Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for Android devices! (no root, no adb)
3.93k
stars
720
forks
source link
[FAIL] HID USB device not ready. ../ returned 126 #118
Apparently the attack attempt was not successful as per screenshot.
Tried to debug using bash ./android-pin-bruteforce diag & noted 2 failed entry per screenshot. I'm unable to understand Return code 1 though. Additionally, /system/bin/getprop directory exist in comparison to the non-existence as per screenshot.
Tried sending test keys echo "a b c" | /sdcard/hid-keyboard.c /dev/hidg0 keyboard but was return with permission denied on the keyboard though. My initial thought was the permission set. I tried chmod 755, chmod -v 755, chmod a+x etc but it seems that permission cannot be updated though.
I'm using USB gadget tool along with USB arsenal for the keyboard/mouse though. Any input is appreciated.
Apparently the attack attempt was not successful as per screenshot.
Tried to debug using
bash ./android-pin-bruteforce diag
& noted 2 failed entry per screenshot. I'm unable to understandReturn code 1
though. Additionally,/system/bin/getprop
directory exist in comparison to the non-existence as per screenshot.Tried sending test keys
echo "a b c" | /sdcard/hid-keyboard.c /dev/hidg0 keyboard
but was return with permission denied on the keyboard though. My initial thought was the permission set. I triedchmod 755, chmod -v 755, chmod a+x etc
but it seems that permission cannot be updated though.I'm using
USB gadget tool
along withUSB arsenal
for the keyboard/mouse though. Any input is appreciated.