818

[GUIDE] How To bypass authentication and flash in EDL with NO auth for FREE

 2 years ago
source link: https://forum.xda-developers.com/t/guide-how-to-bypass-authentication-and-flash-in-edl-with-no-auth-for-free.4229679/page-5#post-85851589
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

Top Liked Posts

Thanks to:
chaosmaster / k4y0z: GitHub / XDA
xyzz / xyz`: GitHub / XDA
Dinolek: GitHub / XDA
  • How to install:
1. Download the attached file: VD171_MTK-bypass.zip.

2. Extract the file and open the folder.

3. Run and install python: python-3.9.1-amd64.exe.
Keep atention: You need to select "Add Python to PATH" before starting the installation.
image--000.jpg
4. Open cmd or powershell and execute this command:
pip install pyusb pyserial json5

5. Go to the Driver folder and right-click on the cdc-acm.inf file, then click Install and then, close window.

6. Run and install filter wizard: libusb-win32-devel-filter-1.2.6.0.exe.

7. Launch filter wizard.

8. Select Install a device filter and click Next.

9. Connect powered off phone with volume- button to boot in EDL mode.

10. Once you see new MediaTek USB Port in the list, select it and click Install.
image--002.jpg
Now, you are ready for bypassing EDL !
  • How to bypass:
1. Go to the Bypass folder. Run the script: bypass.bat.

2. Connect powered off phone with volume- button to boot in EDL mode.

3. Once you get "Protection disabled" at the end, without disconnecting phone and usb, run SP Flash Tool.
image--003.jpg
4. Once the SP Flash Tool opens, click Options > Options > Connection.

5. Select UART mode and select Baud rate to 921600.
image--004.jpg
Now, you are ready for flashing ! 😍
  • How to update:
1. Download latest release of the tool: https://github.com/MTK-bypass/bypass_utility/releases/latest

2. Download latest release of payloads: https://github.com/MTK-bypass/exploits_collection/releases/latest

3. Extract the content of both files to the Bypass folder.

Now, you are updated !
  • How does the bypass work?

Dissecting a MediaTek BootROM exploit

A bricked Xiaomi phone led me to discover a...

tinyhack.com

All Credits To:
chaosmaster / k4y0z: GitHub / XDA
xyzz / xyz`: GitHub / XDA
Dinolek: GitHub / XDA

Do you need help with your MERLIN device ?
Read this FAQ: https://forum.xda-developers.com/t/...for-merlin-redmi-10x-4g-redmi-note-9.4225177/


#NoAuth #NoAuthentication #No-Auth #No-Authentication #MediaTek #Xiaomi
#MiAuth #MiAuthentication #Mi-Auth #Mi-Authentication #XiaoMiAuth #free
#XiaoMiAuthentication #XiaoMi-Auth #XiaoMi-Authentication #unbricking
#unbricked #unbrick #unbrickingru #unbrickedru #unbrickru #remoterepair98
#MTK #MT6572 #MT6735 #MT6737 #MT6739 #MT6750 #MT6765 #MT6762
#MT6761 #MT6768 #MT6771 #MT6785 #MT8127 #MT8163 #MT8173 #MT8695

Recommend

About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK