Mithun_Mirpur

Junior Member
Joined
Sep 28, 2010
Posts
15
Likes
0
Successfully read .bcl file via usb using ATF

022548.jpg


Scanning USB Ports...

================================================
Basic Phone Information
================================================
MCU Version: V ICPR72_09w46.5 22-02-10 RM-559 (c) Nokia
IMEI Plain : 352006049772982
IMEI Spare : A352006049772980
IMEI SV : 33520060497729813F
Phone Model: Nokia X6-00
Category : Classic Phone
Phone Type : RM-559

================================================
Extended Phone Information
================================================
Product Serial Number: MIK992441
Product Code : 05999F5
Module Code : 0204640
Basic Production Code: 0599978
Long Production SN : 0
MCU SW Version : V ICPR72_09w46.5 22-02-10 RM-559 (c) Nokia
HW Version : 1222
RFIC Version : |Vapaus_5.1 | Aura_?.?
DSP Version : ICPR72_09w45
Content Pack Version : 10.7.018_004_U314
AHNE Version : 11
APE SW Core Version : V 10.7.018
Variant Version : V 10.7.018V 10.7.018 10.7.018.314.08
APE Test Version : rm559_ENO_x_09wk28v0.430
RETU Version : 16
TAHVO Version : 22
APE HW Version : 256
APE ADSP SW Version : 256
Wireless LAN ID : 80:50:1B:90:3C:EA
Bluetooth ID : 80:50:1B:90:35:1A
CS Type : GSM850, GSM900, GSM1800, GSM1900, WCDMA I, WCDMA II, WCDMA VIII

================================================
Simlock Information
================================================
CONFIG KEY : 8000000000000000
PROVIDER KEY : 4500000088401881
NETWORK NAME : KT;Korea (South)
LOCK COUNTERS : KEYPRESS 0/3, FBUS 0/10
SIMLOCK TABLE :
Block [1] 1:Close
SIMLOCK STATE : LOCKED

SIMLOCK_TYPE : PA_SL3 (15-digit NCK)
SIMLOCK_TEST : PASSED
SECURITY_TEST : PASSED
SECURITY_CODE : ENCRYPTED
PHONE_MODE : TEST


================================================
Decrypt SL3 PM 120 HASHES for Brute Force Unlock
================================================
Decrypting PM 120...

PM 120 HASHES Extracted Successfully

4668A22863B083A7CEE5F980DC6300CDD6088BB8
E4D437F456E77382A21A54E19053E197BCF5DCAA
84B55824292D16D7282AA6CF391B326B6E9DCC0B
850EE1F259D9E265ABC98BDC1CC388DD842CF078
CE391BF180D4707E432ADC856B353F443CF4C358
51B89F7BDBE667EA8CB9C5A13EC5CFA57F6E377B
D0E6E857FEC7B4229A1060108EC2C26CD373CED4
4290C7BD731B9E08ED54E4B64B25EA438233180C



Log Files for Local Brute Force Saved to:
C:\AdvanceBox Turbo Flasher\Nokia\Bruteforce\352006049772982\352006049772982.job
C:\AdvanceBox Turbo Flasher\Nokia\Bruteforce\352006049772982\352006049772982.log
C:\AdvanceBox Turbo Flasher\Nokia\Bruteforce\352006049772982\352006049772982.bcl
C:\AdvanceBox Turbo Flasher\Nokia\Bruteforce\352006049772982\352006049772982.sha

Command Line for ighashgpu:
Saved as MS Batch File: 352006049772982_ighashgpu.bat

Command Line for oclHashcat-lite64 (AMD Cards 64-Bit OS):
Saved as MS Batch File: 352006049772982_AMD_oclHashcat_64-bit.bat

Command Line for oclHashcat-lite32 (AMD Cards 32-Bit OS):
Saved as MS Batch File: 352006049772982_AMD_oclHashcat_32-bit.bat

Command Line for cudaHashcat-lite64 (NVIDIA Cards 64-Bit OS):
Saved as MS Batch File: 352006049772982_NVIDIA_cudaHashcat_64-bit.bat

Command Line for cudaHashcat-lite32 (NVIDIA Cards 32-Bit OS):
Saved as MS Batch File: 352006049772982_NVIDIA_cudaHashcat_32-bit.bat

Process Done!
 

abdulmomin

Junior Member
Joined
Nov 13, 2010
Posts
6
Likes
4
Thanks for a Good Posting

Really it's Good And Very Useful Post..
Continue it.....
 
Back
Top