Samsung J7 Prime (S...
 
Notifications
Clear all

Samsung J7 Prime (SM-J727T1)

5 Posts
4 Users
0 Likes
601 Views
(@olsjason)
Posts: 1
New Member
Topic starter
 

Hello, I'm wondering if anyone has had success performing an extraction on this device? We have one which is locked with a numerical pincode (4 digits at minimum). We're willing to go Chip-off and/or JTAG routes but it seems there has been little success with this particular model. Thank you for any help!

 
Posted : 04/04/2018 2:35 pm
(@shahartal)
Posts: 27
Eminent Member
 

This model can be sent to CAS (Cellebrite Advanced Services) and is supported for a lock-bypassing physical extraction.
Secure Startup is bruteforceable as necessary.

 
Posted : 10/04/2018 9:50 am
passcodeunlock
(@passcodeunlock)
Posts: 792
Prominent Member
 

This model can be sent to CAS (Cellebrite Advanced Services) and is supported for a lock-bypassing physical extraction.
Secure Startup is bruteforceable as necessary.

This device is Qualcomm MSM8953 Snapdragon 625 based.

Isn't UFED 4PC suitable to do a physical acquisition with automatic user data decryption in EDL mode and using the UFED EDL cable ?!

 
Posted : 10/04/2018 3:49 pm
(@the_grinch)
Posts: 136
Estimable Member
 

It will have encryption on so chip off will be a no go.

 
Posted : 11/04/2018 12:00 am
(@shahartal)
Posts: 27
Eminent Member
 

Generally, the Decrypting EDL method is capable of producing decrypted physical extractions of supported phones.
For this chipset and model, we don't have support yet in UFED.

 
Posted : 14/04/2018 7:51 pm
Share: