±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 1 Overall: 34850
New Yesterday: 8 Visitors: 195

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Webinars

Sony Xperia E5 Acquisition

Discussion of forensic issues related to all types of mobile phones and underlying technologies (GSM, GPRS, UMTS/3G, HSDPA, LTE, Bluetooth etc.)
Subforums: Mobile Telephone Case Law
Reply to topicReply to topic Printer Friendly Page
Forum FAQSearchView unanswered posts
Go to page 1, 2  Next 
  

Sony Xperia E5 Acquisition

Post Posted: Mon Aug 20, 2018 11:25 am

Hello colleagues,
I have Sony Xperia E5 with Boot level protection to run Android, USB Debugging mode disabled and locked bootloader.
Based on gsmarena.com it is Mediatek MT6735 so I tried MTK Hack in MobilEdit Forensic Express but nothing happened ( even if it works I know it will be encrypted)

I think It will be very difficult to do anything with this right know because JTAG or Chip-off methods are not the options right now (the raw image will be encrypted anyway).

Any other ideas what could be done with this?  

Thomass30
Senior Member
 
 
  

Re: Sony Xperia E5 Acquisition

Post Posted: Mon Aug 20, 2018 12:34 pm

Without knowing how many devices were seized at one time, have you considered extracting the other devices to try and determine the PIN or passphrase. My experience has been people reuse the same ones from phone to phone.  

kastajamah
Member
 
 
  

Re: Sony Xperia E5 Acquisition

Post Posted: Mon Aug 20, 2018 12:48 pm

@Thomass30: I know a way, but I need physical access to the device. You know my email address, so please drop me a mail...

@kastajamah: true, but logically people wouldn't be asking for help if they would have other ways around already Smile
_________________
Apple passcode unlock + decrypted filesystem dump, Android user locks unlock + physical dump with decrypted userdata partition. We provide our services world-wide, but we reserve the right for choosing which tasks we take and which we deny! 

passcodeunlock
Senior Member
 
 
  

Re: Sony Xperia E5 Acquisition

Post Posted: Thu Dec 06, 2018 4:25 pm

Hi folks,
I am working in a case with Sony Xperia XA(model F3216). Did you guys got success with Sony Xperia Acquisition? Even with bootloader pin code enabled...

Thanks in advance.  

thilizardo
Newbie
 
 
  

Re: Sony Xperia E5 Acquisition

Post Posted: Fri Dec 07, 2018 4:09 am

For Secure Startup enabled devices brute force should be the first step before anything else, once the PIN / pattern / password is found, you know the user lock as well Smile

Secure Startup has nothing to do with locked boot loader (stage 1), many people misuse the term for some reason.
_________________
Apple passcode unlock + decrypted filesystem dump, Android user locks unlock + physical dump with decrypted userdata partition. We provide our services world-wide, but we reserve the right for choosing which tasks we take and which we deny! 

passcodeunlock
Senior Member
 
 
  

Re: Sony Xperia E5 Acquisition

Post Posted: Sun Dec 09, 2018 8:32 am

Well, I believe there's a way around and it starts with unlocking BL.
Fortunately, using Sony Flash Tool, we can unlock BL without triggering userdata wipe. After BL is unlocked we can flash any custom binary files using fastboot mode and in our case, we need to flash TWRP. Data will be encrypted for sure, but we can do something about it. From TWRP, we can mount /system and then delete systemui from /app folder. Now when we reboot phone, you'll find no locks and no system ui but you can access the data on the phone and continue your work.
Any further details needed about the whole process, just let me know.  

mshibo
Member
 
 
  

Re: Sony Xperia E5 Acquisition

Post Posted: Sun Dec 09, 2018 8:43 am

- passcodeunlock
For Secure Startup enabled devices brute force should be the first step before anything else, once the PIN / pattern / password is found, you know the user lock as well Smile


Would you, sir explain the method used to brute-force Secure Startup password?  

mshibo
Member
 
 

Page 1 of 2
Go to page 1, 2  Next