Because the Android OS allows for so much customization, rooting and flashing custom ROMs, it’s bound that at one point in time you will encounter some manner or problems with your phone. Although the usual problem is ending up with a bricked phone, sometimes other features go haywire.
In this tiny tutorial I’ll show you how to get by the Android pattern lock if you had set it up on your Android smartphone and now it’s now working or if you forgot your pattern (the face unlock feature, as you saw can be very easily bypassed). Keep in mind that this method is only experimental and so, it might not work for some devices.
What do you need?
For accomplishing this task, you will need a rooted device, a USB cable, a computer and the USB drivers installed on your computer, because you will do this using ADB (the drivers and SDK files are available on the web, we also featured download links in the How to Root a ICS Smartphone). Pretty simple right? Now, let’s see how to crack the pattern lock on a Android smartphone.
How to crack the Android pattern lock
First of all, you need to install the SDK and USB drivers on your computer. After this, follow these steps:
1. Connect your Android smartphone to your computer with the USB cable.
2. Open a Command Prompt file and navigate to the adb files
3. Write the following lines in the cmd file, each line followed by pressing the “Enter” key.
update system set value=0 where name=’lock_pattern_autolock’;
update system set value=0 where name=’lockscreen.lockedoutpermanently’;
After this, restart your phone and when prompted for the pattern lock, input a random pattern and you are in. Also, another method for doing this, with only one line is this:
adb shell rm /data/system/gesture.key
Do the same steps as before (step 1 and 2), and then input the line above and press “Enter”. Keep in mind that this method of bypassing the pattern lock on a Android smartphone does not work for all devices, so if it doesn’t work, better think of installing a custom ROM. While this method is intended for a good use, we hope you won’t use it to bypass the security of others, as you will be violating their privacy.