4,8 RATING:
Purchase satisfaction
94,9%
Customer service
94,2%
Shop offer
92,9%

Cart

0 products
Main page > Mobile Phone Repair Services > Code read (PIN, Pattern) > Read Pattern Lock code from phone with OTG - based on Android 4.x.x / 5.x.x

Reading the PIN / BackupPIN / Pattern Lock code in phones is a non-invasive service, which means that the phone does not need to have USB debugging or developer mode enabled - we do not make any changes to the phone, i.e. we do not disassemble it, do not interfere with data and do not upload Recovery.

Read Pattern Lock code from phone with OTG - based on Android 4.x.x / 5.x.x

Read Pattern Lock code from phone with OTG - based on Android 4.x.x / 5.x.x
Price: 129,00 EUR w/o VAT
Select product properties:
Attack type: ?

Quantity

ID: 21172

Product weight: 0.20 kg

Add to store products

Ask for product

This product cannot be purchased using Paypal due to their restriction on computer surveillance products. Other payment methods available.

Read Pattern Lock code from phone with OTG - based on Android 4.x.x / 5.x.x is a service based on a reading of the Pattern Lock code . The service is non-invasive, it means that the phone does not need to have enabled USB debugging or programmer mode - does not make any changes to the phone, ie. We do not disassemble device, we do not interfere in the data and not upload anything to phone (Recovery etc.).


Supported operating systems and processors;
  • Android 4.x.x based on processors other than the MediaTek (MTK) and Speadstrum (SPD), ie., Qualcomm, Tegra, Exynos, Broadcom, etc.
  • Android 5.x.x based on processors other than the MediaTek (MTK) and Speadstrum (SPD), ie., Qualcomm, Tegra, Exynos, Broadcom, etc.

    * If you have a phone based on processor MTK / SPD refer to the cheaper service in our offer on the page -> Read codes Android phones based on MTK / SPD processors


    Advantages and disadvantages of (+/-) when reading code using BruteForce
    + Without root (no need to load Custom Recovery exposing device to damage)
    + Without turning on USB debugging
    + Without unlocking the bootloader
    + Without apply KNOX flag which cause lost of warranty
    + Without removing / reset and code (the code remains unchanged - we only read it)
    + without interfering with the system, software, hardware !!!!!
    - The process is time-consuming
    - Limitations on the version of the Android system

     

    Deadlines and method of the service:
    After placing an order please fill Application form which you will attach to shiped device and determine how to deliver the device. There are two possibilities:

  • pdelivery it personally
  • send it on your own by courier/post

    The standard term of service is from 5 to 14 working days from receipt of the unit to our company and acceptance of order. Express is agreed individually depending on the type of attack and takes from 24 hours to 5 days (extra charge + 50%).


    Frequently Asked Questions (FAQ):

    Q: What is the BruteForce attack ?
    A: Bruteforce is a physical attempts to read the code. For example, selecting the options for attack code 6 PattarnLock character, we have to check all the possible combinations and there are up to 26016 to find the right one. Please take into account that due to the construction of the mechanism itself codes 4 and 5 character long can not be excluded if you choosing to attack the 6 character code - you have to check them separately. Why? If the graphic signs assign the corresponding numbers ie. 1234567890 and we want to read 6 characters (starting from 000000 to 999999) so for the phone code 001234, code with 4 digits so 1234 will not work (the complete code in this case must always be 6 characters).


    Q: To whom is this service ?
    A: Read code using Bruteforce is dedicated especially for experts, investigators (laboratories, Police), detectives, who can not make any interference in the data stored on the device - ie. Not violate their integrity or they can not be done due to breach of warranty (upload Recovery ends with apply KNOX flag and loss of warranty offered by the manufacturer). It is also dedicated to those who have established themselves unintentionally code and do not remember it, and on the phone were important images / data - in this case the most important is non-invasive access to the files.


    Q: I have a phone which established pattern, but I do not know what is the length - what do you do?
    A: In this situation, unfortunately, you need to check all the possible combinations, performing an attack on each option separately ie. 4-digit, 5-digit, 6 digit, 7-digit, 8 digit and 9-digit. The fastest method in this situation, however, is to read the code directly from the memory dump.


    Q: I am sure that the code which has assumed a certain character / number - if it will speed up the attack and reduce the price?
    A: Yes - each symbol which is known, significantly reduces the time of the attack, which is also reflected on the price of the service. In this situation, when you know the position and character please contact us.


    Q: I chose the option of reading the 4 character code, however, it was not found - I need to pay for service?
    A: If you have selected options to read 4 character code and was not found, it means that the actual length of code is different than 4 characters - in this case you need to pay fee for the attack. In this situation, you can purchase options for reading 5 / 6 etc. character and make further attempts to read the next character.


    Q: Why reading is so expensive?
    A: Price reflect to time that the BF device in our company is "busy" and working to find code - the longer is, the longer it will last attack. Below are examples of times for different attacks (a type of attack, the amount of variation to determine the maximum attack time):
    - 4-character all combinations, 1624, the maximum time of about 3 hours. 30 minutes.
    - 5 character all combinations, 7152, the maximum time of about 15 hours. 10 min.
    - 6 character all combinations, 26016, the maximum time of about 55 hours. 30 minutes.
    - 7 character all combinations, 72,912, the maximum time of about 155 hours. 10 min.
    - 8 character all combinations, 140,704, the maximum time of about 299 hours. 30 minutes.
    - 9 character all combinations, 140,704, the maximum time of about 299 hours. 30 minutes.


    Q: You offer to read phone that got OTG - how to check whether the phone got OTG and what is it?
    A: OTG, which is simply the mode USB On-The-Go, is a kind of USB connector, which is used in devices such as phones and tablets that allows you to connect peripherals such as a mouse, keyboard . Information about OTG in your phone, you can check at manufacturer's specifications or in the instruction manual - if you don’t have such you can obtain a special adapter OTG and connect through it mouse or keyboard - if the device is detected this indicates that the phone supports OTG.


    Q: The phone does not have OTG - is there a chance to read the code without opening, downloading anything to your computer?
    A: Yes - in this situation we should use a special robot that can perform the reading, "emulating" a real touch of our fingers - contact us for individual pricing.


    NOTE: In some branded manufacturers ROM or after the installation of third party applications is not possible to Bruteforce because of the possibility of removing data after being entered incorrectly code - in this case, the only solution (if you do not want to upload recovery ) is direct reading code from eMMC memory.
  • Product weight: 0.20 kg.
    Country:
    Courier:
    Delivery time: 14-28 working days from shiping date
    Shipping cost: 9.61 EUR

    NEGOTIATE PRICE

    PDF
    If you are interested in Read Pattern Lock code from phone with OTG - based on Android 4.x.x / 5.x.x you will probably want to take a look at following products:

    See also

    Reading data/image NAND / NOR in binary format (Chip-Off) + Reading data/image NAND / NOR in binary format (Chip-Off) more
    Price:
    129.00 EUR w/o VAT
    Reading data/image UFS/eMMC/eMCP in binary format (BL, EDL, JTAG, ISP) + Reading data/image UFS/eMMC/eMCP in binary format (BL, EDL, JTAG, ISP) more
    Price:
    149.00 EUR w/o VAT
    Reading data/image eMMC/eMCP in binary format (Chip-Off) + Reading data/image eMMC/eMCP in binary format (Chip-Off) more
    Price:
    199.00 EUR w/o VAT
    Analysis and data recovery from file/data dump provided by the client + Analysis and data recovery from file/data dump provided by the client more
    Price:
    79.00 EUR w/o VAT

    Note

    1. Offered by us accessories and replacement parts are not original phone producer parts, but they have been carefully choosen from list of producers to offer highest quality.

    2. Our company sale only hardware/HASP/Box - not software for it. Software can be found and downloaded directly from producers webpage.

    3. All trademarks mentioned on this site are property of their respective companies. Including product names, logos, commercial symbols, trade names and slogans are trademarks of those respective or related companies, and are protected by international trademark laws, and they are used here only for information purpose.