It works on any OS.
Because this is a poor mediatak chip, it will work if you have a 2018 fire hd 8.
It works on any OS.
I got the HD8 2018 one on amazon renewed for $30 to give as a gift (after removing the junk first of course). It would be sinful not to remove the garbage first!It works on any OS.
Because this is a poor mediatak chip, it will work if you have a 2018 fire hd 8.
Unfortunately, it is impossible.
[2022-12-30 22:25:29.593963] Init crypto engine
[2022-12-30 22:25:29.607027] Disable caches
[2022-12-30 22:25:29.607367] Disable bootrom range checks
[2022-12-30 22:25:29.619915] Load payload from ../brom-payload/build/payload.bin = 0x4690 bytes
[2022-12-30 22:25:29.622438] Send payload
[2022-12-30 22:25:30.186992] Let's rock
[2022-12-30 22:25:30.187578] Wait for the payload to come online...
[2022-12-30 22:25:30.919396] all good
[2022-12-30 22:25:30.919548] Check GPT
Traceback (most recent call last):
File "/home/sorens/Downloads/amonet/modules/main.py", line 121, in <module>
main()
File "/home/sorens/Downloads/amonet/modules/main.py", line 61, in main
switch_user(dev)
File "/home/sorens/Downloads/amonet/modules/main.py", line 35, in switch_user
raise RuntimeError("what's wrong with your GPT?")
RuntimeError: what's wrong with your GPT?
I believe any hd8 bought january 2020 or later from amazon had the bootrom access blocked.I've created a live Ubuntu USB and installed all the prerequisites like adb and fastboot. But shorting is just not working. I've used several different paperclips and wires and nothing works. I shut down the tablet, plug one end of the micro usb into the tablet, run the boot.sh, connect CLK to the metal housing next to it, and connect the other end of the usb into my computer, but nothing happens. Thoughts?
Damn thanks for the heads up. I bought this used off Amazon Warehouse. Are there any ways or sites where you can buy these tablets that were made pre 2020?I believe any hd8 bought january 2020 or later from amazon had the bootrom access blocked.
it is a gamble. Likely ebay or shopgoodwill? I think they stop making them not too long after they blocked it.Damn thanks for the heads up. I bought this used off Amazon Warehouse. Are there any ways or sites where you can buy these tablets that were made pre 2020?
Damn thanks for the heads up. I bought this used off Amazon Warehouse. Are there any ways or sites where you can buy these tablets that were made pre 2020?
I don't think that's necessarily true.it is a gamble. Likely ebay or shopgoodwill? I think they stop making them not too long after they blocked it.
Good to know, I'll attempt it again tomorrow. It's possible I wasn't pushing down hard enough. The USB ports on my PC are a little finnicky as well, so I'll be sure to try different ports.I don't think that's necessarily true.
If nothing is showing up, I think it's just a bad contact or something.
Waiting for bootrom
If you can't proceed from this command, it's almost always a bad contact.
If you are using a clip, make sure to press down firmly on the connection from directly above, rather than sticking the corners together.
In other words, if the clip is cut at an angle, push it at an angle.
If the contact is correct, linux will recognize it in about 10 seconds. It should then proceed from this command.
At least, it is still possible.
That is unfortunate.So I'm officially giving up with the current Fire HD 8 I have. I couldn't get the short to work no matter what I did, so I gave up on that method. Then I tried booting to recovery, rebooted to bootloader and ran the bootloader script. The device was detected!! I press enter and it immediately fails in a Serial protocol mismatch or whatever it is. Come to find out, my device always loads the preloader, not the bootloader, and this means that my device is patched and therefore not be able to take advantage of this exploit. Bummer!
I might look on eBay to see if I can find a tablet that was made pre 2020 but I'm sure it would be difficult. I'll see what I can find and update again if I decide to give this another shot.
What he said was right in the end.I believe any hd8 bought january 2020 or later from amazon had the bootrom access blocked.
Yeah its not a total loss. I bought the used Fire HD 8 for $30 off Amazon. It came with FireOS 7.3.2.3 though, so its not going to be entirely compatible with Toolbox...That is unfortunate.
In that case, you can modify it by using fire tool box.
It also has a show mode, so you can use it as a table clock by buying a cover, etc.
This is a good toy for $80.
What he said was right in the end.
editing
If you really want one, try to buy a used fire hd 8 from a private seller.
Still a gamble, though.
Perhaps you've done it before...Hi Guys
Please I need help. The tablet freezes when I run ./fastboot-step.sh and now the tablet is stuck on Amazon logo.
I am using Ubuntu 18.
Can anybody guide me please? I have 3 devices
Please I have the same device if you want to get in touch and help me to unlock it
[10894.058045] usb 3-2.4.1: new full-speed USB device number 9 using xhci_hcd
[10894.239684] usb 3-2.4.1: New USB device found, idVendor=0e8d, idProduct=0003
[10894.239690] usb 3-2.4.1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[10894.241330] cdc_acm 3-2.4.1:1.0: ttyACM0: USB ACM device
[2019-01-26 23:30:02.157670] Waiting for bootrom
[2019-01-26 23:30:20.438333] Found port = /dev/ttyACM0
[2019-01-26 23:30:20.439362] Handshake
[2019-01-26 23:30:20.441693] Disable watchdog
* * * Remove the short and press Enter * * *
[2019-01-26 23:30:22.636037] Init crypto engine
[2019-01-26 23:30:22.661832] Disable caches
[2019-01-26 23:30:22.662505] Disable bootrom range checks
[2019-01-26 23:30:22.685773] Load payload from ../brom-payload/build/payload.bin = 0x4690 bytes
[2019-01-26 23:30:22.693170] Send payload
[2019-01-26 23:30:23.527965] Let's rock
[2019-01-26 23:30:23.528832] Wait for the payload to come online...
[2019-01-26 23:30:24.260602] all good
[2019-01-26 23:30:24.261069] Check GPT
[2019-01-26 23:30:24.596346] gpt_parsed = {'proinfo': (1024, 6144), 'PMT': (7168, 9216), 'kb': (16384, 2048), 'dkb': (18432, 2048), 'lk': (20480, 2048), 'tee1': (22528, 10240), 'tee2': (32768, 10240), 'metadata': (43008, 80896), 'MISC': (123904, 1024), 'reserved': (124928, 16384), 'boot': (141312, 32768), 'recovery': (174080, 40960), 'system': (215040, 6354944), 'vendor': (6569984, 460800), 'cache': (7030784, 1024000), 'userdata': (8054784, 22722527)}
[2019-01-26 23:30:24.596619] Check boot0
[2019-01-26 23:30:24.841858] Check rpmb
[2019-01-26 23:30:25.051079] Downgrade rpmb
[2019-01-26 23:30:25.052924] Recheck rpmb
[2019-01-26 23:30:25.949978] rpmb downgrade ok
[2019-01-26 23:30:25.950284] Flash lk-payload
[5 / 5]
[2019-01-26 23:30:26.471797] Flash preloader
[288 / 288]
[2019-01-26 23:30:44.845804] Flash tz
[6732 / 6732]
[2019-01-26 23:33:08.502134] Flash lk
[685 / 685]
[2019-01-26 23:33:23.337460] Inject microloader
[4 / 4]
[2019-01-26 23:33:23.667547] Reboot to unlocked fastboot
Unless you hide root CTS will always fail. Not easy to do even with magisk.
OK, this is the paper that I had in mind. It's by XDA member @djrbliss from 2013 for the Galaxy S4. And this is the thread he made.
Damn, if you were not aware of that work and came up with your exploit independently, that's even more amazing. My hat's off to you sir.![]()
This is very promising could you please elaborate, what exactly needs to be modified to port this to other MTK-hardware.
I have a fire 5th gen here and I can access brom-mode by pressing left mute button while pluging in.
tried your scripts as is (commenting out the parts that change rpmb or flash partitions) and it get's stuck at
Code:[2019-01-28 00:01:40.973289] Disable bootrom range checks
Does the hash in load_payload.py (4dd12bdf0ec7d26c482490b3482a1b1f) need to be modified?
I do have the kernel-sources for the device and am willing to investigate correct addressing etc.
Also since this is a boot-rom exploit wouldn't it allow flashing a hacked preloader + lk which just ignore boot-signatures so we can just run a standard twrp?