Yes, the MTP exploit is pretty decent, we had it in UFED since almost two years ago (August 2016) after we discovered it privately - that's what powered the "Partial File System" Samsung method.
Several other vendors have added implementations a few months after it was publicly released in November 2017.
Regarding the J320F/N950F with (or without) Secure Startup - we can provide lock-bypassing physicals with access to KNOX Secure Folder for these models and many others at CAS.
Shahar
Hmm, I'm in doubt a bit about the N950F )
Well, many people doubted when we (Cellebrite) said we could unlock iPhones with iOS 9, and then 10, and then 11… wink
The Galaxy Note 8 was easier.
Shahar
This exploit only works on Samsung devices Yes ?
I got Samsung Samsung Galaxy J7 2016 (J710FN) with broken screen. The phone is working but I cant see anything. I use this MTPwn exploit and it worked. It listed me phone's files and downloaded one random file.
My question is how to customize this to exploit to download all the visible - listed files ?
I got Samsung Samsung Galaxy J7 2016 (J710FN) with broken screen. The phone is working but I cant see anything. I use this MTPwn exploit and it worked. It listed me phone's files and downloaded one random file.
My question is how to customize this to exploit to download all the visible - listed files ?
how can i display content of mtpwn file i got after process?
Well, many people doubted when we (Cellebrite) said we could unlock iPhones with iOS 9, and then 10, and then 11… wink
The Galaxy Note 8 was easier.Shahar
Shahar, the mentioned device was returned from CAS after more then 2 months, without success. This is why I mentioned about the Note 8 (