- What Unisoc chipsets and Android versions are supported?
- How to put a Unisoc-based device into the Boot ROM mode?
- From which mobile applications can data be decrypted?
- What encryption methods are supported for Unisoc-based devices?
- Can GPU acceleration be used with Unisoc-based devices?
- What happens if the computer powers off or restarts while I am brute-forcing the device password? Will I lose progress or be charged an extraction from my license balance?
What Unisoc chipsets and Android versions are supported?
Passware Kit Mobile supports a wide range of Unisoc-based mobile devices from manufacturers such as Alcatel, Blackview, HTC, Lenovo, Motorola, Nokia, Wiko, ZTE, Samsung, Oppo, and more.
Unisoc (Spreadtrum) | Android OS |
SC9863A |
9.x-13.x version* |
T606 | |
T610 | |
T612 | |
T616 | |
T618 | |
T700 |
*up to 14.x version for File-Based devices
Passware Tip: Check out the full list of supported devices on our website.
How to put a Unisoc-based device into Boot ROM mode?
Some mobile devices, such as ZTE, Tecno, Infinix, Realme, and Motorola, can be put into the Boot ROM mode using the button combinations. Other devices, such as Nokia and Samsung, require short-circuiting of the test pins. Check the Unisoc test-point gallery for the location of the pins.
From which mobile applications can data be decrypted?
In addition to the passcode recovery, Passware Kit Mobile detects installed applications and either performs their instant decryption or initiates the password recovery process. The decrypted device data is typically saved in plaintext or DAR format for file-based encryption, which is compatible with most forensic tools. Application decryption results are saved as an SQLite database in the “unprotected” folder of the project output folder.
The list of supported applications is as follows:
Application | Recovery Options |
Wickr Me | Instant decryption |
Signal | Instant decryption |
1Password | Instant decryption / Brute-force |
What encryption methods are supported for Unisoc-based devices?
The following encryption methods are supported:
- PIN
- Pattern
- Password
Passware Tip: The passcode length and symbol set can be detected by PKM automatically. Additional information is displayed on the top panel. Use it to customize the attack settings and recover the passcode faster.
Can GPU acceleration be used with Unisoc-based devices?
Yes. For Unisoc-based devices, Passware Kit Mobile can use NVIDIA and AMD GPUs to accelerate the brute-force password recovery. Once the encrypted data is extracted from the mobile device, it can be disconnected from the computer running the PKM.
What happens if the computer powers off or restarts while I am brute-forcing the device password? Will I lose progress or be charged an extraction from my license balance?
The recovery state is automatically saved, so progress is not lost if the computer powers off or reboots. No additional extraction credit is required as long as the same PKM Product Key is used.
To continue the recovery process, launch Passware Kit Mobile again and select the project from the “Recent Projects” tab on the right pane of the start page. Passware Kit Mobile will resume the process from the most recent state.
You can also resume the project by clicking the “Open project” button on the start page and locating the pkm_project.pwproj file in the project output folder.
__________________________________
Overview of Passware Kit Mobile
General questions
Unisoc test-point gallery
Comments
0 comments
Article is closed for comments.