General MSM TOOLS

Search This thread

beatbreakee

Senior Member
Aug 10, 2015
287
409
Frisco
Samsung Galaxy S10
Sorry .. pic wasn't attached here's pic and link.
Link to prior post

Screenshot_2023-02-05-16-35-32-09_40deb401b9ffe8e1df2f1cc5ba480b12.jpg
 

Renate

Recognized Contributor / Inactive Recognized Dev
I get it. You're trying to hack between the OnePlus tool and the backend.
I'm just interested in the other side, between the tool and the device.
If you ever want to get completely rid of the tool you'll have to know that bit too.
So far nobody has said, "Yeah, we know that 100% already. Here's a link."
 

tungninh

Member
Jul 23, 2015
28
9
I found out how to bypass the login prompt. Whether or not the tool will actually work is yet to be determined.
I don't have a oneplus 10 pro, but would be really curious if this works for anyone.
In order to avoid potential legal issues, and so you don't have to trust any files I upload, here are the instructions to crack the msm login...

Using a download from the previously-linked rar, you should have a copy of 'MsmDownloadTool.exe'
Use 7-zip to open the exe as an archive, and extract all the files into a new folder.
Open 'FTGUIDev.exe' with a hex editor (HxD is good)
Find the hex value '0f84e7000000b8'
Replace the 84 with an 85

Save the modified exe and launch it.
Choose a server other than 'in company'
Put whatever for userID/Password/Verify, click login.


I hope this is useful.

View attachment 5702703
bạn có thể gửi cho tôi công cụ msm đã chỉnh sửa không? Thanks

Mod translation: can you send me the edited msm tool? Thanks
 
Last edited by a moderator:

beatbreakee

Senior Member
Aug 10, 2015
287
409
Frisco
Samsung Galaxy S10
One bit of new update guys .. the OnePlus US team DID attempt to help me, without knowing .. unfortunately we hit the same roadblock.. another dead link, but the funny thing is... It's the SAME link, but on a European OnePlus Support website.... I'll share the link below, and a screenshot of the email... There are too many breadcrumbs sprinkled across the internet for this file to be "unobtainable". Mainly FRESH OnePlus Support sites disclosing the exact file! Maybe we need an Obox account... Idk ... But even when you take the deep testing link, and switch SBOX in for OBOX.... Then delete everything after .com... The website it takes you to is an OBOX login screen.... Which says OPPO at the bottom..... Please join the hunt... We're almost there... This is like a scavenger hunt for techs.... I think that Oppo simply either region blocked this file to mainland china, or simply stopped sharing it, cuz it's not "404 not found" ... It's "you request timed out" ... As in some part of the data submitted to access the file was not sufficient , so the server timed out due to a failed request for further info.

Norway Support
 

Attachments

  • Screenshot_2023-02-06-14-13-07-17_e307a3f9df9f380ebaf106e1dc980bb6.jpg
    Screenshot_2023-02-06-14-13-07-17_e307a3f9df9f380ebaf106e1dc980bb6.jpg
    433.7 KB · Views: 161
  • Like
Reactions: Drethis

beatbreakee

Senior Member
Aug 10, 2015
287
409
Frisco
Samsung Galaxy S10
I get it. You're trying to hack between the OnePlus tool and the backend.
I'm just interested in the other side, between the tool and the device.
If you ever want to get completely rid of the tool you'll have to know that bit too.
So far nobody has said, "Yeah, we know that 100% already. Here's a link."
Actually it was partially disclosed in an earlier post ... One of the methods for removing the login requirement ....


I didn't use this one... I edited further into the Hex and made it so I can enter anything into the user id, and password and 00000 for authentication code... But there's a few posts about this in this exact thread ... Just they are so short most ppl miss them. Also the trick in the post above only works on that version... But it should be enough to get you moving if you wanna follow that route. I just know that once you click start to flash, ANOTHER request goes out to an OPPO auth server and the Mac address/server details are obfuscated so without that, you can never generate a valid AUTH packet, and it will fail at the 3% marker every time!.... If you get lucky enough to confuse the server, which I did thru some exhausting measures, you will be met with a 3rd and 4th authentication request at 19% and 97%....

They set up some pretty good backup security in this tool just for ppl like us!

(Give yourself a pat on the back Oppo, cuz that's the one and only compliment you will EVER get from me! ... The next time you see me mention your name and the tool security , will be when I announce that I've cracked it! Cheers!)
 

beatbreakee

Senior Member
Aug 10, 2015
287
409
Frisco
Samsung Galaxy S10
can you send me the edited msm tool? Thanks
I do not think that will happen, nor do I advise it... While we CAN disclose the offsets that need to be changed for access... To publicly or even privately host a reverse engineered, copyrighted application not only violates XDA rules, but I'm fairly sure that can also land the host or person sharing it, in some legal trouble....

Im not 100% sure of that but I do know that asking or publishing this will definitely get u in some hot water with the xda mods! Fair warning...

There are a TON of free hex editors for windows ... Mac... And Linux that are all simple to use....download one, plus the MsM version described and linked in earlier posts... Then make the alteration yourself and voila... No trouble and you learn 1 more crafty tool!
 

Mirak97

Member
Oct 3, 2017
41
9
I do not think that will happen, nor do I advise it... While we CAN disclose the offsets that need to be changed for access... To publicly or even privately host a reverse engineered, copyrighted application not only violates XDA rules, but I'm fairly sure that can also land the host or person sharing it, in some legal trouble....

Im not 100% sure of that but I do know that asking or publishing this will definitely get u in some hot water with the xda mods! Fair warning...

There are a TON of free hex editors for windows ... Mac... And Linux that are all simple to use....download one, plus the MsM version described and linked in earlier posts... Then make the alteration yourself and voila... No trouble and you learn 1 more crafty tool!
bro i dont know whats the matter with this super secret app that would enable god mode on your phone why not use the versions already available on the web or those are outdated? or fake maybe i really dont know
do you need a specific version of this app to work on your phone model?
 

immortalwon

Senior Member
Mar 11, 2017
100
28
@beatbreakee

Completely offtopic question but does anyone here know how to restore firmware files after using the MSM Readback function for oneplus pro 9 device?

I have all the files properly backed up via read-back of MSM tool 4.0 for oneplus pro 9 device.
How do we restore these backups ??
 

TheNewHEROBRINE

Senior Member
Aug 26, 2021
264
78
20
Italy
OnePlus 8T
@beatbreakee

Completely offtopic question but does anyone here know how to restore firmware files after using the MSM Readback function for oneplus pro 9 device?

I have all the files properly backed up via read-back of MSM tool 4.0 for oneplus pro 9 device.
How do we restore these backups ??
MSM tool doesn't have this feature, maybe you can restore them via fastboot flash or dd.
 
  • Sad
Reactions: immortalwon

Prant

Senior Member
Jan 23, 2017
129
91
OnePlus 7 Pro
I do not think that will happen, nor do I advise it... While we CAN disclose the offsets that need to be changed for access...
Pretty sure there's a hard difference between offsets and actual hosting of the file. https://forum.xda-developers.com/t/msm-tools.4465229/post-87379817 This post has been up since this threads inception, I'm sure he's fine.

I understand it doesn't help the issue to be shared, but I don't think there's legal ground to start a process against y'all if the offsets are the only thing shared.

@DenisPDA You mad lad! Great digging.
 
  • Like
Reactions: Drethis

Top Liked Posts

  • There are no posts matching your filters.
  • 6
    DO NOT BUY ONEPLUS 10 PRO THEY DO NOT PROVIDE ANY TOOLS FROM UNBRICK
    3
    <Moderator Note>: I've removed the links from two posts and one quoted post.

    Although Windows Defender only popped up one file as a PUA (Potentially Unwanted Program) - which isn't necessarily a Trojan but just something that might do something you don't really want, I independently verified in a sandbox that VirusTotal.com reported possible Trojans on three of the four archives I downloaded.

    Some things do produce false positives, but in this case I believe caution is warranted.

    Thank you,

    @roirraW "edor" ehT

    P.S. Any questions, please don't respond in this thread. Instead, send me a PM.
    3
    As he said the OSS team doesn't handle that. Need to find the department that does.
    3
    I hate taking back off ..broke two back cover...LOL
    I hate it too. Especially since I clean up all the old tape and put down new tape.
    That's why I only open these things once and install a magnetic reed switch.
    See: https://forum.xda-developers.com/t/...c_prog_firehose-request.4261599/post-88301643

    This is the switch that I used: https://www.digikey.com/en/products/detail/standex-meder-electronics/ORD-213-20-30-AT/1949374
    It's currently out of stock there. I picked the least sensitive switch. (Even though it being activated in normal use is not a problem, it's only when resetting that it's checked.) Others of more sensitivity are in stock and they'll probably do fine.
    2
    Realistically, development is dead. And it sadly looks like hope of MSM tool is gone. Sucks but, oh well
  • 18
    I found out how to bypass the login prompt. Whether or not the tool will actually work is yet to be determined.
    I don't have a oneplus 10 pro, but would be really curious if this works for anyone.
    In order to avoid potential legal issues, and so you don't have to trust any files I upload, here are the instructions to crack the msm login...

    Using a download from the previously-linked rar, you should have a copy of 'MsmDownloadTool.exe'
    Use 7-zip to open the exe as an archive, and extract all the files into a new folder.
    Open 'FTGUIDev.exe' with a hex editor (HxD is good)
    Find the hex value '0f84e7000000b8'
    Replace the 84 with an 85

    Save the modified exe and launch it.
    Choose a server other than 'in company'
    Put whatever for userID/Password/Verify, click login.


    I hope this is useful.

    Screenshot_2022-09-02_23-07-33.png
    9
    Hello all, i am here to leak OPPO tech tool that allows one plus 10 pro to be flashed. Sadly i cannot share login but if you are able to bypass login screen the tool does not need to authenticate with server to flash device in EDL mode. Attached is screen shot of login screen and file. The tool picks up device in EDL mode and allows user to select the OPF file associated for device (please note you must have this downloaded externally ideally from msm tool for your device)

    I wish you luck bypassing this login and fixing your phones.

    flash.png
    9
    BTW... I am STILL in need of someone to share me access to a MSM Tool account that is active... Again... i dont care if its a guest account... or regular. You can change your password 12 hours after you give me the login info.... I am VERY close to being able to spoof an authentication, and signature response back to the phone in order to allow generic flashing of the 2213, 2215, and 2217. I just need to do about 2, maybe 3 more flashes, an hour between each, so i can decipher the algorithm that generates the token for the response. I have 9... i need 12, as they are partially calculated by a timestamp. So ANYONE who can help me with an account that is active, and maybe it is close to expiring anyways, please DM me, with the info to gain access.

    I am working under an authenticated letterhead, permissions document sent to me by Qualcomm, which completely supercedes ANY legal action brought forth by Oneplus/Oppo/BBK. The letter expressly provides me permission to use any of the tools/functions which are originated/derived from a Qualcomm Tool in any fashion. MSM is written and designed by qualcomm. I am permitted to use whatever, in the "Research, and Penetration Testing, of any and all protocols called upon by a function of any process that begins in a device with a qualcomm chipset.!"

    They make the MSM Tool... but access to the servers which are used to flash each qualcomm device is controlled by their respective manufacturers.
    8
    I looked around for any Firehose loaders that had this getsigndata/verify.
    Only OnePlus and Oppo.
    The solution seems clear: don't buy them.

    OTOH, Lenovo/Motorola has signed loaders with restrictions.
    You can't read most partitions.
    The solution seems clear: don't buy them.
    7
    GOOD GOOD... Thats what i like to hear from my Android Brethren !! Hack, Crack, Disassemble, and Attack the weaknesses of these infernal devices !!! (I need sleep!) ... Sorry, im stuck in some medieval, warfare mindset .. my bad! lol...

    BUT heres what i came for: Humor me.....

    IN THEORY... considering that EVERY post on the internet regarding DIAG mode on phone, (including IOS!) has started with the same goal.... "Using Root access, to enable Diag for access to the EFS" .... So basically everyone is saying that at the time... ROOT was horse... and Diag was the finish line! ... Right? Cuz thees guys were trying to hack bootloaders that had no accessible interface. And DIAG was their answer every time... and it worked! (Mostly)....

    What i am proposing is NOT trying to hack the bootloader, because i already know how to crack that... But if it used to be a REQUIREMENT that to even discuss DIAG, you must have Root.... Then can ANYONE HERE put together a way, in which I could REVERSE that process.... or at least leverage DIAG MODE, to get myself a Root Shell.... or alter the SUID or even outright set a new user, as "UID 0" ... temporarily even if i can only force 1 app to see my account as SYSTEM, so that i can get RW access to Build.prop, or Local.Prop ?? Then i can make 1 flag change in it that will snowball me right thru the security and into the bootloader!

    I mean as Diag I can literally DELETE the phone's whole identity! No imei.. no baseband... no modem... no mac address.. by the access i have to the EFS... and you cant even directly access that partition with ROOT ... only DIag and EDL have that authority! So imho there HAS TO BE a way to leverage a lower permission level thru some kind of console, where i can indirectly make a change to the build.prop. And i dont care if it Bricks the device 5 minutes later, cuz i am gonna make my change be locked with a persistent property that is already in place! It just needs a 1 in place of a 0, or an alternate access point which is also persistent, and just needs one word added to the line! Either way, if the phone bricks right after for some security violation, i will still have enough access to break the secure chain of trust and make my flags permanent! So if i have to pay for a flash to restore my phone, so be it... i know that the two things i edit survived an edl flash several times already!

    I really need EVERYONE ON DECK for this... cuz getting this done will cut at least 50% of the work i need to build us an MSM - Mafia FREE edition. Im talking to the guys who still think UP UP DOWN DOWN LEFT RIGHT LEFT RIGHT B A Start, is a goof cheat code! As well as the people who can walk past an ATM machine, wave their hand in front of it, and 100's start spitting out like a money shooter... Yall cannot tell me that the Apple guys are better than us r/n ... cuz literally every time a new IOS drops... in less than a few days 3+ randos release videos as POC of them successfully gaining TFP0 , which is the IOS equivalent of ROOT.... I refuse to believe that the 17 y/o kid wearing a fedora, and a neckerchief, as they are walking up to the Starbucks counter to order their Venti Chai Mocha Latte..... NO .... I DO NOT ACCEPT THAT VISUAL! To me that worse than walking in on your parents smashing on top of the dining room table! ... at least then i know that they were making each other happy! ... But "Smuggy McMasterson III" strutting up to buy a lawn garden coctail from a coffee shop, while feeling all "chipper" cuz his team found a Kernel Memory Leak in 'IOS whogivesacrap beta 4' ... yet we cant find one privilege escalation, is the stuff of my nightmares!

    YALL DONT WANNA GIVE ME NIGHTMARES DO YOU!!! I THOUGHT WE WERE FRIENDS!!!

    FRIENDS DONT LET FRIENDS GET HANDLED BY A CRAPTASTIC BOOTLOADER, ,GUARDED BY 1 FLAG! COME ON!