绑定账号,申请解锁,开启OEM解锁:

root前备份相关数据,备份的数据存储在文件分区的MIUI/backup中。
开发者模式中开启USB调试,下载XiaoMiTool
XiaoMiTool是基于JAVA开发的工具,所以可以实现Win、Lnux、Mac跨平台使用,小米官方的解锁工具只能在Win平台使用。
好像要等7天…..
——————————————————-萌萌的分割线——————————————————————————————————————————————————————————————————
解锁BL:




开机进入系统后重新开启开发者模式,准备刷入ROOT
参考 https://unofficialtwrp.com/twrp-3-3-1-root-xiaomi-mi-9-pro/
下载 Magisk 19.3
https://github.com/topjohnwu/Magisk/releases/download/v19.3/Magisk-v19.3.zip
下载 twrp 3.3.1 Xiaomi MI 9 Pro
https://www.mediafire.com/file/d4ln8e8zki6zmhg/331_MI_9_Pro.rar/file
解压后的(recovery.img) MD5 = 9ebb99ba865e327d30186139585c30a5
后续根据编译作者wzsx150的名字找到了发帖纪录
http://bbs.ydss.cn/thread-1468172-1-1.html


选择上面下载的recovery.img
手机重启后自动进入Recovery模式:
刷入magic root
还原资料:
root后可使用网络信号大师抓取5G基带信令 ,网络信号大师(http://m.qtrun.com/zh/)是应用在无线网络优化领域的基于智能终端的网络优化软件,支持目前全球流行的网络制式, 并且提供各层协议的网络层级的信令解码。目前已经支持5G信令解码:











网络信号大师(qtrun.QuickTest)高级功能提供锁网锁频段功能,可以将手机网络设置成GSM Only、LTE Only 等等:


在终端使用PM3设备:
pkg install gitgit clone https://github.com/ikarus23/termux-pm3.gitcd termux-pm3bash termux-pm3.sh install
bash termux-pm3.sh run


更新:
另外,通过 root Mi 9Pro,再配合 EdXposed和 NFCGate X2 (需要两部root、带 NFC的手机),可实现对 13.56Mhz 的标签进行信号Relay做中继攻击。
当然,这里的中继场景需要用到一些技巧,去降低中继过程中,两部手机通讯之间的网络时延。


场景:闪付卡中继、Tesla model 3 的TAG信号中继:
没钱买特斯拉,图片来源@darconeous
还没有评论,来说两句吧...