GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Hard/Software Products (official support) > Infinity-Box


Reply
 
LinkBack Thread Tools Display Modes
Old 06-07-2016, 11:41   #1 (permalink)
Freak Poster
 
Masta G.'s Avatar
 
Join Date: Dec 2003
Location: Russia, Yaroslavl
Age: 43
Posts: 149
Member: 46415
Status: Offline
Thanks Meter: 16
Philips W6500 phonebook read error


The phone reboots at logo.

Code:
Brand     : Philips
ProdName  : W6500
ProdModel : W6500
Device    : Philips_W6500_A
AndroidVer: 4.2.2
MTKxCPU   : MT6589
MTKxPRJ   : W6500_M6589A_1342_00_V21A_RU
Code:
Operation : Read UserData [ v1.49 ]

PhoneBook : Enabled
PhoneBook : VCFv3 Format output Enabled
Gallery : Enabled

1. Power Off Phone , Remove battery , Insert back
2. Insert USB cable. In some cases require hold BootKey

Wait for phone...
Phone found! [ 91 ]
Sync...
Inital Boot Ok!
BB_CPU_PID : 6583
BB_CPU_NME : [MediaTek] MT6583|6589_S00
BB_CPU_EXT : 0xCA01 , 0x8A00 , 0x0000
Processing BROM stage
Settings for BROM configured!
SecCfgVal : 0x00000000
BromVer   : 0x00FF
BLVersion : 0x0001
PreLoader : Active [ Boot with PL ]
BootLdrSS : NORMAL with SPRELOADER
Processing DA stage
DA Select done, will use MTK_AllInOne_DA_v5.1620.10.01
Sending and initialize DA ...
Running DA ver.3.2 on BBID : 0x86
NAND Flash : NOT INSTALLED
eMMC Flash : 5300014534304D453E0528472370BA55
Initialize Memory ... 
DRAM already initialized by Preloader
DAgent sent , init HW now
eMMC FlashIC initialized
[eMMC] : FLASH_VEN : 0x45 , OEM : 0100
[eMMC] : FLASH_INF : [SANDISK] , G40ME
[eMMC] : FLASH_CID : 45010053454D30344728053E55BA7023
[eMMC] : FLASH_BRT : 0x00200000 , 0x00200000 , 0x00200000
[eMMC] : FLASH_LEN : 0x00000000EC000000
[eMMC] : FLASH_UCP : 3776 MiB [eMMC 4 GiB]
DEV RID    : 0xAF9FB39E80EE46E6C66D1DC99A97327A
INT RAM    : 0x00020000
EXT RAM    : 0x40000000 [1 GiB]
BOOT TYPE  : EMMC_FLASH_BOOT
SOC VERIFY : C1
Boot Ok!


Processiung : PhoneBook extraction

Step #1
Error while reading PhoneBook! Code : 0x01 :(

Operation Failed
I've read fullflash, can you help me with extraction?
  Reply With Quote
Old 06-07-2016, 11:43   #2 (permalink)
No Life Poster
 
JayDi's Avatar
 
Join Date: Mar 2007
Location: Where you live
Posts: 18,542
Member: 462970
Status: Offline
Thanks Meter: 20,352
Hello. We can try check it.
Now, to make sure about it not encrypted - try make "PatternLock" read. It check also FS status and encryption settings.
  Reply With Quote
The Following User Says Thank You to JayDi For This Useful Post:
Old 06-07-2016, 12:01   #3 (permalink)
Freak Poster
 
Masta G.'s Avatar
 
Join Date: Dec 2003
Location: Russia, Yaroslavl
Age: 43
Posts: 149
Member: 46415
Status: Offline
Thanks Meter: 16
Quote:
Originally Posted by JayDi View Post
Hello. We can try check it.
Now, to make sure about it not encrypted - try make "PatternLock" read. It check also FS status and encryption settings.
i guess it's encrypted
tryed with "data protect" and "userdata safe" checked

Code:
Reading data ... 

[Error] : Bad Magic! Encrypted FS!
[Info] : DP Lock not set!
Спасибо!
  Reply With Quote
Old 06-07-2016, 12:45   #4 (permalink)
No Life Poster
 
JayDi's Avatar
 
Join Date: Mar 2007
Location: Where you live
Posts: 18,542
Member: 462970
Status: Offline
Thanks Meter: 20,352
Bad luck.
4.2.x possible to decrypt via bruteforce key. But not sure about this phone and data inside it will costs enough to cover that try.
  Reply With Quote
The Following User Says Thank You to JayDi For This Useful Post:
Old 06-07-2016, 12:46   #5 (permalink)
No Life Poster
 
JayDi's Avatar
 
Join Date: Mar 2007
Location: Where you live
Posts: 18,542
Member: 462970
Status: Offline
Thanks Meter: 20,352
Bad luck.
4.2.x possible to decrypt via bruteforce key. But not sure about this phone and data inside it will costs enough to cover that try.
  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 02:00.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.19688 seconds with 8 queries

SEO by vBSEO