Blackberry 9720 phy...
 
Notifications
Clear all

Blackberry 9720 physical extraction

7 Posts
5 Users
0 Likes
916 Views
(@thanosxid)
Posts: 1
New Member
Topic starter
 

Hello everyone,

I work with a Blackberry 9720 with OS 7.1.0.211. The phone doesn’t have a password protection and the encryption is set to off. I want to get a physical image of the phone because the user deleted some data of it. I tried with latest version of UFED Cellebrite but unfortunately it doesn’t support physical extraction. Is it a possible way to do that with other way or other forensic tool?

Thanks for attention!

 
Posted : 06/03/2018 8:41 pm
(@dandaman_24)
Posts: 172
Estimable Member
 

Chip off will obtain you a physical dump of the handset.

 
Posted : 06/03/2018 9:28 pm
(@qassam22222)
Posts: 155
Estimable Member
 

Chip off will obtain you a physical dump of the handset.

is this solution work with blackberry protected with 4 digt's PIN ?? if i do the chip-off can i read the data or they encrypted ?

 
Posted : 08/03/2018 7:05 pm
(@dandaman_24)
Posts: 172
Estimable Member
 

is this solution work with blackberry protected with 4 digt's PIN ?? if i do the chip-off can i read the data or they encrypted ?

Yes with a 4 digit PIN, If the data is encrypted, the data is encrypted, you need to decrypt it to read it.

Your original post mentioned the device had no security and no encryption.

 
Posted : 08/03/2018 9:37 pm
Igor_Michailov
(@igor_michailov)
Posts: 529
Honorable Member
 

If you know the user blackberry ID and the password, you can decrypt the physical dump.

 
Posted : 09/03/2018 7:23 am
(@brian89)
Posts: 2
New Member
 

Hi Igor,

I have a physical dump from a encrypted 9720 obtained via chip-off and I also have the blackberry ID and password. How do I go about decrypting the physical dump?

Thanks,
Brian.

 
Posted : 05/04/2018 7:07 am
Igor_Michailov
(@igor_michailov)
Posts: 529
Honorable Member
 

see PM

 
Posted : 06/04/2018 4:16 am
Share: