G920V Physical Extr...
 
Notifications
Clear all

G920V Physical Extraction Question

1 Posts
1 Users
0 Reactions
504 Views
(@shaunnash)
New Member
Joined: 7 years ago
Posts: 2
Topic starter  

Hello, I was hoping someone might be able to point me in the right direction. I don't have access to any of the professional tools, but am attempting to extract data (phyiscal) from a locked SM-G920V (G920VVRU4CPH1). I attempted to root the device but believe the bootloader lock is preventing the completion. The device never gets past the Verizon screen when the ENG_Root is flashed via Odin. In that state, that is with the ENG flash, (though USB Debugging setting is off) when the phone is turned off, I can get a root shell via regular old ADB. But it would appear the data is still protected/obfuscated by the bootloader. Having read about Advanced ADB, I know this device has a pre-Nov/'16 security patch. Would anyone be able to point me in the right direction of any other methods for physical extraction that may take advantage of the bootloader/pre-bootloader method? Options that are freeware or consumer grade would be preferred as possible. Thanks for any assistance and the great forum here.


   
Quote
Share: