ZTE Skate physical ...
 
Notifications
Clear all

ZTE Skate physical dump parsing

1 Posts
1 Users
0 Likes
796 Views
(@dom_newman)
Posts: 3
New Member
Topic starter
 

Hi all,

I have a case with multiple evidence and one of them is ZTE Skate (U960). Phone has passcode pattern. I tried to use UFED and other forensics tools (Axiom, MobilEdit), but there is no option for bypass lock. I made JTAG physical dump using Octoplus but I cannot parse it anywhere. In Octoplus I saw only two partitions available which is unusual. I tried to parse it in many tools (Blacklight, FTK, Axiom, MobilEdit) with no outcome. It is possible that this old phone is encrypted? And if is how can I find it in image? I tried to find some help on Google but I did not find anything useful.

Thank you for your help.

 
Posted : 06/02/2020 4:32 pm
Share: