the tablet was release in 2019? - but the software failure only happened recently - an update failed and now it doesn't power on passed boot rom
the tablet was release in 2019? - but the software failure only happened recently - an update failed and now it doesn't power on passed boot rom
If the 9th Gen HD10 was manufactured in 2019 it is probably vulnerable to the kamakiri hack and can be rolled back. I (and others on here) have done it.
You mean j9 that is searl number ?If the 9th Gen HD10 was manufactured in 2019 it is probably vulnerable to the kamakiri hack and can be rolled back. I (and others on here) have done it.
Amazon managed to patch the bootrom in later devices - the Lot No. printed on the back of the case gives a clue to the manufacture year. I have a J936 which can be hacked and a J045 which can't. This was discussed a lot previously in this thread. The thinking is J9xx = 2019 and J0xx = 2020.
If the device is vulnerable it is probably necessary to also remove the rear cover and disconnect battery to enter bootrom mode . I haven't tested that myself tho' - I just took the back off following the guidance of others on here.
TL;DR - should've mentioned in my post above: device must be manufactured in 2019 & rear cover (probably) needs to come off so battery can be disconnected. These are essential requirements to run the exploits.
the lot number is j940 - and it is already in boot rom mode on usb connection - as that is where it fails in the initialization process... i'm ultimately just trying to get it to boot again, in preference into a normal OS version. at the moment it is just an expensive paper weight.If the 9th Gen HD10 was manufactured in 2019 it is probably vulnerable to the kamakiri hack and can be rolled back. I (and others on here) have done it.
Amazon managed to patch the bootrom in later devices - the Lot No. printed on the back of the case gives a clue to the manufacture year. I have a J936 which can be hacked and a J045 which can't. This was discussed a lot previously in this thread. The thinking is J9xx = 2019 and J0xx = 2020.
If the device is vulnerable it is probably necessary to also remove the rear cover and disconnect battery to enter bootrom mode . I haven't tested that myself tho' - I just took the back off following the guidance of others on here.
TL;DR - should've mentioned in my post above: device must be manufactured in 2019 & rear cover (probably) needs to come off so battery can be disconnected. These are essential requirements to run the exploits.
i can ran it agein , but can't enter it to bootrom , i will pm you ok ?the lot number is j940 - and it is already in boot rom mode on usb connection - as that is where it fails in the initialization process... i'm ultimately just trying to get it to boot again, in preference into a normal OS version. at the moment it is just an expensive paper weight.
You must uninstall drivers MTK , and try it if still do that , try other bybasstry to downgrade HD 10 gen9, with a Windows 10
got "Protection disabled" with bypass_utility .
But the MS windows 10 shows bluescreen and reboots, for Stop code: WDF_VIOLATION.
You must uninstall MTK drive , or disable sugrediverGot "Protection disabled" with bypass_utility under [FireISO]
1, download the fireiso-2.0.0-amd64.iso from https://github.com/amonet-kamakiri/fireiso/releases,
2, burn the the iso image to a blank DVD. boot the computer into fireiso liveCD, with an DVD drive .
3, load all the files to a USB flash drive, USB32GB, mounted automatically at /run/media/root/USB32GB/
4, bypass_utility-v.1.4.2 is unzipped, saved in a USB flashdrive, in the folder /bypass, mounted as /run/media/root/USB32GB/bypass/
5, exploits_collection-1.6.zip is unzipped, saved in the folder /bypass too
[[email protected] ~]# python3 --version
Python 3.9.1
[[email protected] ~]# python3 -m pip --version
pip 20.3.1 from /usr/lib/python3.9/site-packages/pip (python 3.9)
[[email protected] ~]# python3 -m ensurepip --default-pip
Looking in links: /tmp/tmpdmgv09oh
Requirement already satisfied: setuptools in /usr/lib/python3.9/site-packages (53.0.0)
Requirement already satisfied: pip in /usr/lib/python3.9/site-packages (20.3.1)
[[email protected] ~]# python3 -m pip install pyusb pyserial json5
Requirement already satisfied: pyusb in /usr/lib/python3.9/site-packages (1.1.1)
Requirement already satisfied: pyserial in /usr/lib/python3.9/site-packages (3.5)
Requirement already satisfied: json5 in /usr/lib/python3.9/site-packages (0.9.5)
[[email protected] ~]# cd /run/media/root/USB32GB/bypass/
[[email protected] /run/media/root/USB32GB/bypass]# su root
[[email protected] /run/media/root/USB32GB/bypass]# python3 ./main.py
[2022-09-30 20:36:25.552713] Waiting for device
[2022-09-30 20:36:36.062088] Found port = /dev/ttyACM0
[2022-09-30 20:36:36.203511] Device hw code: 0x788
[2022-09-30 20:36:36.309112] Device hw sub code: 0x8a00
[2022-09-30 20:36:36.419109] Device hw version: 0xca00
[2022-09-30 20:36:36.529119] Device sw version: 0x0
[2022-09-30 20:36:36.639113] Device secure boot: True
[2022-09-30 20:36:36.749112] Device serial link authorization: False
[2022-09-30 20:36:36.859110] Device download agent authorization: True
[2022-09-30 20:36:36.969128] Disabling watchdog timer
[2022-09-30 20:36:37.079595] Disabling protection
[2022-09-30 20:36:37.244340] Protection disabled
[[email protected] /run/media/root/USB32GB/bypass]#
[[email protected] /run/media/root/USB32GB/bypass]# cd /run/media/root/USB32GB/SP_Flash_Tool-5.1916_Linux/
[[email protected] /run/media/root/USB32GB/SP_Flash_Tool-5.1916_Linux]# lsusb
...
Bus 003 Device 012: ID 0e8d:0003 MediaTek Inc. MT6227 phone
...
Now, how to run the SP_Flash_Tool-5.1916_Linux with this fireiso liveCD ?
Pm meGot "Protection disabled" with bypass_utility under [FireISO]
1, download the fireiso-2.0.0-amd64.iso from https://github.com/amonet-kamakiri/fireiso/releases,
2, burn the the iso image to a blank DVD. boot the computer into fireiso liveCD, with an DVD drive .
3, load all the files to a USB flash drive, USB32GB, mounted automatically at /run/media/root/USB32GB/
4, bypass_utility-v.1.4.2 is unzipped, saved in a USB flashdrive, in the folder /bypass, mounted as /run/media/root/USB32GB/bypass/
5, exploits_collection-1.6.zip is unzipped, saved in the folder /bypass too
[[email protected] ~]# python3 --version
Python 3.9.1
[[email protected] ~]# python3 -m pip --version
pip 20.3.1 from /usr/lib/python3.9/site-packages/pip (python 3.9)
[[email protected] ~]# python3 -m ensurepip --default-pip
Looking in links: /tmp/tmpdmgv09oh
Requirement already satisfied: setuptools in /usr/lib/python3.9/site-packages (53.0.0)
Requirement already satisfied: pip in /usr/lib/python3.9/site-packages (20.3.1)
[[email protected] ~]# python3 -m pip install pyusb pyserial json5
Requirement already satisfied: pyusb in /usr/lib/python3.9/site-packages (1.1.1)
Requirement already satisfied: pyserial in /usr/lib/python3.9/site-packages (3.5)
Requirement already satisfied: json5 in /usr/lib/python3.9/site-packages (0.9.5)
[[email protected] ~]# cd /run/media/root/USB32GB/bypass/
[[email protected] /run/media/root/USB32GB/bypass]# su root
[[email protected] /run/media/root/USB32GB/bypass]# python3 ./main.py
[2022-09-30 20:36:25.552713] Waiting for device
[2022-09-30 20:36:36.062088] Found port = /dev/ttyACM0
[2022-09-30 20:36:36.203511] Device hw code: 0x788
[2022-09-30 20:36:36.309112] Device hw sub code: 0x8a00
[2022-09-30 20:36:36.419109] Device hw version: 0xca00
[2022-09-30 20:36:36.529119] Device sw version: 0x0
[2022-09-30 20:36:36.639113] Device secure boot: True
[2022-09-30 20:36:36.749112] Device serial link authorization: False
[2022-09-30 20:36:36.859110] Device download agent authorization: True
[2022-09-30 20:36:36.969128] Disabling watchdog timer
[2022-09-30 20:36:37.079595] Disabling protection
[2022-09-30 20:36:37.244340] Protection disabled
[[email protected] /run/media/root/USB32GB/bypass]#
[[email protected] /run/media/root/USB32GB/bypass]# cd /run/media/root/USB32GB/SP_Flash_Tool-5.1916_Linux/
[[email protected] /run/media/root/USB32GB/SP_Flash_Tool-5.1916_Linux]# lsusb
...
Bus 003 Device 012: ID 0e8d:0003 MediaTek Inc. MT6227 phone
...
Now, how to run the SP_Flash_Tool-5.1916_Linux with this fireiso liveCD ?
Not sure about all of this, pulling the battery gets you into bootrom, but access to the preloader you need the battery. From what I experienced when we developed the downgrade.... Been a while to remember all the details though. I don't think the version is matters. All this is going to do is give you a temp root access. Not a unlock....Ok im mad confused when its comes to this.
Fireiso 2.00 doesn't launch into XFCe I had to revert to using Fire ISO 1.00.
Any issues with using that version?
Also not sure after running the spflash to flashing the recovery , boot vendor & system. Do I need to power the device off and run the bypass again before connecting it to a device with Fireiso so I can run the scripts?
*do i really need to remove the battery?
You're pushing the wrong binary. You need to use the 'arm' one.well i finally got it working and downgraded to 7.3.1.0 and i went ahead and pushed the MTK-su file and i keep getting this ./mtk-su: no such file or directory.
I can see the file in there so maybe i did something wrong :|
Is it possible to downgrade fromwell i finally got it working and downgraded to 7.3.1.0 and i went ahead and pushed the MTK-su file and i keep getting this ./mtk-su: no such file or directory.
I can see the file in there so maybe i did something wrong :|
@k4y0z sir, I'm really sorry to mention u....would u be kind enough to let me know if downgrading to 7.3.2.6 is possible..
Can you take apart (remove back cover) your newest Fire HD 10 and post the motherboard pictures with test point like CLK, DAT0, CMD and removed metal shield.