urbanadventurer / Android-PIN-Bruteforce

Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for Android devices! (no root, no adb)

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

[FAIL] HID USB device not ready. /data/local/nhsystem/kali-arm64/files/hid-keyboard returned 126 or 127

3bdelrhman-rabie opened this issue · comments

When I downloaded Android-pin-bruteforce files on Kali nethunter and modified the config file this err appeared :

./android-pin-bruteforce crack --length 4
Android PIN brute-force :: version 0.1
[INFO] Loading optimised PIN list for 4 digits (optimised-pin-length-4.txt)
[INFO] PIN list contains 10000 PINs
[INFO] Checking environment
[PASS] HID device (/dev/hidg0) found
[PASS] hid-keyboard executable (/files/hid-keyboard) found
[FAIL] HID USB device not ready. /files/hid-keyboard returned 127.
[FAIL] HID USB device not ready. /files/hid-keyboard returned 127.
[FAIL] HID USB device not ready. /files/hid-keyboard returned 127.
^C

Then I tried it on termux but I found the same problem :

./android-pin-bruteforce crack --length 4
Android PIN brute-force :: version 0.1
[INFO] Loading optimised PIN list for 4 digits (optimised-pin-length-4.txt)
[INFO] PIN list contains 10000 PINs
[INFO] Checking environment
[PASS] HID device (/dev/hidg0) found
[PASS] hid-keyboard executable (/data/local/nhsystem/kali-arm64/files/hid-keyboard) found
[FAIL] HID USB device not ready. /data/local/nhsystem/kali-arm64/files/hid-keyboard returned 126.
[FAIL] HID USB device not ready. /data/local/nhsystem/kali-arm64/files/hid-keyboard returned 126.
[FAIL] HID USB device not ready. /data/local/nhsystem/kali-arm64/files/hid-keyboard returned 126.
^C

I'm using Redmi note 10 pro as a NH's device (with a kernel which ducky hid works on) and a termux's device. And the target phone was Redmi note 10 s , and I tried it on Samsung tab a 2016 (I don't think that it supports otg)