Join Us!

ZTE Skate physical ...
Clear all

ZTE Skate physical dump parsing  

New Member

Hi all,

I have a case with multiple evidence and one of them is ZTE Skate (U960). Phone has passcode pattern. I tried to use UFED and other forensics tools (Axiom, MobilEdit), but there is no option for bypass lock. I made JTAG physical dump using Octoplus but I cannot parse it anywhere. In Octoplus I saw only two partitions available which is unusual. I tried to parse it in many tools (Blacklight, FTK, Axiom, MobilEdit) with no outcome. It is possible that this old phone is encrypted? And if is how can I find it in image? I tried to find some help on Google but I did not find anything useful.

Thank you for your help.

Posted : 06/02/2020 4:32 pm