HI! I am trying to unlock bootloader on tf201, but I am stuck on the 4th step. I copied 2 files into /system/app, changed permission , and restart tab, but no new application is installed. What i am doing wrong?After haveing some troubles I managed to unlock the bootloader on my TF201. I am going to post the full procedure that worked for me in case anyone needs it.
You are going to need:
-DMClient.apk for TF201 (download from the original poster link)
-Unlocker_app_v7_update.apk for TF700T (download from original poster link)
-KingoRoot.apk 4.4.3 (can download here https://kingo-root.en.uptodown.com/android/download/1804910)
-EsExplorer.apk (this version is compatible with android 4 https://www.apkmirror.com/apk/es-gl...s-file-explorer-4-0-4-2-android-apk-download/)
-MitMproxy (I used the one for windows).
-Update the tablet to the latest availablle version V10.4.2.18 (Android 4.1)
-Uninstall any Unlock_app previously installed. (you may consider doing a factory reset just to be sure)
1) install kingoroot, open it and root the tablet.
2) install EsExplorer, open it, click on the 3 lines on the up-left, expand the "tools" section end enable "root explorer". When asked for root permission click "allow".
3) on EsExplorer:
4) restart the tablet. (this willl automatically install the unlocker app).
- copy the DMClient.apk inside /system/app (click on replace when asked).
- copy the Unlocker_app_v7_update.apk inside /system/app as well.
- rename the file "DMClient.odex" in /system/app to "old_DMClient.odex".
- change permisson of DMClient.apk AND Unlocker_app_v7_update.apk. This is done by long pressing the apk -> click on "more" -> "properties" -> Permissions "Change" -> check "read" and "write" for owner. check "read" for group and other. uncheck the rest.
5) setup mitmproxy as explained here https://forum.xda-developers.com/t/howto-unlock-tf700t-in-2020.4157143/post-85097463 . Mitmproxy can be setup the same way on windows (without using VB). Additionaly on the "Edit options" uncheck "block_global" option. Be sure to also check "ssl-insecure" as it is a critical option.
If done without VB remember to set the pc ip as the "hostname" (step 4 of "Setting up your tablet"). To get the pc ip run "ipconfig" on windows powershell.
6) open the unlocker app and unlock the device.
192.168.1.16:55901: server connect mdm.asus.com:443 (22.214.171.124:443) 192.168.1.16:55901: client disconnect 192.168.1.16:55901: server disconnect mdm.asus.com:443 (126.96.36.199:443) 192.168.1.16:41998: client connect 192.168.1.16:41998: server connect mdm.asus.com:443 (188.8.131.52:443) 192.168.1.16:41998: client disconnect 192.168.1.16:41998: server disconnect mdm.asus.com:443 (184.108.40.206:443) 192.168.1.16:37671: client connect 192.168.1.16:37671: server connect mdm.asus.com:443 (220.127.116.11:443) 192.168.1.16:37671: client disconnect 192.168.1.16:37671: server disconnect mdm.asus.com:443 (18.104.22.168:443)
From what I have noticed in my few tries of doing it, the code is cached so if you entered it recently you won't be asked for it again until some time passes and it installs just fine.
Glad to hear! If it wasn't for the super helpful members of this forum my tablet would be back up in the top shelf gathering dust.
Tried to get it going on my tf201 am able to install all apps, remove the odex file, set permissions, run the VM with mitm or mitm in windows, set various options but sill do not get anywhere. I can reach https://asus.com after setting up mitm so I think mitm is working fine. Running the unlock app v7 (update) I still get unknown error.
Mitmweb proxy shows the tf201 reaches out to mdm.asus.com but I keep betting the same error.
Should this still be working?
I'll try the windows version again, I did not even have the chance to open asus.com with the windows version. how did yoy start it? there are a 3 options from the start menu, or did you even add any switches in the commandline.
I have the feeling both VM /linux and windows versions of mitmproxy are runnig fine....
DUDE!! I went on and made an account especially so that I could THANK YOU! Was stuck on the exact same issue like you and @Ice_83, was about to lose all hope. But DAYUM! Changin those tls versions did the trick. I used windows MTM with --ssl-insecure argument.Holy barking turtles!!!! I don't know what I did but it FINALLY worked!!!!
I AM UNLOCKED!
Man you guys don't know my relief - @Ice_83 , @maisomenos , @GloGlorius @d.l.i.w (feel like I'm at the Oscars here ! ) - I'm jumping around the room with excitement. Thank all of you and everyone else who's contributed on here for all of your help and patience!
For the record, I couldn't get the Ubuntu VB working for me, all I did was, playing around off @Ice_83 's above, went in and changed a couple of the settings on windows. I set tls_version_client_min and tls_version_server_min to Unbounded instead of TLS1_2 and hey presto! All sites were working on my tab!
View attachment 5379997
Now to go and see if I can totally brick it flashing a new ROM.
Thanks again everyone!
mount -o remount,rw -t ext4 /dev/block/mmcblk0p1 /system
I prepared a certificate for Android according to this instruction. I copied it to /system/etc/security of the tablet, set the rights to 0644 (in our case, the user certificate does not suit us, we need a system one). I turned on the proxy in the WiFi settings of the tablet, specifying the IP address of the laptop and port 8080. I rebooted the tablet.
I used mitmweb on a proxy server, it seemed more convenient to me. In the settings, I enabled the showhost and ssl_insecure options (sorry, in the previous post I said that the settings were by default, I was mistaken due to insomnia )
python3 -m venv mitmproxy source mitmproxy-env/bin/activate pip install --upgrade pip setuptools pip install mitmproxy
nmcli dev wifi hotspot ifname wlan0 ssid test password "12345678"
sysctl -w net.ipv4.ip_forward=1 sysctl -w net.ipv6.conf.all.forwarding=1 sysctl -w net.ipv4.conf.all.send_redirects=0 iptables -A FORWARD -i eth0 -o wlan0 -m state --state RELATED,ESTABLISHED -j ACCEPT iptables -A FORWARD -i wlan0 -o eth0 -j ACCEPT iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE iptables -t nat -A PREROUTING -i wlan0 -p tcp --dport 80 -j REDIRECT --to-port 8080 iptables -t nat -A PREROUTING -i wlan0 -p tcp --dport 443 -j REDIRECT --to-port 8080 ip6tables -t nat -A PREROUTING -i wlan0 -p tcp --dport 80 -j REDIRECT --to-port 8080 ip6tables -t nat -A PREROUTING -i wlan0 -p tcp --dport 443 -j REDIRECT --to-port 8080
mitmweb --mode transparent