GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Hard/Software Products (official support) > GSMServer Products > Medusa


Reply
 
LinkBack Thread Tools Display Modes
Old 01-09-2021, 23:54   #1 (permalink)
Freak Poster
 
Join Date: Dec 2015
Age: 46
Posts: 417
Member: 2496790
Status: Offline
Thanks Meter: 11
extract contact from samsung 6310 [Answered]


hi pls tell me wich block contain the contacts or (user data ) i asume that the contacts in user data section pls help !
and do you have a video that instruct how to recover the contact after reading the section "user data " ?
here is the log of the blocks
******************
******************
.
JTAG speed : Auto (RTCK)
Protocol ver : 3.0
Buffer size : 0x10840 bytes
Storage type : eMMC
Storage ID : 0015:0001
Storage size : 3728 MB
Device : Samsung eMMC J5U00M
Page size : 512 B
Block size : 512 B
Block count : 7634944
Size : 3728.00 MB
Connect successful.
---------------------------------------------------------------
SW: 2.1.8; FW: 1.1.0.
P00: FSBL (00000001, 00000028) 20 KB
P01: QCSBL (00000029, 0000012C) 150 KB
P02: FAT32 (00000155, 0000A000) 20 MB
P03: OSBL (0000C000, 000007D0) 1000 KB
P04: APPSBL (0000C7D0, 000007D0) 1000 KB
P05: PART_28 (0000CFA0, 00000FA0) 2000 KB
P06: PART_29 (0000DF40, 00006000) 12 MB
P07: PART_2A (00013F40, 00001800) 3072 KB
P08: PART_2B (00015740, 00001800) 3072 KB
P09: PART_2E (00016F40, 00002000) 4 MB
P10: PART_2F (00018F40, 00004000) 8 MB
P11: PART_30 (0001CF40, 00006000) 12 MB
P12: PART_31 (00022F40, 00002000) 4 MB
P13: PART_32 (00024F40, 00002000) 4 MB
P14: PART_33 (00026F40, 00006000) 12 MB
P15: SPLASH (0002CF40, 0000C000) 24 MB
P16: PART_35 (00038F40, 00002000) 4 MB
P17: BOOT (0003AF40, 00000400) 512 KB
P18: AMSS (0003B340, 00001000) 2048 KB
P19: PART_3C (0003C340, 00258000) 1200 MB
P20: PART_3D (00294340, 00168000) 720 MB
P21: PART_3E (003FC340, 00032000) 100 MB
P22: PART_3F (0042E340, 00319CC0) 1588 MB

**************************
**************************
  Reply With Quote
Old 01-11-2021, 09:15   #2 (permalink)
Product Supporter
 
Medusa Box's Avatar
 
Join Date: Mar 2011
Location: Octopus-team
Posts: 9,360
Member: 1538383
Status: Offline
Sonork: 100.1587278
Thanks Meter: 3,398
Hello.

Did You try to use Content extractor?
  Reply With Quote
Old 01-11-2021, 12:42   #3 (permalink)
Freak Poster
 
Join Date: Dec 2015
Age: 46
Posts: 417
Member: 2496790
Status: Offline
Thanks Meter: 11
do i need to activate it ? i mean the software is in additional payments ?
  Reply With Quote
Old 01-11-2021, 12:49   #4 (permalink)
Product Supporter
 
Franky_36's Avatar
 
Join Date: Dec 2016
Posts: 2,106
Member: 2665389
Status: Offline
Thanks Meter: 2,342
Quote:
Originally Posted by GODISTHEBEST View Post
do i need to activate it ? i mean the software is in additional payments ?
Good sir, when you buy the box either medusa pro or medusa pro II or the respective upgrades, the content extractor is included in the medusa software, now you have to take into account if the memory is encrypted or not, android system installed, security , etc.

https://www.youtube.com/watch?v=4m493ClSkKw

The video is 4 years old, but it can serve as a guide, I hope I have helped you.

BR
  Reply With Quote
The Following User Says Thank You to Franky_36 For This Useful Post:
Old 01-11-2021, 13:48   #5 (permalink)
Product Supporter
 
Medusa Box's Avatar
 
Join Date: Mar 2011
Location: Octopus-team
Posts: 9,360
Member: 1538383
Status: Offline
Sonork: 100.1587278
Thanks Meter: 3,398
All devices start from Adnroid 5.x has encrypted userdata partitions, unfortunately, You will not able to extract any data from such devices
  Reply With Quote
The Following User Says Thank You to Medusa Box For This Useful Post:
Old 01-11-2021, 14:34   #6 (permalink)
Freak Poster
 
andrei_d1978's Avatar
 
Join Date: Aug 2010
Location: Russia,Yekaterinburg
Posts: 102
Member: 1363017
Status: Offline
Thanks Meter: 44
GODISTHEBEST
Pull the dump to pull the data directly from memory, podpayatsya on the ISP and consider USERAREA, then pull the data to your heart's content, even extratcore medusa, at least manually, at least some other software .
Pulling a dump through JTAG is the same as pulling data from NAND Tsop48, you can count it, but only the controller knows where they are there
If we are talking about GT-S6310 then there is android 4.1.2, nothing there is encrypted in the userdat
  Reply With Quote
The Following 2 Users Say Thank You to andrei_d1978 For This Useful Post:
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 23:51.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.13575 seconds with 8 queries

SEO by vBSEO