabled: False
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca01
Preloader - SW Ver: 0x1
Preloader - ME_ID: ED0F775B2DA7776932731B8C7A793414
Preloader
Preloader - [LIB]: ←[33mAuth file is required. Use --auth option.←[0m
PLTools - Loading payload from generic_patcher_payload.bin, 0x538 bytes
Exploitation - Kamakiri Run
Exploitation
Exploitation - [LIB]: ←[31mError on sending payload.←[0m
PLTools
PLTools - [LIB]: ←[31mError on sending payload: C:\Users\HP\Desktop\MTK CLIENT\mtkclient-main\mtkclient\payloads\generic_patcher_payload.bin←[0m
Traceback (most recent call last):
File "C:\Users\HP\Desktop\MTK CLIENT\mtkclient-main\mtk.py", line 1000, in
Por fin pude revivir mi nothing phone 2a, tengo la solucion si quieres puedo compartirte como lo logre para que revivas tu 2a
Por fin pude revivir mi nothing phone 2a, tengo la solucion si quieres puedo compartirte como lo logre para que revivas tu 2a
Por favor me gustaría escuchar su solución.
Algún medio por el cual te pueda decir los pasos?
You need to provide a proper da loader and .auth file for this specific device.
Hey im trying to flash my nothing 2a phone, it has DAA so i tried the bypass but im getting an auth error. not sure if this matters but the state of my phone is it doesnt turn the screen on at all right now but it is connecting to my computer i just got reccommended to try this
this is the cmd line that was output after running the gui and it connected
so i tried running python mtk.py payload and i get
i see that im suppose to use --auth but i have no idea what im suppose to put for it.
im using windows 11 btw