Join Us!

Sumsung SM-G920P Ga...
 
Notifications
Clear all

Sumsung SM-G920P Galaxy S6 Lte locked pattern  

  RSS
ali_attouti
(@ali_attouti)
New Member

Hi , I have Sumsung SM-G920P Galaxy S6 Lte locked with pattern and USB debugging is off , So please how to do to extract the data of the phone , I've XRY 8.0

Quote
Posted : 04/07/2019 9:41 pm
Hunter
(@hunter)
Junior Member

If you have XRY just call their technical support!

if you do not, then you will need too download Samsung Odin and root the phone using the root download from this link

https://download.chainfire.eu/786/CF-Root/CF-Auto-Root/CF-Auto-Root-zeroflteusc-zeroflteusc-smg920r4.zip

Next purchase a fairly reliable and cost friendly forensic tool. I prefer either Paraben Android Recover Stick or MOBILedit.

Good Luck

ReplyQuote
Posted : 12/08/2019 9:27 pm
OxygenForensics
(@oxygenforensics)
Active Member

You can try Oxygen Forensic Detective that offers screen lock bypass for this particular Samsung model. If you need a demo license do not hesitate to drop us an email.

ReplyQuote
Posted : 13/08/2019 8:36 am
dbfonseca
(@dbfonseca)
New Member

Well in your case we need to know the binary of devices. You can put it in recovery mode and print screen? Bynary (Ux) is mandatory in this case.

What forensic toll you have?

ReplyQuote
Posted : 14/08/2019 11:43 am
sovietpecker
(@sovietpecker)
Junior Member

I know getting a new forensic tool might sound expensive, but i suggest you go for Cellebrite UFED4PC. Cellebrite's acquisition software is among the best (if not the best) in the market and they have a number of ways to bypass user lock on a device.

I suggest you give them a call and confirm that your device is supported (i would be shocked if it is not) and consider purchasing their software. Also, I would like to point out that the dongle would come with all the wires you would need to do an acquisition and the UFED Physical analyzer software that would help you analyze the acquired data.

Wishing you all the best in your adventures.

ReplyQuote
Posted : 14/08/2019 1:46 pm
mshibo
(@mshibo)
Junior Member

Well, if you want to work with Pattern then it's not really hard to bypass in that model, even with the latest Binary.
First, you need to check weather FRP is ON or OFF from Download Mode.
If it's ON, you'll need to change it to OFF using Z3XBox and FRP UFS feature (Not only Z3XBox offers this feature, another boxes too and remember to use only this method bcuz this one doesn't touch data.
If it's OFF, then you can simply flash TWRP for your phone and then from there you can either do physical acquisition if data isn't encrypted or remove SystemUI from /system partition in case data is encrypted and after you reboot, you can do whatever you want as there won't be any pattern there.

ReplyQuote
Posted : 19/08/2019 10:48 pm
Ug44
 Ug44
(@ug44)
New Member

Well, if you want to work with Pattern then it's not really hard to bypass in that model, even with the latest Binary.
First, you need to check weather FRP is ON or OFF from Download Mode.
If it's ON, you'll need to change it to OFF using Z3XBox and FRP UFS feature (Not only Z3XBox offers this feature, another boxes too and remember to use only this method bcuz this one doesn't touch data.
If it's OFF, then you can simply flash TWRP for your phone and then from there you can either do physical acquisition if data isn't encrypted or remove SystemUI from /system partition in case data is encrypted and after you reboot, you can do whatever you want as there won't be any pattern there.

Hi,
How can i remove systemUI from /system partition. Just deleting systemUI.apk file is enough? The lock pattern settings are stored in data partition. So if the data partition is encrypted you can't access that files. Could you explain a little more please.
Thank you.

ReplyQuote
Posted : 13/09/2019 2:30 pm
henrynicolas
(@henrynicolas)
New Member

Can use chimera tool for this 100% test 8)

Pm me for testing

ReplyQuote
Posted : 28/10/2019 5:00 pm
Share: