What's new
PinoyTechnician

This is a sample guest message. Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

REFERENCE vivo y20sG frp na makunat done ky hydra

Kair221

Expired Account
Joined
Dec 30, 2017
Messages
308
Reaction score
260
Points
231
Location
valencia city bukidnon
vivo y20sG

issue: naka FRP, dinala ni tumer, nag hihinge na ng Google acount, (marunong na mag Hard Reset ibang tumer, sila na daw nag Hard Reset)

dala pa niya pati box.


Ob00lZe.jpg


Ob00lZe.jpg


a7QfW7y.jpg


SqmLL9i.png



first step, salang agad kay mrt kaya no luck, makunat.
note: check mo cpu chipset niya.
ito chipset niya MT6768 hanapin kaperiho na unit na same ng chipset,

step1: open hydra MTK tools
step2: select brand vivo and choose model y5s, wala kasing y20sG dahil bagong unit to. bakit y5s? same sila ng chipset MT6768
step3: turn off unit,
step4: click boot/info and hold vol - & + para sa bootkey.
{logs
11:10:54 : Brand :
11:10:54 : VIVO
11:10:54 : Model :
11:10:54 : Y5s (PD1934)
11:10:54 : Connection :
11:10:54 : Flash Mode
11:10:54 :
11:10:54 : =====================================
11:10:54 : How To Boot : Power off phone
11:10:54 : * BROM Mode : Press VOL + or Press VOL -+
11:10:54 : * Preloader Mode : Just Insert cable
11:10:54 :
11:10:55 : Searching for MTK Device...
11:11:37 : Found
11:11:37 : Port Identification :
11:11:37 : Flashmode BROM
11:11:37 : FriendlyName :
11:11:37 : MediaTek USB Port_V1632 (COM12)
11:11:37 : Device :
11:11:37 : 5&1e7d8db7&0&8
11:11:37 : SymbolicName :
11:11:37 : \??\USB#VID_0E8D&PID_0003#5&1e7d8db7&0&8#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
11:11:37 : Driver Ver :
11:11:37 : 01/22/2015,3.0.1504.0
11:11:38 :
11:11:38 : Handshaking...
11:11:38 : Ok
11:11:38 :
11:11:38 : Identifying Hardware ID.....
11:11:38 : Reading Device hardware info..
11:11:38 : hw code : 0707
11:11:38 : MT6768
11:11:38 : [6768]
11:11:38 : hw subcode : 8A00
11:11:38 : hw version : CA00
11:11:38 : sw version : 0000
11:11:38 : Target config : E5
11:11:38 : SB : 01 (True)
11:11:38 : SLA : 00 (False)
11:11:38 : DAA : 04 (True)
11:11:38 :
11:11:38 : Exploiting Device...
11:11:38 : Exploit Sent..
11:11:41 : Successfully Exploited...
11:11:41 :
11:11:41 : Handshaking...
11:11:41 : Ok
11:11:41 :
11:11:41 : Identifying Hardware ID.....
11:11:42 : Reading Device hardware info..
11:11:42 : hw code : 0707
11:11:42 : MT6768
11:11:42 : [6768]
11:11:42 : hw subcode : 8A00
11:11:42 : hw version : CA00
11:11:42 : sw version : 0000
11:11:42 : Target config : 00
11:11:42 : SB : 00 (False)
11:11:42 : SLA : 00 (False)
11:11:42 : DAA : 00 (False)
11:11:42 : FUSEID :
11:11:42 : 00000000
11:11:42 : SECURE VERSION :
11:11:42 : 00
11:11:42 : BL VERSION :
11:11:42 : FE
11:11:42 : NORMAL BOOT
11:11:42 :
11:11:42 : Preparing Download Agent..
11:11:42 : DA :
11:11:42 :
11:11:42 : [Not Exist]
11:11:42 : Trying Default
11:11:42 : 6768.bin
11:11:42 : Agent:
11:11:42 : MTK_DOWNLOAD_AGENT -HYDRA
11:11:42 : Ver :
11:11:42 : MTK_AllInOne_DA_v3.3001.2020/03/17.ÉÏÎç10:04_497508
11:11:42 : Init :
11:11:42 : Loader [1]
11:11:42 : Sending :
11:11:42 : Accepted
11:11:43 :
11:11:43 : Identifying Protocol...
11:11:43 : Protocol :
11:11:43 : New
11:11:43 : Synchronization...
11:11:43 : SYNC
11:11:44 : Mode :
11:11:44 : brom
11:11:44 : Preloader Initialization...
11:11:44 : Parsing
11:11:44 : preloader_k68v1_64_Vivo_MT6768_2.bin
11:11:44 : Init :
11:11:45 : Accepted
11:11:45 :
11:11:45 : Execute Secondary Loader
11:11:45 : Init :
11:11:45 : Loader [2]
11:11:45 : Executing :
11:11:46 : SYNC
11:11:47 :
11:11:47 : Reading Device UniqueID, RAM and Flash Chip Info...
11:11:47 : UNIQUE ID :
11:11:47 : 9E1BFAA1CE2C39D64AD3D761547EC0DB
11:11:47 : ERAM Size :
11:11:47 : 0x0000000000080000
11:11:47 : -512 KB
11:11:47 : IRAM Size :
11:11:47 : 0x0000000100000000
11:11:47 : -4 GB
11:11:47 : eMMC BOOT1 :
11:11:47 : 0x0000000000400000
11:11:47 : -4 MB
11:11:47 : eMMC BOOT2 :
11:11:47 : 0x0000000000400000
11:11:47 : -4 MB
11:11:47 : eMMC RPMB :
11:11:47 : 0x0000000001000000
11:11:47 : -16 MB
11:11:47 : eMMC USER :
11:11:47 : 0x0000001D1F000000
11:11:47 : -116.484 GB
11:11:48 : eMMC CID :
11:11:48 : 90014A6844456150330310591791188F
11:11:48 : - hDEaP3
11:11:48 :
11:11:48 : DA Speed :
11:11:48 : high-speed
11:11:48 :
11:11:48 : Reading GPT
11:11:48 : -EMMC
11:11:48 : [0x00008000]
11:11:48 : 130 Items
11:11:48 :
11:11:48 : Autobackup Partitions
11:11:48 : -preloader
11:11:48 : [0x00000000]
11:11:48 : 512 KB ->
11:11:48 : preloader.bin...
11:11:49 : Ok
11:11:49 : -> Renaming Preloader....
11:11:51 : preloader_k69v1_64.bin
11:11:51 : Creating Scatter file...
11:11:51 : C:\Hydra Tool\\Backup\Auto\0707__062121111148\MT6768_Android_scatter.txt
11:11:51 : -pgpt
11:11:51 : [0x00000000]
11:11:51 : 32 KB ->
11:11:51 : pgpt.bin...
11:11:52 : Ok
11:11:53 : -frp
11:11:53 : [0x07508000]
11:11:53 : 1024 KB ->
11:11:53 : frp.bin...
11:11:54 : Ok
11:11:54 : -nvdata
11:11:54 : [0x0E4A2000]
11:11:54 : 64 MB ->
11:11:54 : nvdata.bin...
11:11:59 : Ok
11:11:59 : -persist
11:11:59 : [0x1B8C2000]
11:11:59 : 48 MB ->
11:11:59 : persist.bin...
11:12:03 : Ok
11:12:04 : -protect1
11:12:04 : [0x1E8C2000]
11:12:04 : 8 MB ->
11:12:04 : protect1.bin...
11:12:05 : Ok
11:12:05 : -protect2
11:12:05 : [0x1F0C2000]
11:12:05 : 15.242 MB ->
11:12:05 : protect2.bin...
11:12:07 : Ok
11:12:08 : -nvram
11:12:08 : [0x22780000]
11:12:08 : 64 MB ->
11:12:08 : nvram.bin...
11:12:13 : Ok
11:12:13 : Done!!!}

step5: after ma read ng tools click/choose factory reset protection/FRP
step6: click EXECUTE

logs

[11:12:20 : Searching for MTK Device...
11:12:20 : Found
11:12:20 : Port Identification :
11:12:20 : Flashmode BROM
11:12:20 : FriendlyName :
11:12:20 : MediaTek USB Port_V1632 (COM12)
11:12:20 : Device :
11:12:20 : 5&1e7d8db7&0&8
11:12:20 : SymbolicName :
11:12:20 : \??\USB#VID_0E8D&PID_0003#5&1e7d8db7&0&8#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
11:12:20 : Driver Ver :
11:12:20 : 01/22/2015,3.0.1504.0
11:12:20 :
11:12:20 :
11:12:20 : Reading Device UniqueID, RAM and Flash Chip Info...
11:12:20 : UNIQUE ID :
11:12:20 : 9E1BFAA1CE2C39D64AD3D761547EC0DB
11:12:20 : ERAM Size :
11:12:20 : 0x0000000000080000
11:12:20 : -512 KB
11:12:20 : IRAM Size :
11:12:20 : 0x0000000100000000
11:12:20 : -4 GB
11:12:21 : eMMC BOOT1 :
11:12:21 : 0x0000000000400000
11:12:21 : -4 MB
11:12:21 : eMMC BOOT2 :
11:12:21 : 0x0000000000400000
11:12:21 : -4 MB
11:12:21 : eMMC RPMB :
11:12:21 : 0x0000000001000000
11:12:21 : -16 MB
11:12:21 : eMMC USER :
11:12:21 : 0x0000001D1F000000
11:12:21 : -116.484 GB
11:12:21 : eMMC CID :
11:12:21 : 90014A6844456150330310591791188F
11:12:21 : - hDEaP3
11:12:21 :
11:12:21 : Reading GPT
11:12:21 : -EMMC
11:12:21 : [0x00008000]
11:12:21 : 130 Items
11:12:21 :
11:12:21 :
11:12:21 : -------------------------------------
11:12:21 : Operation :
11:12:21 : Auto
11:12:21 : Processing...
11:12:21 : ZeroWipe FRP Partition...
11:12:21 : Ok
11:12:21 :
11:12:21 : Elapsed Time : 00:00:01]

step7: after done, check auto reboot and read system info and execute again.

SqmLL9i.png



step8: done na. mag reboot na unit at e setup lang,

a7QfW7y.jpg




done may SKIP na, pwedi na e setup ang unit.
 
Back
Top