Hello have the following issue,
bash ./android-pin-bruteforce crack -v
Android PIN brute-force :: version 0.1
[INFO] Loading optimised PIN list for 4 digits (optimised-pin-length-4.txt)
[INFO] PIN list contains 10000 PINs
[INFO] # Current Configuration
[CONF] Configuration file:
[CONF] ## PINs
[CONF] PIN list: optimised-pin-length-4.txt
[CONF] Mask:
[CONF] Resume from:
[CONF] PIN Type (PIN or Pattern): PIN
[CONF] PIN Length: 4
[CONF] Direction (normal or rewind): 1
[CONF]
[CONF] ## Timing:
[CONF] Delay before starting: 2
[CONF] Delay between keys: 0.25
[CONF] Cooldown time: 30
[CONF] Cooldown after N attempts: 5
[CONF] Send keys to stay awake during cooldown every N seconds: 5
[CONF] Progessive Cooldown: 0
[CONF] - Attempt count : 1 11 41
[CONF] - Attempts until cooldown: 5 1 1
[CONF] - Cooldown in seconds : 30 30 60
[CONF]
[CONF] ## Keys:
[CONF] Keys to send before starting: enter
[CONF] Keys to bring up the lock screen: escape enter
[CONF] Keys to stay awake during cooldown: enter
[CONF]
[CONF] ## Exiting
[CONF] Exit after fail count: 15
[CONF]
[CONF] ## File paths
[CONF] Log file: bruter.log
[CONF] HID Keyboard device: /dev/hidg0
[CONF] Path to hid-keyboard: /system/xbin/hid-keyboard
[CONF] Path to usb-devices: /usr/bin/usb-devices
[CONF]
[CONF] ## Configuration
[CONF] Dry Run: 0
[CONF] Verbose: 1
[INFO] Checking environment
[PASS] HID device (/dev/hidg0) found
[PASS] hid-keyboard executable (/system/xbin/hid-keyboard) found
[DEBUG] Sending key: enter
recv report: 00
[DEBUG] Sending key: escape
[DEBUG] Sending key: enter
[FAIL] HID USB device not ready. /system/xbin/hid-keyboard returned 5.
Source | Nexus 5 running Linux kali 3.4.0-8.14-Re4son-3.5 #1 SMP PREEMPT Tue Apr 14 22:10:45 AEST 2020 armv7l GNU/Linux
Target | HTC One S
OTG Cables tried |
Working USB keyboard on all above OTG cables
Working with USB cable to Computer Windows 10 using the application, does send keys
Tried swapping from MTP to Charge and back in Dev options (no change)
Tried rebooting victim phone (no change)
ADB logcat show this,
04-27 07:47:00.078 1621 1621 I Binder_A: type=1400 audit(0.0:1876): avc: denied { ioctl } for path="socket:[418058]" dev="sockfs" ino=418058 ioctlcmd=7704 scontext=u:r:system_server:s0 tcontext=u:r:system_server:s0 tclass=unix_stream_socket permissive=1
04-27 07:47:00.078 1621 1621 I Binder_A: type=1400 audit(0.0:1877): avc: denied { ioctl } for path="socket:[418058]" dev="sockfs" ino=418058 ioctlcmd=7704 scontext=u:r:system_server:s0 tcontext=u:r:system_server:s0 tclass=unix_stream_socket permissive=1
setenforce 0
setenforce: SELinux is disabled
Any ideas?