Good morning,
I would like to ask you if do you have any experience with audio recorder - edic-mini Tiny B21. I have one and it is protect via password and I don’t have the password. I need to gain the audio data.
memory
Samsung 119 K9GAG08U03 SCB0 7DD064A3C
Number on case - 17920
I have binary copy (in Linux by dd command) 1 GB - but I only see one logical partition - 8 MB with technical documentation and RecManager program… another data are maybe crypted…
I dont know which algorithm is used to protect this data and if it is possible to crack via any program (bruteforce or something else)?
Thank you
I have a similar problem with other models (e.g. A83) of the same manufacturer, trying to recover some deleted audio files. After taking a physical copy of the device flash RAM (e.g. 4 GB) only two files are recognizable (the proprietary software [for Win*] and a configuration binary file). The audio files have an internal format and reside in a container with unrecognizable filesystem, possibly encrypted. The included SW finds the audio files and decodes them to WAV format.
No help from Google neither from any forensic forum. Bulk extractor, Autopsy 2 and 4, foremost, photorec, testdisk and so on fail miserably.
The creation/extraction of new records works perfectly, but the new entries in the container are unrecognizable or encrypted.
My next step would be to disassemble the enclosed software.
Any help is appreciated
Franco Segna - HTCIA member