urbanadventurer / Android-PIN-Bruteforce

Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for Android devices! (no root, no adb)
4.06k stars 729 forks source link

Returned 127 #3

Closed HaroldLimad closed 3 years ago

HaroldLimad commented 4 years ago

Any solution thanks Screenshot_20201109-000546389

urbanadventurer commented 4 years ago

Hi @HaroldLimad

Let's try to figure this out for ou.

What make and model of phone do you have?

What version of NetHunter are you using?

Does it work if you connect NetHunter to your computer and try sending keys?

echo h e l l o | /system/xbin/hid-keyboard /dev/hidg0 keyboard

HaroldLimad commented 4 years ago

e connected to the computer and if it works normal

my device Xiaomi redmi note 7 Screenshot_20201109-232442441

urbanadventurer commented 4 years ago

I don't really understand your answer.

Try using /dev/hidg1 as the virtual keyboard device. You can edit it in the config file.

Chotu75 commented 3 years ago

Hi @HaroldLimad

Let's try to figure this out for ou.

What make and model of phone do you have?

What version of NetHunter are you using?

Does it work if you connect NetHunter to your computer and try sending keys?

echo h e l l o | /system/xbin/hid-keyboard /dev/hidg0 keyboard

hello.. i also have same problem.. if i type "echo h e l l o | /system/xbin/hid-keyboard /dev/hidg0 keyboard" it shows "no such file or directories" but i manually went /system/xbin and i found 'hid-keyboard' there.. help me Screenshot_20210515-141401 :)

SweetSophia commented 3 years ago

I have the same problem. --dry-run is fine. Both HID Device and hid-keyboard executable PASS . But when plugged in a device it returns the 127 error as seen above by HaroldLimad. It does not matter what kind of cable or OTG I use.