Hi!
In our new article we try to answer the following question
Do we really need top mobile forensic hardware?
Here are our thoughts
http//
And what do you think?
I agree with your comments.
Nowadays, Hardware Forensics are obsolete in most cases.
Extremely expensive and totally a fake hardware.
You have plenty of similars FREE or opensource.
andriller, etc.
What it is important nowadays is a firmware or chip copy to attach the firmware on emulators or PC, so you have a copy of the firmware untouched.
Thats how FBI break the iphone case, with a copy of the firmware in virtual emulator )
Cellebrite offer it, but you have some method with a 100USD copier.
Nowadays, Hardware Forensics are obsolete in most cases.
Extremely expensive and totally a fake hardware.You have plenty of similars FREE or opensource.
andriller, etc.
Last time I checked andriller was a software, and I seem to remember not many occasions when I was given FREE hardware 😯 .
@skulkin
It would be IMHO nice ) if (in an article titled "The Future of Mobile Forensic Hardware") you would mention, besides the re-known softwares you listed and provided a reference to
For parsing of the dump you can use both free (FTK Imager [2], SQLite Viewer, NowSecure Forensics CE [3]) and commercial tools (Belkasoft [4], Oxygen Forensic [5]), which cost less.
the actual hardware you used
There was a case in our lab, during which we needed to recover deleted data from HTC One smartphone. The device had a locked bootloader, so it couldn’t be rooted. If we tried to unlock the bootloader, the user data would have been destroyed. Top mobile forensic hardware was not able to solve the problem. To perform physical imaging we used a flasher which cost us just 99 $.
The bolded part above (both a reference to the specific flasher you used and how exactly you used it) would be the (missing) part that I would personally find extremely interesting.
jaclaz
Actually, i'd be interested too in that "flasher" for 99$ that were able to get physical image dump for these devices. I work in mobile phone repair industry for 10+ years, not doing a typical forensic stuff, but often deal with data recovery, including JTAG, direct EMMC/ISP and chip-off methods. During those 10+ years, i in fact never heard about any hardware or software for flashing HTC phones. There are some paid tools (boxes or dongles) that will help you automate some stuff, some that will allow to disable security (s-off) via emulating SIM or java card, but in the end it was always either HSPL, s-off or bootloader unlock and using RUU or custom recoveries. In most cases (s-off and bootloader being unlocked), especially with password/pattern locked phone, it ended up with factory reset anyway.
The only thing i can think of is some JTAG or direct EMMC/ISP box (One M7 supports both without a chip-off), but don't know any (new one) around that price, plus that requires messing with hardware. GPG JTAG, maybe some old used ORT or cloned RIFF could be the closest ones to that pricepoint, but they shouldn't be really called a "flashers".
As a side note, anyone outside of our industry reading this post must be raising their eyebrows over discussions about dongles and flashers. Too bad Monte Python is not around to make a skit about this.
During those 10+ years in fact never heard about any hardware or software for flashing HTC phones.
Now, I am writing an article How to do the impossible.
I agree with your comments.
Nowadays, Hardware Forensics are obsolete in most cases.
Extremely expensive and totally a fake hardware.What it is important nowadays is a firmware or chip copy to attach the firmware on emulators or PC, so you have a copy of the firmware untouched.
Thats how FBI break the iphone case, with a copy of the firmware in virtual emulator )
Cellebrite offer it, but you have some method with a 100USD copier.
Hello,droopycan you tell us more information about the how FBI break the iPhone,we are very curious about the "emulators "you say. )
Thanks
Wonder.
Hello,droopycan you tell us more information about the how FBI break the iPhone,we are very curious about the "emulators "you say. )
Thanks
It is only for special government organizations from his country.
Hello,droopycan you tell us more information about the how FBI break the iPhone,we are very curious about the "emulators "you say. )
ThanksIt is only for special government organizations from his country.
OK,Never mind about it. Igor )
India can tackle iPhone encryption, says country's telecom minister
India's telecom minister Ravi Shankar Prasad said that the country has "implemented solutions" to deal with the "challenges" of encryption in the form of a mobile forensic tool. Apple's encryption battle with the FBI ended with the law enforcement agency consulting a third-party to break into the San Bernardino shooter's iPhone 5c. It looks like the Indian government is also working on tools that will allow it to bypass the encryption on the iPhone.
http//