How to skip "Verify your account" (Factory reset protection)

There are full guides for various RootJunky devices on YouTube. This first method works in some Samsung and LG devices. Your user can probably start in step 4.

  1. Restart in recovery mode (press and hold Start, Volume up and Power on, and release the power when you see the device turn on / restart).

  2. Perform a factory reset (press volume down to wipe data / factory reset is selected, press On, scroll down to Yes delete all user data and press Power again).

  3. Continue with the device setup wizard until you request the credentials of the Google account.

  4. For a Samsung device, save this RootJunky APK on a USB flash drive and connect it to the device via OTG.

    For LG:

    • Make a backup, connect to Wi-Fi, then make a backup again and press Accessibility (Yes to the question that follows).

    • Activate "Change access", then enter your Settings and set a key for General description, such as Download volume.

    • Return to Accessibility again, go to Vision → Talkback → Settings → Privacy policy to open the browser, and download the APK file linked above (rootjunkysdl.com → Applications).

    • Press the key you set for Overview, press Dual Window and select the file browser.

  5. When the File Explorer starts, search and tap the APK to install it. When you receive the notice about unknown sources, choose the Configuration option and enable the Unknown sources option.

  6. Complete the installation and choose Open the application, which will open the Configuration.

    For LG:

    • Add a new user account in Users, change it and add your own Google account through Settings, then return to the main user (Owner) from Settings → Users, and then go to the Main Settings.
  7. Go to Backup and reset and perform a factory data reset. According to my other answer, this will remove FRP from the device.

The APK in (4) is very simple and only opens Settings, you can use any other that does the same if you do not want to trust that source.


Nexus 5, 5X, 6 and 6P running 6.0.1; Goclever Quantum 2 400S running 5.1:

Insert an activated SIM card and call it from another phone. Answer the call, press the Add line (call conference) button and enter * # * # 4646 # * # * or * # * # 4636 # * # * (worked on Nexus 5X). Touch "Usage statistics", then press the Back button, and you're in Settings and you can do a factory reset.

If Factory Restore is disabled thanks to a security patch, you can create a new user account (by reviewing and configuring it), then follow the following guide for the Turbo, starting in the second paragraph.

You can also do this without a simulator through this exploit.


Motorola Droid Turbo running 5.1:

Go through the setup wizard until you find the "About your privacy" page (you may need to connect to Wi-Fi). Click on the "Privacy Settings" link, then on "View Motorola's privacy policy." On that page, select any text and press the Search button, which will open the browser. Enter Settings in the address bar and touch the Suggested Settings application.

Enable developer options (by tapping the version code in About phone seven times), then enter Developer Options and enable USB debugging. Connect your device to a PC with ADB installed (from here) and run this in a shell window:

shell content of adb insert - content deur: // configuration / secure --bind name: s: user_setup_complete --bind value: s: 1

Now you can go to Settings and do a factory reset.


Motorola Droid X Pure running 6.0:

Navigate through the configuration wizard to the Wi-Fi connection screen and select a password protected network. Select "Show password", then enter a password and select the text of the password. Click on "Share" in the menu that appears and select Gmail. Add a POP or Exchange account (do not a Gmail account), and (from the message previously filled in with the text you "shared") select Settings from the 3-point menu and then choose "Manage Accounts" from that same menu.

Now it should be in the Settings application. Follow the previous Turbo guide that begins in the second paragraph, and go!


For devices where none of the above or similar methods work, or after these vulnerabilities are fixed, see my other response.