GSM Shop

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Other Gsm/Mobile Related Forums > GSM Programming & Reverse Engineering

GSM Programming & Reverse Engineering Here you can post all Kind of GSM Programming and Reverse Engineering tools and Secrets.

LinkBack Thread Tools Display Modes
Old 05-02-2018, 18:56   #1 (permalink)
Insane Poster
Join Date: Jan 2017
Posts: 95
Member: 2674769
Status: Offline
Thanks Meter: 14
ext4 extract files

I need to locate file in ext4 system.img offset to extract it fast I don't need to use tools for doing it
what is the area for mapping and has the info about files in ext4 img
I need to know where is the offset of file I need to extract it fast
  Reply With Quote
Old 05-02-2018, 20:30   #2 (permalink)
Insane Poster
Join Date: Jan 2017
Posts: 95
Member: 2674769
Status: Offline
Thanks Meter: 14
1- I wont to extract file I don't wont make mount for ext4 2- I wont to just extract file not mount or restore 3- I wont to know physically offset of the file I wont to extract from the ext4 area or file that responsible of save data of what offset is my file started and size of it
  Reply With Quote
Old 05-15-2018, 20:36   #3 (permalink)
Insane Poster
Join Date: May 2017
Posts: 78
Member: 2714502
Status: Offline
Thanks Meter: 11
It's easiest to use a tool like ext2read after you unpack the IMG. It's like a directory browser for the IMG without mounting it.

Otherwise you can mount it to a loopback device easily to pull the file out.

I don't know how to determine the file offset within the IMG but you can use Sleuthkit to find the file and size, then dd it out.
[email protected]:~$ fls -r -l decomsys.img | grep phonemeSearch
++ r/r 5152: phonemeSearch_1_3.raw 2008-12-31 08:00:00 (MST) 2008-12-31 08:00:00 (MST) 2008-12-31 08:00:00 (MST) 0000-00-00 00:00:00 (UTC) 548074 0 0

[email protected]:~$dd skip=7337498 count=548074 if=decomsys.img of=singlefile.file bs=1
  Reply With Quote


Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


All times are GMT +1. The time now is 15:33.

Powered by Searchlight © 2019 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2019 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2017 -
Page generated in 0.26220 seconds with 7 queries