View Single Post
Staro 30.11.2013., 10:37   #79
Baja 001
Banned
Moj komp
 
Baja 001's Avatar
 
Datum registracije: Aug 2006
Lokacija: Split
Postovi: 7,504
Forcebook UltraPhone 40 (ROOT/WIPE)

Forcebook UltraPhone 40 (ROOT/WIPE)
* valjda ne triban napominjat da nisan odgovoran za nikakvu stetu nastalu prilikom koristenja ovog 'tutoriala' *
Mini tutorial.
Moj problem je bio pattern lock, bez sifre, naravno koji su falili xxxxx puta.
E sad redom:
  • HGSpot ne nudi nakakvu podrsku (osim nekog servisa u ZG)
  • Nema drivera za doticni FB
  • Nema 'roota' jer niko ne razvija nista za FB mob

Klasika power + up/down, dovela me do nekog diagnostickog menia, koji sluzi tocno za k. Bilo kakav pokusaj priko terminala je odbijen, jer mob nije rootan pa sve sta se tice sistema je no go. Googlanjem malo sifri iz dijagnostickog modela dosa san do informacije da je to neki spredtrum ili tako nesto telefon. Daljnjim googlanjem dosa san do pokusaja roota, koji naravno ne radi (ima par metoda SuperOneClick i standardni set.) Nako svih metoda, dosa san do flash alata (koji je na kineskom), pa da nebi brickao to sranje san odusta. Google, google, gooogle, i nakon cca 6h san naletio na alat koji bi moga rootat telefon. Na kraju je i uspio, i pa mi je kamen sa srca kad san dobio root u konzoli.

1. potrebiti su driveri (ima ih vise, pustite da Windows odradi, ja san bio na XPu)
2. root alat je must have (meni je proslo iz 2. puta)
2a. ako iz nekog slucaja ne prolazi uvik ima kombinacija s flashom
3. adb konzola
4. wipe/remove patterna whatever

Kad ste sve pripremili, (driveri instalirani, root instaliran, adb ekstraktiran) sljedece je:
  • SHIFT + RMB > Open CMD Window here (adb folder)
  • pokrenit neke komande, koje cu navest ispod
Code:
adb devices
adb shell
cd data/system
su
rm *.key
Code:
adb shell
su
cd /data/data/com.android.providers.settings/databases
sqlite3 settings.db
update system set value=0 where name='lock_pattern_autolock';
update system set value=0 where name='lockscreen.lockedoutpermanently';
.quit
su
Code:
adb shell rm /data/system/gesture.key
ili (ako imate USB debugging, a ja san ima)

Citiraj:
Solution For Everyone With USB Debugging Enabled :

INSTRUCTIONS:

Primary Step for all method:
Download & Extract to anywhere - Bypass Security Hack - DOWNLOAD LINK -
Open SQLite Database Browser 2.0.exe in SQLite Database Browser.
Run pull settings.db.cmd inside By-pass security Hacks folder to pull out the setting file out of your phone.
Drag settings.db and drop to SQLite Database Browser 2.0.exe program.
Navigate to Browse data tab, At table there, click to list down the selection & selete secure

Instruction To Remove Pattern Lock:
Now, find lock_pattern_autolock, Delete Record
Close & save database
Run push settings.db.cmd and reboot your phone

Instruction To Remove PIN Lock:
Now, Find Or Create lockscreen.password_type, double-click & change it's value to 65536, Apply changes!
Now, find lock_pattern_autolock, Delete Record, If doesn't exist, Ignore
Close & save database
Run push settings.db.cmd and reboot your phone

Instruction To Remove Password Lock:
Now, find lockscreen.password_salt, Delete Record
Now, find lockscreen.password_type, Delete Record
Close & save database
Run push settings.db.cmd and reboot your phone

Note : If You See The Gesture Pattern Grid Or Password After Restarting, Don't Worry. Just Try Any Random Pattern Or Password And iI Should Unlock.

Posto ja nisan ima nikakvu obavezu cuvanja podataka, niti bi prista (jer san ga iovako mislio razbit od zid)

Code:
adb shell
su
wipe /data
I telefon je bio 'izvajpan'

Nadan se da ce nekome pomoc, i da nece lutat cilu bozju noc po www

EDIT:
root kasnije nisan proba, ali vjerovatno ce radit jer je i prvi put radio (meni je bilo bitno samo da se naplatin, pa ga nisan puno drza kod sebe)
Baja 001 je offline   Reply With Quote