Join Us!

PINOUT SM-J510FN......
 
Notifications
Clear all

PINOUT SM-J510FN....?  

  RSS
brozas
(@brozas)
New Member

Greetings fellow, I need to make a dump of a samsung sm-j510fn by means of "direct emmc on the board", I have not found the pinout on the internet, if someone has it would be very helpful.
A greeting, thank you.

Quote
Posted : 21/05/2019 11:18 am
JaredDM
(@jareddm)
Active Member

Try posting a picture of the underside of the eMMC or the PCB with the eMMC removed. I'm sure someone can help identify it that way. Or, at the very least, post the part number of the eMMC chip.

Or are you saying that you're trying to read it without actually removing it? (if so, you'll probably need to destroy a good phone to find/follow the traces of the eMMC)

ReplyQuote
Posted : 21/05/2019 2:12 pm
arcaine2
(@arcaine2)
Active Member

There's no pinout because at least one of the lines, D0 i believe goes directly to CPU. You'd have to find a trace and solder into that if possible. Chip-off is a way to go for that one. It's _not_ encrypted by default.

ReplyQuote
Posted : 21/05/2019 8:43 pm
passcodeunlock
(@passcodeunlock)
Senior Member

What about flashing TWRP on it and dump the entire eMMC content without any kind of JTAG / chip-off hassle ?!

ReplyQuote
Posted : 22/05/2019 11:27 am
arcaine2
(@arcaine2)
Active Member

As long as you're able to remove or disable FRP Lock (enable OEM Unlocking in developer settings) - sure.

ReplyQuote
Posted : 22/05/2019 7:38 pm
Bolo
 Bolo
(@bolo)
Member

While in fact as Arcaine write D0 pin is located under CPU then it's not true information that only chipOff is possible - we are able to read physicaly this phone (J510FN variations) without CPU remove

ofcourse I don't accept any method with will trigger KNOX (warranty void) as well close access to KNOX container data like TWRP, root etc

ReplyQuote
Posted : 24/05/2019 1:15 pm
arcaine2
(@arcaine2)
Active Member

I assume there's a trace somewhere that you can solder/connect into, like on Lumia 530 etc. Mind sharing that pinout for future use then, or you're rather thinking about some bootloader exploit instead?

ReplyQuote
Posted : 24/05/2019 7:05 pm
brozas
(@brozas)
New Member

Greetings, comrades, I've been away from work a few days …
The fact is that the terminal was quite destroyed and before making a chipoff, to get the data I wanted to do it directly direct emmc through a box type octoplus pro. but I see that in the end I will play the chipoff, because I can not find an auxiliary pin contact D0, with what will be meat grill …. jejjeje piesno also that the aprticion / data is not encrypted …. cross fingers …
Greetings to all and thank you very much.

ReplyQuote
Posted : 28/05/2019 10:04 am
dbfonseca
(@dbfonseca)
New Member

Today I have one A510m to reset pincode without data loss. The best option is ISP and Jtag.
As I dont have the pinouts yet, I bought an old screp board!

1) Will remove Emmc from board
2) Will check schematics
3) Will search for pinouts ( clk, cmd, dat0, 1.8v and 2.8V)
4) If I have success post result here!

ReplyQuote
Posted : 14/08/2019 11:57 am
arcaine2
(@arcaine2)
Active Member

Today I have one A510m to reset pincode without data loss. The best option is ISP and Jtag.
As I dont have the pinouts yet, I bought an old screp board!

A510M and J510 are a different phones so i assume it's a typo. J510M might be supported by UFED to password removal, J510F/FN is and works fine.

ReplyQuote
Posted : 14/08/2019 5:53 pm
Bypx
 Bypx
(@bypx)
New Member

While in fact as Arcaine write D0 pin is located under CPU then it's not true information that only chipOff is possible - we are able to read physicaly this phone (J510FN variations) without CPU remove

ofcourse I don't accept any method with will trigger KNOX (warranty void) as well close access to KNOX container data like TWRP, root etc

I've done many J510FN using EDL testpoint and UFED 4PC generic Qualcomm EDL extraction without any issue.

ReplyQuote
Posted : 11/09/2019 11:57 am
Bolo
 Bolo
(@bolo)
Member

@Bypx to make physical dump from this phone you don't need even open it - it works with encrypted b yuser or generic (not encrypted) version

ReplyQuote
Posted : 11/09/2019 1:34 pm
Bypx
 Bypx
(@bypx)
New Member

@Bypx to make physical dump from this phone you don't need even open it - it works with encrypted b yuser or generic (not encrypted) version

With UFED you can only perform physical extraction via ADB. So if phone is bootlooping or dead you can't.

A forensic recovery is another option, e.g. using magnet axiom.

ReplyQuote
Posted : 11/09/2019 2:48 pm
henrynicolas
(@henrynicolas)
New Member

Only by direct acccess to EMMC and use BGA sockect or reading by Moorc and Z3X Jtag.

ReplyQuote
Posted : 28/10/2019 5:05 pm
arcaine2
(@arcaine2)
Active Member

Only by direct acccess to EMMC and use BGA sockect or reading by Moorc and Z3X Jtag.

Nope. You can force EDL mode (either via testpoint as shown above) or by shorting CMD signal for example, and then used UFED with generic EDL profile to create a dump. Since phone is not encrypted by default this method will also work if phone is bootlooping.

ReplyQuote
Posted : 28/10/2019 7:38 pm
Share: