FORUMS
Remove All Ads from XDA

Bootloader unlock

3,628 posts
Thanks Meter: 4,496
 
By jmz, Inactive Recognized Developer on 7th June 2015, 04:52 PM
Thread Closed Email Thread
Not needed..............
The Following 21 Users Say Thank You to jmz For This Useful Post: [ View ] Gift jmz Ad-Free
 
 
7th June 2015, 05:39 PM |#2  
krazyace35's Avatar
Senior Member
Thanks Meter: 208
 
More
@jmz will this work on OS 4.5.2
7th June 2015, 05:41 PM |#3  
jmz's Avatar
OP Inactive Recognized Developer
Flag Lawton, OK
Thanks Meter: 4,496
 
More
Quote:
Originally Posted by krazyace35

@jmz will this work on OS 4.5.2

I don't see why it wouldn't as I am on 4.5.3 and it worked.
7th June 2015, 05:43 PM |#4  
krazyace35's Avatar
Senior Member
Thanks Meter: 208
 
More
Quote:
Originally Posted by jmz

I don't see why it wouldn't as I am on 4.5.3 and it worked.

Cool thanks I'll give it a try and thanks for this unlock tutorial
7th June 2015, 07:28 PM |#5  
Senior Member
Thanks Meter: 37
 
More
Quote:
Originally Posted by jmz

You will need a linux box or python installed on windows. Find instructions on the web for that.

Step 1: Download attachment
Step 2: Run command and make note of code return

Code:
adb shell cat /sys/block/mmcblk0/device/manfid
Step 3: Run command and make note of code return
Code:
adb shell cat /sys/block/mmcblk0/device/serial
Now you should have 2 sets of numbers. first should be in the format of 0x0000XX where XX is numbers. And the other is 0xSSSSSSSS.

So now use the downloaded file and execute (obivously replacing the entries with what was returned above.
Code:
./cublock.py XX SSSSSSSS
This will tell you you have unlock.signed now. So move that to your fastboot/adb directory and then reboot to bootloader and issue this command

Code:
adb reboot-bootloader
fastboot -i 0x1949 flash unlock unlock.signed
Once done, get back to android and do the following:
Code:
adb shell
su
idme print
You should now see unlock_code: AAAAAAAA and on and on.

Now go flash my TWRP build in OG dev


Original credit goes to @dpeddi & @vortox for the exploit. I did nothing to this code and it is all their work. So give them thanks

Sorry for the noob-ish question. How do you get adb to recognize the fire? When I type "adb devices" there are no devices present.
7th June 2015, 07:30 PM |#6  
jmz's Avatar
OP Inactive Recognized Developer
Flag Lawton, OK
Thanks Meter: 4,496
 
More
Quote:
Originally Posted by ryanyz10

Sorry for the noob-ish question. How do you get adb to recognize the fire? When I type "adb devices" there are no devices present.

do steps 1 through 6 in this thread

http://forum.xda-developers.com/fire...ustom-t3113311
The Following User Says Thank You to jmz For This Useful Post: [ View ] Gift jmz Ad-Free
7th June 2015, 07:46 PM |#7  
Senior Member
Thanks Meter: 37
 
More
Question
Sorry for another question. When I type ./cublock.py, I get ". is not recognized as an internal or external command".

Sorry again for being annoying lol
7th June 2015, 10:09 PM |#8  
jmz's Avatar
OP Inactive Recognized Developer
Flag Lawton, OK
Thanks Meter: 4,496
 
More
Quote:
Originally Posted by ryanyz10

Sorry for another question. When I type ./cublock.py, I get ". is not recognized as an internal or external command".

Sorry again for being annoying lol

if on windows you need to get python installed
7th June 2015, 10:13 PM |#9  
Senior Member
Thanks Meter: 37
 
More
Quote:
Originally Posted by jmz

if on windows you need to get python installed

I've got python 3.4.2 installed. Which version would you recommend?

After some researching, people have said that python doesn't work very well on Windows 10, which is what I'm on right now.
7th June 2015, 10:34 PM |#10  
Senior Member
Thanks Meter: 51
 
More
Quote:
Originally Posted by jmz

You will need a linux box or python installed on windows. Find instructions on the web for that.

Step 1: Download attachment
Step 2: Run command and make note of code return

Code:
adb shell cat /sys/block/mmcblk0/device/manfid
Step 3: Run command and make note of code return
Code:
adb shell cat /sys/block/mmcblk0/device/serial
Now you should have 2 sets of numbers. first should be in the format of 0x0000XX where XX is numbers. And the other is 0xSSSSSSSS.

So now use the downloaded file and execute (obivously replacing the entries with what was returned above.
Code:
./cublock.py XX SSSSSSSS
This will tell you you have unlock.signed now. So move that to your fastboot/adb directory and then reboot to bootloader and issue this command

Code:
adb reboot-bootloader
fastboot -i 0x1949 flash unlock unlock.signed
Once done, get back to android and do the following:
Code:
adb shell
su
idme print
You should now see unlock_code: AAAAAAAA and on and on.

Now go flash my TWRP build in OG dev


Original credit goes to @dpeddi & @vortox for the exploit. I did nothing to this code and it is all their work. So give them thanks

Hi jmz,

I have a question here- all that was in your ZIP file was the cublock.py file.

Are we supposed to use this with the rest of draxie's tools in the HDX thread? If so, I was able to get an 'unlock.img' file, but nothing called 'unlock.signed'

maybe you didn't upload all the attachments we needed?

either way, thanks soooo much for your work !
7th June 2015, 10:35 PM |#11  
jmz's Avatar
OP Inactive Recognized Developer
Flag Lawton, OK
Thanks Meter: 4,496
 
More
Quote:
Originally Posted by edouble312

Hi jmz,

I have a question here- all that was in your ZIP file was the cublock.py file.

Are we supposed to use this with the rest of draxie's tools in the HDX thread? If so, I was able to get an 'unlock.img' file, but nothing called 'unlock.signed'

maybe you didn't upload all the attachments we needed?

either way, thanks soooo much for your work !

sorry, with that tool you only get the unlock.img . I need to correct the post
Thread Closed Subscribe to Thread
Previous Thread Next Thread
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes