ZTE Skate physical dump parsing
I have a case with multiple evidence and one of them is ZTE Skate (U960). Phone has passcode pattern. I tried to use UFED and other forensics tools (Axiom, MobilEdit), but there is no option for bypass lock. I made JTAG physical dump using Octoplus but I cannot parse it anywhere. In Octoplus I saw only two partitions available which is unusual. I tried to parse it in many tools (Blacklight, FTK, Axiom, MobilEdit) with no outcome. It is possible that this old phone is encrypted? And if is how can I find it in image? I tried to find some help on Google but I did not find anything useful.
Thank you for your help.