Preloader updated? #3
Replies: 12 comments 148 replies
-
DA_PL_NO_CERT_V6 seems to be the default DA file right after the release of the phone. MT6768_USER.bin creation dates 4 days before DA_PL_NO_CERT_V6. |
Beta Was this translation helpful? Give feedback.
-
Yes, preloader changed every update (at least version) and that's why we get ANTI_ROLLBACK. Also DA file was changed at least once, because if you use some DA from lolinet - you get ANTI_ROLLACK error in mtkclient |
Beta Was this translation helpful? Give feedback.
-
Looks like our preloader was compiled with the ability to do this since we get the "emergency download mode" error!! What worries me is the timeout of 5 seconds 🤔 Note I found an older chipset preloader src, but I assume it would still apply somehow. I can't read the preloader decompilation, I don't know asm that much, but surely if we could get an hint on how this function works in our preloader, we might understand better. |
Beta Was this translation helpful? Give feedback.
-
We should avoid updatingin case they patch stuff in the preloader or efuses for loading brom. Our best candidates to boot brom are KPCOL0 if they didn't patch preloader to disable the TP or short CLK. KPCOL0 could get patched, CLK should work in any case (because we make impossible to read the eMMC) |
Beta Was this translation helpful? Give feedback.
-
If one looks the files in those older firmware packages (A13), one can find some interesting stuff. For most firmware RSA downloads just a platform tools package instead of SPFT. It should be easily checked which one it uses. (G24's SPFT run normally doesn't show GUI at all. Then again RSA doesn't show SPFT or any other GUI anyway... ) |
Beta Was this translation helpful? Give feedback.
-
I think they disabled BROM by efuse:
Found in lk.img |
Beta Was this translation helpful? Give feedback.
-
@shomykohai I can't figure out what this command does? |
Beta Was this translation helpful? Give feedback.
-
@progzone122 do you have any idea how tools like AMT claim to unlock bootloader or remove frp on our device? I saw AMT has bootloader unlock for g13 but not g23, but we know it's not an issue. We know that we don't have write access to frp in our device with mtkclient, and during the process AMT logs "patching security data" Could it be that our device has a sort of hidden SLA enabled? I thought, what if we analyze RSA requests with Wireshark to see? We know RSA is capable of upgrading firmware, included parts that we can't flash like preloader and lk. Considering that with mtkclient we can't write even official firmware binaries to protected partitions, how does RSA/SPFT even do it?? You see the problem here? Official software can flash the same contents we can't flash with mtkclient |
Beta Was this translation helpful? Give feedback.
-
Hmm... Many times just DA_PL_NO_CERT_V6 is shared for these tools. Sometimes with a firmware(?) preloader. Now just a preloader... |
Beta Was this translation helpful? Give feedback.
-
Typo in the title, okay, but in the tag too... ?? Well, there is a lot of info out there, some ok, some not so... |
Beta Was this translation helpful? Give feedback.
-
@progzone122 Our preloader doesn't have this function |
Beta Was this translation helpful? Give feedback.
-
@progzone122 I found this source code that apparently made it possible to unlock a bootloader of an Amazon device while looking up for preloader exploit: Do you think we could make something similar? To disable DA verification |
Beta Was this translation helpful? Give feedback.
-
Downloading firmware for penangf Android 13, I compared the preloader file with the new one.
It looks like the two file differ.
Could this be the reason we get DA Anti Rollback when using old DA file included in firmware?
Did the preloader got patched after release date? Or does the preloader changes based on different retail channels?
This would also explain the DA file changing from MT6768_USER.bin to DA_PL_NO_CERT_V6.bin
Old preloader: https://mirrors.lolinet.com/firmware/lenomola/2023/penangf/official/RETAIL/penangf_g_user_13_THA33.31-26_release-keys.zip
Flash Tool with all DAs: https://mirrors.lolinet.com/firmware/lenomola/2023/penangf/flashtool/SP_Flash_Tool_Penang4G_V6.zip
Beta Was this translation helpful? Give feedback.
All reactions