Thursday, March 29, 2018

sfk ကိုအသံုးျပဳၿပီး Mtk Rom_0 အား unpack လုပ္​ျခင္​း

sfk ကိုအသံုးျပဳၿပီး Mtk Rom_0 အား unpack လုပ္​ျခင္​း

sfk ကိုအသံုးျပဳၿပီး Mtk Rom_0 အား unpack လုပ္​ျခင္​း

Rom Zero backup ဆြဲတာက​​ေတာ့ မ​ေျပာ​ေတာ့ဘူး​ေနာ္​

လူတိုင္​းသိၿပီးသားဆို​ေတာ့

Rom_zero ကို backup လုပ္​ၿပီး unpack လုပ္​မယ္​

preloader ကို edit လုပ္​မယ္​

Hex နဲ႔ တြက္​မယ္​

အတိအက် ဖ်က္​ခ်မယ္​

ဘယ္​​ေနရာ​ေတြမွာ အသံုးဝင္​မလဲ

mtk ​ေတြကို အလြတ္​ကတ္​ၿပီး

emmc ထဲကို Rom_zero

ကုိsp flashtoolထည္​့တဲ့အခ်ိန္​ မနိုးတာ

Emmc ကို 1500 stick မွာတပ္​ၿပီး

Rom_zero ကို ထည္​့ရင္​မနိုးတာ

User lock ​ေတြျဖည္​တဲ့​ေနရာမွာ preloader ​ေတာင္​း​ေနတာ

preloader mode က​ေန sp flashtool နဲ႔

frp ျဖည္​ရင္​ preloader ​​ေတာင္​း​ေနတာ

အဲ့လိုအ​ေျခ​ေန​ေတြမွာ အျပင္​က preloader ကိုထည္​့ရင္​

dead သြားနိုင္​တယ္​ ဒီနည္​းနဲ႔
သူ႔ဖုန္​းထဲက​ေနပဲ backup ဆြဲ ၿပီး preloader ကို

SFK နဲ႔ auto ျပင္​မယ္​ သို႔မဟုတ္​ manual ျပင္​မယ္​ဆုိရင္​

သူ႔ဖုန္​းထဲက preloader ကိုပဲပန္​ထည့္​မယ္​ဆိုရင္​

dead သြားဖို႔အတြက္​ လံုး၀ 100% ကာကြယ္​လို႔ရပါၿပီ

ကြၽန္​​ေတာ္​တို႔ စလုပ္​ၾကည္​့ရ​ေအာင္​

ခုကြၽန္​​ေတာ္​စမ္​းျပထားတာ​ေလးက

Huawei y5 II U29 BGA 221

bootloader ပါတဲ့ mtk cpu 6582

အမ်ဳးိအစား​ေလးနဲ႔ပါ

(1) Sp Flastool နဲ႔ Rom zero backup

ဆြဲပါ

(2)Sfk.exe ကို ​Download ဆြဲပါ

(3)Backup ဆြဲလို႔ရလာတဲ့ Rom_0ကုိ

rename ​ေျပာင္​းပါ

ဥပမာ newstar.img ​ေပါ့

(4) 6582 scatter.txt ကို note ++ နဲ႔ဖြင္​့ပါ

newstar.img ဆိုတဲ့ Rom zero ထဲက​ေန

preloader.img ထဲက​ေနခြဲထုတ္​ခ်င္​တယ္​ဆိုပါ​ေတာ့

preloader ရဲ႕ start adress နဲ႔ end adress

ကို scatter ထဲက​ေန Note ++ နဲ႔ ၾကည့္​လိုက္​ပါ

ခုက်​ေနာ္​ၾကည္​့ထားတာက CPU 6582 ရဲ႕ Scatter မွာဆုိ

Start adress သည္​ 0x0

End adress သည္​ 0x1400000

ဒါဆိုရၿပီ Sfk ကိုအသံုးျပဳၿပီး rom zero ထဲက​ေန

preloader ကိုခြဲထုတ္​မဲ့ command ​ေရးလို႔ရၿပီ

``sfk.exe partcopy newstar.img -fromto 0x0 0x1400000 preloader.img -yes ´´

ဒါဆို Rom zero ထဲက​ေန preloader ​ေလးခြဲထြက္​လာပါၿပီ

sfk.exe က sfk.exeကို ​ေခၚသံုးတာပါ

partcopy က rom zero ထဲက​ေန copy ယူမယ္​​ေျပာတာပါ

newstar.img က​ေတာ့ rom zero ထဲကလို႔​ေျပာတာပါ

-fromto က​ေတာ့ scatter ထဲက ကိုယ္​ခြဲထုတ္​မဲ့ partition ရဲ႕ adress ရဲ႕ start adress နဲ႔ end adress ကို​ေရးခိုင္​းတာပါ

preloader.img က​ေတာ့ ကိုယ္​ခြဲထုတ္​လိုက္​တဲ့

partition name ကို rename ​ျပန္​​ေပးတာပါ

-yes က​ေတာ့ sfk.exe မွာ မပါမျဖစ္​တဲ့

​ေနာက္​ဆံုးမွာထည္​့​ေပးရတဲ့ command ပါ

က်​ေနာ္​ example command တစ္​ခု​ေပးပါမယ္​

preloader size ႀကီး​ေနတာကို
မွန္​​ေအာင္​ဖ်က္​ခ်တဲ့
command ပါဘာတယ္​ နမူနာယူၿပီးၾကည့္​ၾကည္​့ပါ
preloader ​ေတြက
4D 4D 4D 01 38 နဲ႔ hex values စပါတယ္​
ဆံုးတဲ့ hex values ​ေတြက​ေတာ့မတူၾကပါဘူး
preloader ကိုျပင္​တာဆက္​တင္​​ေပးပါမယ္​

@echo off
sfk.exe partcopy mmcblk0.img -fromto 0x0 0x1400000 preloader0.img -yes
sfk.exe partcopy mmcblk0.img -fromto 0x0 0x20480 preloader1.img -yes
sfk.exe partcopy preloader1.img -fromto 0x00000800 0x0001F618 preloader_hq6582_we_b1b_l1.bin -yes
sfk.exe partcopy mmcblk0.img -fromto 0x0 0x80000 MBR -yes
sfk.exe partcopy mmcblk0.img -fromto 0x0 0x80000 EBR1 -yes
sfk.exe partcopy mmcblk0.img -fromto 0x0 0x300000 PRO_info.img -yes
sfk.exe partcopy mmcblk0.img -fromto 0x0 0x500000 NVRAM.img -yes
sfk.exe partcopy mmcblk0.img -fromto 0x0 0xa00000 PROTECT_F.img -yes
sfk.exe partcopy mmcblk0.img -fromto 0x0 0xa00000 PROTECT_S.img -yes
sfk.exe partcopy mmcblk0.img -fromto 0x0 0x4000000 OEMINFO.img -yes
sfk.exe partcopy mmcblk0.img -fromto 0x0 0x20000 FECCFG.img -yes
sfk.exe partcopy mmcblk0.img -fromto 0x0 0x80000 lk.bin -yes
sfk.exe partcopy mmcblk0.img -fromto 0x0 0x600000 boot.img -yes
sfk.exe partcopy mmcblk0.img -fromto 0x0 0x0600000 recovery.img -yes
sfk.exe partcopy mmcblk0.img -fromto 0x0 0x600000 secro.img -yes
sfk.exe partcopy mmcblk0.img -fromto 0x0 0x80000 MISC.img -yes
sfk.exe partcopy mmcblk0.img -fromto 0x0 0x300000 logo.bin -yes
sfk.exe partcopy mmcblk0.img -fromto 0x0 0x80000 EBR2 -yes
sfk.exe partcopy mmcblk0.img -fromto 0x0 0xa00000 EXPDB.img -yes
sfk.exe partcopy mmcblk0.img -fromto 0x0 0x100000 frp.img -yes
sfk.exe partcopy mmcblk0.img -fromto 0x0 0x560000 ROOTM.img -yes
sfk.exe partcopy mmcblk0.img -fromto 0x0 0x93800000 system.img -yes
sfk.exe partcopy mmcblk0.img -fromto 0x0 0x19000000 cust.img -yes
sfk.exe partcopy mmcblk0.img -fromto 0x0 0x9600000 cache.img -yes
sfk.exe partcopy mmcblk0.img -fromto 0x0 0x60000000 userdata.img -yes
pause
https://www.facebook.com/RaynMailkMobileWorld/posts/355076594979238
https://www.facebook.com/mobilehackcrazy/posts/1385973024882217

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

online shop registration

 မှတ်ပုံတင်ပုံ အဆင့်ဆင့်ကို ပုံများဖြင့် မျှဝေပေးလိုက်ပါတယ်နော် အသေးစိတ်ကတော့ Live လေးမှာ နားထောင်ကြည့်ပါရှင် ☺️ Live Link : https://fb.watc...

Popular

Contact Form

Name

Email *

Message *

Labels

ADS (417) Alcatel (3) All winner (3) Androd Xiaomi (255) Android Antivirus (6) Android application (15) Android Command (3) Android Coolpad (39) Android Font (61) Android Game (2) Android Google Application (13) Android Huawei Imei Repair (1) Android Huawei Y series (6) Android kingo root (4) Android MTK Driver (6) Android Samsung (17) Android Samsung A series (26) Android Samsung C series (5) Android Samsung E series (5) Android Samsung G series (82) Android Samsung Hard reset (7) Android Samsung I series (7) Android Samsung Imei repair (6) Android Samsung J series (66) Android Samsung Multi file (1) Android Samsung N series (34) Android Samsung P series (2) Android Samsung Root (8) Android Samsung S series (10) Android Samsung SC series (6) Android Samsung Solutions (3) Android Samsung T series (3) Android Tool (238) Antivirus (7) AOTO (6) AOVO (8) Aplus (6) Archos (1) Asus (6) Attila (14) BenWee (2) BLU (1) Bluemix (2) Book (5) book eng (1) book med (11) Boss style (1) box (2) Bravo (2) browser (3) Browser Adobe Flash Player (1) Browser Firefox (1) CAZSH (1) Cherry (5) China Phone (73) CircleTech (2) CKTEL (1) Ding Ding (2) Download best (17) Education Make up (5) emmc (1) Entertainment (5) Facebook (2) films (1) Finance (2) Firmware Collection (23) FRP (62) Funny (3) GFIVE (3) Gionee (4) Grand (1) HAIWEI (3) Hardware (16) Hello (40) Hisense (17) Hiway (2) Hopo (22) HTC (7) Huawei A series (25) Huawei B series (13) Huawei board software collection (14) Huawei C series (43) Huawei Clone (18) Huawei D series (3) Huawei Driver (1) Huawei E series (17) Huawei emmc data (1) Huawei F series (7) Huawei Flashtool (45) Huawei G series (51) Huawei H Series (8) Huawei J series (1) Huawei K series (3) Huawei L series (18) Huawei M series (5) Huawei N series (3) Huawei P series (10) Huawei R series (5) Huawei region code (3) Huawei S series (10) Huawei T series (10) Huawei U series (8) Huawei Update (104) Huawei V series (11) Huawei W series (3) Huawei Y series (56) I Mobile (1) ILOVFA (11) IMEI repair (13) imobile (1) Infinix (1) Infone (1) Inovo (38) ios firmware (3) ios icloud (4) IOS itune (8) IOS Itune Error (1) ios news (10) IOS Tool (10) IPhone Clone (22) K Touch (3) Kenbo (10) Kimfly (47) Kismo (3) KKP (19) knowledge (38) Lava (8) Leagoo (1) Leagool (2) LeEco (1) Leegoog (19) Lenovo (12) LG (5) Liven (23) LoLo love (14) M-Horse (11) magic (2) MAI (11) Marconi-W50E (1) MBO (97) MCT (2) medical knowledge (5) Meizu (58) MFT (4) MGT (33) mi account remove (55) Micro Art (2) mine (1) Momo (7) movies (12) MP3 (2) MPT (5) MyPhone (22) Newings (3) Nipda (3) Nokia (10) Nova (7) Open (1) Oppo (162) Oppo Clone (1) ORRO (7) OSE (3) PC (2) PHICOMM (5) photoshop (1) pinpaternpassword (1) player (1) Power (3) Prestigio (1) Professional (4) QBZ (1) Ramos (5) rapidleech (1) Recovery software (1) Red Star (1) Samsung B seires (1) Samsung Clone (204) Samsung combination (360) Samsung Full (45) Science (13) Server (2) SINGTECH (90) SKG (4) SM-J530F full (1) Sony (73) Speed (7) SYH (94) tayar (1) TCL (1) Teaching (2) tecno (92) Teeno (1) Telenor (7) TIMMY (4) titan (20) True Smart (51) trueme (1) TWZ (34) uneed (1) uptobox (2) VG (9) Video (12) Vinovo (8) VIOVO (3) Virtual card (1) Vital (15) Vitu (3) Vivo (190) Vivo Clone (1) Voto (1) vps (8) WainFord (1) Wave (33) web (2) Wiko (5) Window (82) window font (1) X-BO (76) XDU (8) ZTE (25)