You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When I downloaded Android-pin-bruteforce files on Kali nethunter and modified the config file this err appeared :
./android-pin-bruteforce crack --length 4
Android PIN brute-force :: version 0.1
[INFO] Loading optimised PIN list for 4 digits (optimised-pin-length-4.txt)
[INFO] PIN list contains 10000 PINs
[INFO] Checking environment
[PASS] HID device (/dev/hidg0) found
[PASS] hid-keyboard executable (/files/hid-keyboard) found
[FAIL] HID USB device not ready. /files/hid-keyboard returned 127.
[FAIL] HID USB device not ready. /files/hid-keyboard returned 127.
[FAIL] HID USB device not ready. /files/hid-keyboard returned 127.
^C
Then I tried it on termux but I found the same problem :
./android-pin-bruteforce crack --length 4
Android PIN brute-force :: version 0.1
[INFO] Loading optimised PIN list for 4 digits (optimised-pin-length-4.txt)
[INFO] PIN list contains 10000 PINs
[INFO] Checking environment
[PASS] HID device (/dev/hidg0) found
[PASS] hid-keyboard executable (/data/local/nhsystem/kali-arm64/files/hid-keyboard) found
[FAIL] HID USB device not ready. /data/local/nhsystem/kali-arm64/files/hid-keyboard returned 126.
[FAIL] HID USB device not ready. /data/local/nhsystem/kali-arm64/files/hid-keyboard returned 126.
[FAIL] HID USB device not ready. /data/local/nhsystem/kali-arm64/files/hid-keyboard returned 126.
^C
I'm using Redmi note 10 pro as a NH's device (with a kernel which ducky hid works on) and a termux's device. And the target phone was Redmi note 10 s , and I tried it on Samsung tab a 2016 (I don't think that it supports otg)
The text was updated successfully, but these errors were encountered:
When I downloaded Android-pin-bruteforce files on Kali nethunter and modified the config file this err appeared :
./android-pin-bruteforce crack --length 4
Android PIN brute-force :: version 0.1
[INFO] Loading optimised PIN list for 4 digits (optimised-pin-length-4.txt)
[INFO] PIN list contains 10000 PINs
[INFO] Checking environment
[PASS] HID device (/dev/hidg0) found
[PASS] hid-keyboard executable (/files/hid-keyboard) found
[FAIL] HID USB device not ready. /files/hid-keyboard returned 127.
[FAIL] HID USB device not ready. /files/hid-keyboard returned 127.
[FAIL] HID USB device not ready. /files/hid-keyboard returned 127.
^C
Then I tried it on termux but I found the same problem :
./android-pin-bruteforce crack --length 4
Android PIN brute-force :: version 0.1
[INFO] Loading optimised PIN list for 4 digits (optimised-pin-length-4.txt)
[INFO] PIN list contains 10000 PINs
[INFO] Checking environment
[PASS] HID device (/dev/hidg0) found
[PASS] hid-keyboard executable (/data/local/nhsystem/kali-arm64/files/hid-keyboard) found
[FAIL] HID USB device not ready. /data/local/nhsystem/kali-arm64/files/hid-keyboard returned 126.
[FAIL] HID USB device not ready. /data/local/nhsystem/kali-arm64/files/hid-keyboard returned 126.
[FAIL] HID USB device not ready. /data/local/nhsystem/kali-arm64/files/hid-keyboard returned 126.
^C
I'm using Redmi note 10 pro as a NH's device (with a kernel which ducky hid works on) and a termux's device. And the target phone was Redmi note 10 s , and I tried it on Samsung tab a 2016 (I don't think that it supports otg)
The text was updated successfully, but these errors were encountered: