cell phone jtag ana...
 
Notifications
Clear all

cell phone jtag analysis

3 Posts
2 Users
0 Likes
377 Views
(@jmack)
Posts: 4
New Member
Topic starter
 

I am familiar with jtag for password\pattern bypass, but need assistance with full rom dump analysis through ftk. I created a .bin (dump) of rom1 on htc incredible 2. I was able to acquire 1.9g of the 2.1 of area availible. I used ftk imager to create a dd image of the .bin file. When i mount the image ftk imager monts approximately 6 plus drives. Is this normal? I believe it is a sound dump since it has readible content and directories noted. I am looking for the following

1. Experienced assistance regarding mounting the image.
2. Sound literature regarding physical analysis of jtag images with ftk or encase.

The physical analysis through full jtag image was necessitated due to broken screen. My initial intentions with jtag was password\ pattern bypass. Until now, i have had no requirement for conducting a jtag analysis only. I do not like phone image carver, and can use open source carver software with custome signatures. I would prefer to use ftk. Ftk would make reports easier.

Thank you

 
Posted : 02/05/2014 6:56 am
(@jay_bo)
Posts: 27
Eminent Member
 

Have you tried using the emmc plugin in the RIFF JTAG Manager?

 
Posted : 02/05/2014 12:30 pm
(@jmack)
Posts: 4
New Member
Topic starter
 

No, i have not tried it yet. I quickly did a little reading on the plugin. I understand that the plugin will assist with mbr and ebr partitions, and can be saved individually. It will also assist in identifying locations stored throughout the device.

Are you also suggesting mounting all partitions individually?
Is this tool referenced to assist solely in acquisition?
Are there any additional resources regarding this plugin other than Riff JTAG Box faq?

Thanks for the replies

 
Posted : 02/05/2014 4:20 pm
Share: