|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
01-09-2021, 23:54 | #1 (permalink) |
Freak Poster Join Date: Dec 2015 Age: 46
Posts: 417
Member: 2496790 Status: Offline Thanks Meter: 11 | extract contact from samsung 6310 [Answered] and do you have a video that instruct how to recover the contact after reading the section "user data " ? here is the log of the blocks ****************** ****************** . JTAG speed : Auto (RTCK) Protocol ver : 3.0 Buffer size : 0x10840 bytes Storage type : eMMC Storage ID : 0015:0001 Storage size : 3728 MB Device : Samsung eMMC J5U00M Page size : 512 B Block size : 512 B Block count : 7634944 Size : 3728.00 MB Connect successful. --------------------------------------------------------------- SW: 2.1.8; FW: 1.1.0. P00: FSBL (00000001, 00000028) 20 KB P01: QCSBL (00000029, 0000012C) 150 KB P02: FAT32 (00000155, 0000A000) 20 MB P03: OSBL (0000C000, 000007D0) 1000 KB P04: APPSBL (0000C7D0, 000007D0) 1000 KB P05: PART_28 (0000CFA0, 00000FA0) 2000 KB P06: PART_29 (0000DF40, 00006000) 12 MB P07: PART_2A (00013F40, 00001800) 3072 KB P08: PART_2B (00015740, 00001800) 3072 KB P09: PART_2E (00016F40, 00002000) 4 MB P10: PART_2F (00018F40, 00004000) 8 MB P11: PART_30 (0001CF40, 00006000) 12 MB P12: PART_31 (00022F40, 00002000) 4 MB P13: PART_32 (00024F40, 00002000) 4 MB P14: PART_33 (00026F40, 00006000) 12 MB P15: SPLASH (0002CF40, 0000C000) 24 MB P16: PART_35 (00038F40, 00002000) 4 MB P17: BOOT (0003AF40, 00000400) 512 KB P18: AMSS (0003B340, 00001000) 2048 KB P19: PART_3C (0003C340, 00258000) 1200 MB P20: PART_3D (00294340, 00168000) 720 MB P21: PART_3E (003FC340, 00032000) 100 MB P22: PART_3F (0042E340, 00319CC0) 1588 MB ************************** ************************** |
01-11-2021, 12:49 | #4 (permalink) | |
Product Supporter Join Date: Dec 2016
Posts: 2,106
Member: 2665389 Status: Offline Thanks Meter: 2,342 | Quote:
https://www.youtube.com/watch?v=4m493ClSkKw The video is 4 years old, but it can serve as a guide, I hope I have helped you. BR | |
The Following User Says Thank You to Franky_36 For This Useful Post: |
01-11-2021, 13:48 | #5 (permalink) |
Product Supporter Join Date: Mar 2011 Location: Octopus-team
Posts: 9,360
Member: 1538383 Status: Offline Sonork: 100.1587278 Thanks Meter: 3,398 | All devices start from Adnroid 5.x has encrypted userdata partitions, unfortunately, You will not able to extract any data from such devices |
The Following User Says Thank You to Medusa Box For This Useful Post: |
01-11-2021, 14:34 | #6 (permalink) |
Freak Poster Join Date: Aug 2010 Location: Russia,Yekaterinburg
Posts: 102
Member: 1363017 Status: Offline Thanks Meter: 44 | GODISTHEBEST Pull the dump to pull the data directly from memory, podpayatsya on the ISP and consider USERAREA, then pull the data to your heart's content, even extratcore medusa, at least manually, at least some other software . Pulling a dump through JTAG is the same as pulling data from NAND Tsop48, you can count it, but only the controller knows where they are there If we are talking about GT-S6310 then there is android 4.1.2, nothing there is encrypted in the userdat |
The Following 2 Users Say Thank You to andrei_d1978 For This Useful Post: |
Bookmarks |
| |
|