Rezultate 1 la 7 din 7

Subiect: nokia 5230

  1. #1
    Data înscrierii
    06.05.2013
    Posturi
    5

    nokia 5230

    Buna ziua am si eu un nokia 5230 luat din Spania si vreau sa il decodez,vreau sa il folosesc in reteaua cosmote.ma puteti ajuta?

  2. #2
    Data înscrierii
    02.09.2011
    Posturi
    708
    mergi cu el la un servis ,nu cred sa reusesti sa-l decodezi singura ......

  3. #3
    Data înscrierii
    06.05.2013
    Posturi
    5
    am fost si mi.a cerut 70 lei

  4. #4
    Data înscrierii
    02.09.2011
    Posturi
    708
    Asteapta sa intre colegul apaxtc poate te poate ajuta el,la aceasta sectiunie el este specialistul....

  5. #5
    Data înscrierii
    30.06.2011
    Posturi
    677
    nokia 5230 e pe SL3 NU SE POATE DECODA .... decat la un service 60 ron
    Cum sa verifici daca modelul tau e SL3 ! ? Tasteaza *#0000# iar daca versiunea e peste v50.xx atunci telelfonul tau e SL3.
    o fereastra ar fi sa faci downgrade la o versiune inferioara ...dar s-ar putea sa-l strici
    downgrade sau rescriere totala de soft (pe curat) se face cu "JAF"
    "JAF" NU este un program oficial
    de lucrat cu el este foarte complicat
    DUTE CU TEL LA SERVICE E MAI SIGUR
    PENTRU NOKIA 5230 nu sunt generatoare de coduri ... totul e perdere de timp si reclama.

  6. #6
    Data înscrierii
    30.06.2011
    Posturi
    677
    ASA ARATA O DECODARE 5230 in JAF sau hashcat-lite


    here is an example of a locked nokia 5230 RM-588 PM 120 READ using JAF

    [120]
    0=000000000000000023420000000000000018040000000000 0038000001FFFFFF004C000001FFFFFF0060000001FFFFFF00 74000001FFFFFF000000003F007F206F07FFFFF80000880300 0502000000003F007F206F07FFFFF800008B03000502000000 007FFF6F07FFFFFFFFF800008E03000502000000007FFF6F07 FFFFFFFFF80000910300050223420F23594F23420F23594FFF FFFFFF
    1=D8F6B336A4DF3336BF7DE58A38B1189F6C5CE1E8CA7D43E1 33479A6C37828F1472CDD525D09A03CBF54214CE0086BE8DC7 43CB47A5CB74A695AAC837D8DD8B3BE7460B49D9845F58362E 7D42C8728C55621B9CD541AF3EBFA352197312F6646ADA4296 EDF78CC62BB4FC119DD86A70CF1242E2C68AB1112080170DD3 5CFDAFE5C1641B8393BF0BE82096FB294DCA4106F6320F5D46 0A73BEF7130B11D58F8E04
    2=A6145FBB01450E13976073E855C3FD28E6146F7886ECD2EC 0D5D0482A759D3160FF22EE064E64A9FD63286BD1EAE2F3BA7 F772BF528A3970215D3239736CEBA3BFB1A2EBFF513BED8AED C101EF90B1A5E7909700AD5D225BFEE2F1A8621DFC35A35139 0667843D95FABF5900E6E0A2A98EEFA393F1B33114F2EA7C7B 2E06B1420100
    3=000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000 00000000000000000000000000

    thats the raw data from the permanent memory of the phone.

    this is the format of the data

    PM120-0 SIMLock data
    PM120-1 SHA1 HASH(s)
    PM120-2 RSA sign
    PM120-3 Unlock code store

    We need the SHA1 Hash from the pm120-1 memory location

    D8F6B336A4DF3336BF7DE58A38B1189F6C5CE1E8

    what we are going to do is bruteforce crack the code and it would take forever if we didnt know some of the key to begin with, but we do and the key is made up from as follows

    it is 48 hex char of information

    first part is a master code which is 30 hex char and will be used to generate the unlock codes, the next part is an 8 hex char block of a random number chosen when making the key, next are 2 hex chars of 0 then the imei without the last digit and finally another 2 hexs chars of 0

    example

    using sha1 encryption

    060201080808040602040909080909003583150369840500 = D8F6B336A4DF3336BF7DE58A38B1189F6C5CE1E8

    try it in hexcalc using hex string data format and see that the 48 hex char string on the left generates the above 40 char hash

    the key is split up as follows

    0602010808080406020409:09080909:00:35831503698405: 00
    MASTERCODE :RANDOM :00: 14 CHAR IMEI :00

    62188846249 9899 0 35831503698405 0
    MCODE RND 0 14 CHAR IMEI 0

    The phones IMEI is 358315036984052 and the last char is not included in the hex key.

    Using hashcatlite v0.09 (Do not use v0.10) we can run a brute force attack on the 40 hex char hash, knowing that the imei is part of the key and its format in the key. The part we know is called SALT.

    http://hashcat.net/oclhashcat-lite/

    there are four types of hashcat lite for windows, ATI 32 bit OS, ATI 64 bit OS, Nvidia 32 bit OS, Nvidia 64 bit OS, based on the graphics card GPU chipset.

    the same 4 are there for linux aswell.

    cuda is nvidia
    ocl is ATI



    example usage of hashcat-lite

    cudaHashcat-lite32 --hash-type 1900 --outfile D8F6B336A4DF3336BF7DE58A38B1189F6C5CE1E8:003583150 369840500.out --custom-charset1 00010203040506070809 --hex-charset --gpu-accel 32 --gpu-watchdog=0 D8F6B336A4DF3336BF7DE58A38B1189F6C5CE1E8:003583150 369840500 ?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1

    explanation of the command line

    program cudaHashcat-lite32
    setting SL3 hash type --hash-type 1900
    name of ouput file with result --outfile D8F6B336A4DF3336BF7DE58A38B1189F6C5CE1E8:003583150 369840500.out
    what char range to try with --custom-charset1 00010203040506070809
    expect char range to be in hex --hex-charset
    set gpu priority --gpu-accel 32
    override gpu temp warnings --gpu-watchdog=0
    hex hash first : then salt (IMEI) D8F6B336A4DF3336BF7DE58A38B1189F6C5CE1E8:003583150 369840500
    mask to use for charset ?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1

    the override gpu temp should only be used when hashcat cannot read from your graphics card the correct temp and aborts.

    make sure you are using the latest drivers for the graphics card and the system has a clean fan as this will be working the gpu hard and the system would stop if the card gets too hot and you will have to restart your system.

    the time it takes hashcat to discover the key from the hash is known due to knowing the key format, the of possible combinations and how many tries in a given time your GPU is capable of.

    after running hashcat pressing the s key will show the status and time remaiing.

    your computer system is now responsible for the speed it takes to calculate the code, only the latest graphics cards from ati have been able to reduce this time now down to a few hours or possibly much less, even minutes.

    how long it will actually take depends on which key it happens to be in the sequence tried, sometimes its better to start from the last and work back to the first or sometimes its the opposite.. its just depends what numbers you have been given by nokia in the PM 120. This can be done by reversing the charset to 09080706050403020100 from 00010203040506070809.

    once hashcat has cracked the key it will save it the output file, which you will then need to open.



    next converting the cracked key into an unlock code, what apps you need.
    index.php.jpg DECI FOARTE SIMPLU DACA CUNOSTI CEVA LINUX

  7. #7
    Data înscrierii
    06.05.2013
    Posturi
    5
    multumesc pentru ajutor am inteles ca nu il pot decoda eu..ma voi duce cu el la un service

Permisiuni postare

  • Nu poți posta subiecte noi
  • Nu poți răspunde la subiecte
  • Nu poți adăuga atașamente
  • Nu poți edita posturile proprii
  •  

Cabinet psihologic iasi

Matrimoniale Noi Doi

Anunturi iasi BursaIasi.ro

Psiholog-Iasi.ro