• Introducing XDA Computing: Discussion zones for Hardware, Software, and more!    Check it out!
Search This thread

Gutslit

Senior Member
Feb 3, 2012
2,737
8,260
im back 11-04-2020
One of the most popular practices amongst software developers is to leave ‘backdoors’ within the code, which essentially allow anyone with knowledge to get into the system at a much deeper level than you’d expect from an end-user. These backdoors aren’t always with a malicious intent; most of the time, they allow the OEM or programmer to get into the system for troubleshooting when other, usual modes of access have been blocked. They can be quite friendly and helpful if you know what you’re doing.

Smartphones have a good share of these as well, where they’re generally known as secret codes. Most of the time, these numeric/symbolic sequences allow you to access hidden menus, diagnostic tests, areas that could change some of the most basic parameters of your device and whatnot. These secret codes, in fact, have not been exclusive to smartphones, but have long been a part of the dumb-phones and then the feature-phones before most major OEMs joined the smartphone bandwagon. For those devices that run Android, certain codes are shared across the board, and hence, can be used on a variety of devices.

What follows is a collection of some of the secret codes common to the Android platform. All of these would be entered through the phone dialer (just punch in the sequence as shown). Since most hidden menus are manufacturer specific, there’s no guarantee that they’ll work across all Android smartphones, but you can try them out nevertheless on your Samsung, HTC, Motorola, Sony and other devices. Be advised, though, that some of these can cause serious changes to your device’s configuration, so don’t play with something that you don’t fully understand.


*#*#4636#*#* phone information
*2767*3855# hard reset
*#*#7780#*#* factory reset
*#*#7594#*#* change end call/power option
*#*#197328640#*#* service mode
*#*#273283*255*663282*#*#* file copy screen (backup media files)
*#*#526#*#* wlan test
*#*#232338#*#* shows wifi mac address
*#*#1472365#*#* gps test
*#*#1575#*#* another gps test
*#*#232331#*#* bluetooth test
*#*#232337#*# shows bluetooth device address
*#*#8255#*#* gtalk service monitor


Samsung Secrets Code
*#*#0283#*#* packet loopback
*#*#0*#*#* lcd test
*#*#0673#*#* melody test
*#*#0842#*#* device test (vibration test and backlight test)
*#*#2663#*#* touch screen version
*#*#2664#*#* touch screen test
*#*#0588#*#* proximity sensor test
*#*#3264#*#* ram version

Samsung Secrets codes to get firmware version information:

*#*#4986*2650468#*#* pda, phone, h/w, rfcalldate
*#*#1234#*#* pda and phone
*#*#1111#*#* fta sw version
*#*#2222#*#* fta hw version
*#*#44336#*#* pda, phone, csc, build time, changelist number
*#272*IMEI# - To change the salescodes and reset the user data
 

skiflyer

Senior Member
Jul 16, 2011
188
36
thanks for sharing, but on JB 4.1.2 many of these codes are removed from samsung, f.e. the *2767*3855# hard reset code, as it has been prooved that it could be executed via a malicious browser website...
 
  • Like
Reactions: RajatRana10

GidiK

Senior Member
Jan 8, 2013
113
103
Best
thanks for sharing, but on JB 4.1.2 many of these codes are removed from samsung, f.e. the *2767*3855# hard reset code, as it has been prooved that it could be executed via a malicious browser website...

Actually, some still work, but our phone uses the old format instead of the new. So don't type "*#*#1234#*#*", but "*#1234#". Same for service mode: "*#197328640#". Etc. Also interesting: "*#9900#" for "SysDump" and fast dormancy.
 
  • Like
Reactions: camera_man

kentek

Senior Member
Mar 22, 2012
84
25
Hamilton Ontario
www.facebook.com
Samsung Hidden Codes
Not all work due to android o.s. changes and some may be missing

*#TESTMODE#
*#03# Nand Flash Unique Number
*#06# IMEI INFO.
*#745#
*#746#
*#0011# ServiceMode
*#0514# SysDump (shorter list)
*#0808# Qualcom USB settings
*#1111#
*#1575#
*#2222#
*#2263# ServiceMode - toggle Auto/WCDMA/GSM/LTE bands and modes
*#2580#
*#2684#
*#2866#
*#7284# Qualcom USB settings
*#8888# ServiceMode - READ FTA HW VERSION
*#9090# ServiceMode - DIAG CONFIG
*#9900# SysDump
*#32489#
*#66336# ServiceMode - MDM Ramdump mode
*#123456#
*#147852#
*#279301#
*#301279#
*#369852#
*#1478963#
*#3214789#
*#3698741#
*#4238378#
*#5337632#
*#6984125*#
*#22553767#
*#22558463# ResetTotalCallTime
*#73876766#
*#99007788#
*#197328640# ServiceMode - DEBUG SCREEN (1 Basic Information - same as 0011)
*#2767*2878#
*#738767633#
*#3214789650#
*#7387678387#
*#7387677763#
*#4387264636#
*#27663368378# ServiceMode - MAIN MENU (7 DEBUG SCREEN)
*#827828868378#

---------- Post added at 11:15 PM ---------- Previous post was at 11:08 PM ----------

Samsung Hidden Codes
Not all work due to android o.s. changes and some may be missing

*#TESTMODE#
*#03# Nand Flash Unique Number
*#06# IMEI INFO.
*#745#
*#746#
*#0011# ServiceMode
*#0514# SysDump (shorter list)
*#0808# Qualcom USB settings
*#1111#
*#1575#
*#2222#
*#2263# ServiceMode - toggle Auto/WCDMA/GSM/LTE bands and modes
*#2580#
*#2684#
*#2866#
*#7284# Qualcom USB settings
*#8888# ServiceMode - READ FTA HW VERSION
*#9090# ServiceMode
*#9900# SysDump
*#32489#
*#66336# ServiceMode - MDM Ramdump mode
*#123456#
*#147852#
*#279301#
*#301279#
*#369852#
*#1478963#
*#3214789#
*#3698741#
*#4238378#
*#5337632#
*#6984125*#
*#22553767#
*#22558463# ResetTotalCallTime
*#73876766#
*#99007788#
*#197328640# ServiceMode - DEBUG SCREEN (1 Basic Information - same as 0011)
*#2767*2878#
*#738767633#
*#3214789650#
*#7387678387#
*#7387677763#
*#4387264636#
*#27663368378# ServiceMode - MAIN MENU (7 DEBUG SCREEN)
*#827828868378#
 
Last edited:

hyghlndr

Member
Apr 26, 2010
26
2
Looking for the dialer code to enter into calculator to access hidden menu on a Sprint Galaxy tab2, I believe it is a long string of letter and symbols it ends in "+" sign. Just can't find my notes, the standard ##3282# or ##3424# do not work.Thanks
 
Last edited:

Top Liked Posts

  • There are no posts matching your filters.
  • 21
    One of the most popular practices amongst software developers is to leave ‘backdoors’ within the code, which essentially allow anyone with knowledge to get into the system at a much deeper level than you’d expect from an end-user. These backdoors aren’t always with a malicious intent; most of the time, they allow the OEM or programmer to get into the system for troubleshooting when other, usual modes of access have been blocked. They can be quite friendly and helpful if you know what you’re doing.

    Smartphones have a good share of these as well, where they’re generally known as secret codes. Most of the time, these numeric/symbolic sequences allow you to access hidden menus, diagnostic tests, areas that could change some of the most basic parameters of your device and whatnot. These secret codes, in fact, have not been exclusive to smartphones, but have long been a part of the dumb-phones and then the feature-phones before most major OEMs joined the smartphone bandwagon. For those devices that run Android, certain codes are shared across the board, and hence, can be used on a variety of devices.

    What follows is a collection of some of the secret codes common to the Android platform. All of these would be entered through the phone dialer (just punch in the sequence as shown). Since most hidden menus are manufacturer specific, there’s no guarantee that they’ll work across all Android smartphones, but you can try them out nevertheless on your Samsung, HTC, Motorola, Sony and other devices. Be advised, though, that some of these can cause serious changes to your device’s configuration, so don’t play with something that you don’t fully understand.


    *#*#4636#*#* phone information
    *2767*3855# hard reset
    *#*#7780#*#* factory reset
    *#*#7594#*#* change end call/power option
    *#*#197328640#*#* service mode
    *#*#273283*255*663282*#*#* file copy screen (backup media files)
    *#*#526#*#* wlan test
    *#*#232338#*#* shows wifi mac address
    *#*#1472365#*#* gps test
    *#*#1575#*#* another gps test
    *#*#232331#*#* bluetooth test
    *#*#232337#*# shows bluetooth device address
    *#*#8255#*#* gtalk service monitor


    Samsung Secrets Code
    *#*#0283#*#* packet loopback
    *#*#0*#*#* lcd test
    *#*#0673#*#* melody test
    *#*#0842#*#* device test (vibration test and backlight test)
    *#*#2663#*#* touch screen version
    *#*#2664#*#* touch screen test
    *#*#0588#*#* proximity sensor test
    *#*#3264#*#* ram version

    Samsung Secrets codes to get firmware version information:

    *#*#4986*2650468#*#* pda, phone, h/w, rfcalldate
    *#*#1234#*#* pda and phone
    *#*#1111#*#* fta sw version
    *#*#2222#*#* fta hw version
    *#*#44336#*#* pda, phone, csc, build time, changelist number
    *#272*IMEI# - To change the salescodes and reset the user data
    2
    Good job keep it up thank


    unlock
    2
    Samsung Hidden Codes
    Not all work due to android o.s. changes and some may be missing

    *#TESTMODE#
    *#03# Nand Flash Unique Number
    *#06# IMEI INFO.
    *#745#
    *#746#
    *#0011# ServiceMode
    *#0514# SysDump (shorter list)
    *#0808# Qualcom USB settings
    *#1111#
    *#1575#
    *#2222#
    *#2263# ServiceMode - toggle Auto/WCDMA/GSM/LTE bands and modes
    *#2580#
    *#2684#
    *#2866#
    *#7284# Qualcom USB settings
    *#8888# ServiceMode - READ FTA HW VERSION
    *#9090# ServiceMode - DIAG CONFIG
    *#9900# SysDump
    *#32489#
    *#66336# ServiceMode - MDM Ramdump mode
    *#123456#
    *#147852#
    *#279301#
    *#301279#
    *#369852#
    *#1478963#
    *#3214789#
    *#3698741#
    *#4238378#
    *#5337632#
    *#6984125*#
    *#22553767#
    *#22558463# ResetTotalCallTime
    *#73876766#
    *#99007788#
    *#197328640# ServiceMode - DEBUG SCREEN (1 Basic Information - same as 0011)
    *#2767*2878#
    *#738767633#
    *#3214789650#
    *#7387678387#
    *#7387677763#
    *#4387264636#
    *#27663368378# ServiceMode - MAIN MENU (7 DEBUG SCREEN)
    *#827828868378#

    ---------- Post added at 11:15 PM ---------- Previous post was at 11:08 PM ----------

    Samsung Hidden Codes
    Not all work due to android o.s. changes and some may be missing

    *#TESTMODE#
    *#03# Nand Flash Unique Number
    *#06# IMEI INFO.
    *#745#
    *#746#
    *#0011# ServiceMode
    *#0514# SysDump (shorter list)
    *#0808# Qualcom USB settings
    *#1111#
    *#1575#
    *#2222#
    *#2263# ServiceMode - toggle Auto/WCDMA/GSM/LTE bands and modes
    *#2580#
    *#2684#
    *#2866#
    *#7284# Qualcom USB settings
    *#8888# ServiceMode - READ FTA HW VERSION
    *#9090# ServiceMode
    *#9900# SysDump
    *#32489#
    *#66336# ServiceMode - MDM Ramdump mode
    *#123456#
    *#147852#
    *#279301#
    *#301279#
    *#369852#
    *#1478963#
    *#3214789#
    *#3698741#
    *#4238378#
    *#5337632#
    *#6984125*#
    *#22553767#
    *#22558463# ResetTotalCallTime
    *#73876766#
    *#99007788#
    *#197328640# ServiceMode - DEBUG SCREEN (1 Basic Information - same as 0011)
    *#2767*2878#
    *#738767633#
    *#3214789650#
    *#7387678387#
    *#7387677763#
    *#4387264636#
    *#27663368378# ServiceMode - MAIN MENU (7 DEBUG SCREEN)
    *#827828868378#
    1
    thanks for sharing, but on JB 4.1.2 many of these codes are removed from samsung, f.e. the *2767*3855# hard reset code, as it has been prooved that it could be executed via a malicious browser website...
    1
    thanks for sharing, but on JB 4.1.2 many of these codes are removed from samsung, f.e. the *2767*3855# hard reset code, as it has been prooved that it could be executed via a malicious browser website...

    Actually, some still work, but our phone uses the old format instead of the new. So don't type "*#*#1234#*#*", but "*#1234#". Same for service mode: "*#197328640#". Etc. Also interesting: "*#9900#" for "SysDump" and fast dormancy.