GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Hard/Software Products (official support) > Easy-Jtag / Easy-Jtag Plus

Easy-Jtag / Easy-Jtag Plus The official support section. You can ask here your question and get answer regarding using Easy-Jtag / Easy-Jtag Plus.

Reply
 
LinkBack Thread Tools Display Modes
Old 07-19-2018, 12:47   #31 (permalink)
Freak Poster
 
Join Date: May 2014
Posts: 261
Member: 2182001
Status: Offline
Thanks Meter: 50

Quote:
Reading Android Info

Partition [/system] Not Found, Try Extended Search..
Partition #61 is [/system]. Mount..
Reading data..

Vendor = unknown
Brand = Huawei
Model = generic_a53_32
Device ID = generic_a53_32
Name ID = generic_a53_32
Android version = 7.0
Firm version = System 5.1.0.78(0H7S)
Firm date = Wed Oct 4 19:12:13 CST 2017
SDK version = 24
ID = NRD90M
CPU ABI = armeabi-v7a
CPU ABI2 = armeabi
CPU ABI LIST = armeabi-v7a,armeabi
CPU ABI LIST32 = armeabi-v7a,armeabi
Product = generic_a53_32
Ok so i have the same problem no ways guys need a key master blobs stored in cpu.. unique for each device like ios!
  Reply With Quote
Old 07-19-2018, 16:26   #32 (permalink)
Freak Poster
 
Join Date: May 2014
Posts: 261
Member: 2182001
Status: Offline
Thanks Meter: 50
For who have a working phone you can do that
You need to extract
Simply invoke the python script fde_bruteforce.py using:

The crypto footer from the device
The leaked KeyMaster keys


For other i think the only ways is swap emmc and cpu e recover the data...
  Reply With Quote
Old 07-19-2018, 20:09   #33 (permalink)
Freak Poster
 
Join Date: Oct 2016
Posts: 282
Member: 2636476
Status: Offline
Thanks Meter: 53
I hve the same situation in motorola xt1550 phone is short i remove emmc then dectect in easy jtag fully encrypted data
  Reply With Quote
Old 07-19-2018, 21:15   #34 (permalink)
Freak Poster
 
Join Date: May 2014
Posts: 261
Member: 2182001
Status: Offline
Thanks Meter: 50
Quote:
Originally Posted by coderinside View Post
I hve the same situation in motorola xt1550 phone is short i remove emmc then dectect in easy jtag fully encrypted data
remove the short...
For my case, after i backup the full image i try to solve the motherboard hw, reball the pm the phone was in full working condition... Done, see in my twitter the little story https://twitter.com/Nick_Il_Vento
  Reply With Quote
The Following User Says Thank You to genhack23 For This Useful Post:
Old 07-21-2018, 09:06   #35 (permalink)
No Life Poster
 
>>PakFones<<'s Avatar
 
Join Date: Jul 2007
Location: My Computer
Posts: 1,302
Member: 553178
Status: Offline
Sonork: 100.1592454
Thanks Meter: 945
Donate money to this user
Quote:
Originally Posted by coderinside View Post
I hve the same situation in motorola xt1550 phone is short i remove emmc then dectect in easy jtag fully encrypted data

My problem still not solved but if someone have full short phone just watch this video to remove shortage easily.
  Reply With Quote
Old 12-20-2018, 13:15   #36 (permalink)
Freak Poster
 
tahernike's Avatar
 
Join Date: Apr 2007
Location: syria
Age: 31
Posts: 399
Member: 495542
Status: Offline
Sonork: 100.1650191
Thanks Meter: 44
how to get data from Encryption phone

i try many phone new type
like g610f j250f c7000 c9000
always give me that

Code:
Setting interface to EasyJtag2/ISP
Setting bus width to 1 Bit
Setting frequence to 36 Mhz
CMD Pullup Level: 2749 mV
CMD Active Level: 2807 mV
EMMC Device Information :
EMMC CID: 150100434A4E4234521097F959BF2431
EMMC CSD: D02701320F5903FFF6DBFFEF8E40400D
EMMC Manufacture : SAMSUNG , EMMC NAME: CJNB4R , HEX: 434A4E423452 , S/N: 97F959BF , rev. 0x10
EMMC Manufacture ID: 0x15 , OEM ID: 0x00 , Device Type: BGA (Discrete embedded) , Date: 2/2017
   EMMC ROM 1 (Main User Data) Capacity: 59640 MB (000E8F800000)
   EMMC ROM 2/3 (Boot Partition 1/2) Capacity: 4096 KB (000000400000)
   EMMC RPMB (Replay Protected Memory Block) Capacity: 4096 KB (000000400000)
EMMC Permanent Write Protection: No
EMMC Temporary Write Protection: No
Extended CSD Information :
Extended CSD rev: 1.8 (MMC 5.1)
Boot configuration [PARTITION_CONFIG]: 0x38 , Boot from: ROM1 (Main User Area)
Boot Bus Config: 0x00 , width 1bit
H/W Reset Function [RST_N_FUNCTION]: 0x01, RST_n signal is permanently enabled
Supported partition features [PARTITIONING_SUPPORT]: 0x07
Device supports partitioning features
Device can have enhanced technological features in partitions and user data area
Device can have extended partitions attribute
Partition Settings [PARTITION_SETTING_COMPLETED]: 0x00
Backup saved: CJNB4R_97F959BF_20181220_141126.extcsd
EMMC Init completed.

Scan from: CJNB4R

Vendor: Samsung
Searching GPT ...
GPT header is found and is valid

GPT header successfully parsed

Scan done

Mount [efs] successfully   PartType: LINUX
Mount [persist] successfully   PartType: LINUX
Mount [dsp] successfully   PartType: LINUX
Mount [modem] successfully   PartType: FAT16
Mount [apnhlos] successfully   PartType: FAT16
Mount [persdata] successfully   PartType: LINUX
Mount [system] successfully   PartType: LINUX
Mount [cache] successfully   PartType: LINUX
Mount [userdata] SKIPPED   PartType: Full Disk Encryption
  Reply With Quote
The Following User Says Thank You to tahernike For This Useful Post:
Old 12-20-2018, 13:17   #37 (permalink)
Product Supporter
 
NoName®'s Avatar
 
Join Date: Mar 2005
Location: China
Posts: 3,309
Member: 129885
Status: Offline
Sonork: 100:1603514
Thanks Meter: 6,166
Quote:
Originally Posted by tahernike View Post
i try many phone new type

like g610f j250f c7000 c9000

always give me that



Code:
Setting interface to EasyJtag2/ISP

Setting bus width to 1 Bit

Setting frequence to 36 Mhz

CMD Pullup Level: 2749 mV

CMD Active Level: 2807 mV

EMMC Device Information :

EMMC CID: 150100434A4E4234521097F959BF2431

EMMC CSD: D02701320F5903FFF6DBFFEF8E40400D

EMMC Manufacture : SAMSUNG , EMMC NAME: CJNB4R , HEX: 434A4E423452 , S/N: 97F959BF , rev. 0x10

EMMC Manufacture ID: 0x15 , OEM ID: 0x00 , Device Type: BGA (Discrete embedded) , Date: 2/2017

   EMMC ROM 1 (Main User Data) Capacity: 59640 MB (000E8F800000)

   EMMC ROM 2/3 (Boot Partition 1/2) Capacity: 4096 KB (000000400000)

   EMMC RPMB (Replay Protected Memory Block) Capacity: 4096 KB (000000400000)

EMMC Permanent Write Protection: No

EMMC Temporary Write Protection: No

Extended CSD Information :

Extended CSD rev: 1.8 (MMC 5.1)

Boot configuration [PARTITION_CONFIG]: 0x38 , Boot from: ROM1 (Main User Area)

Boot Bus Config: 0x00 , width 1bit

H/W Reset Function [RST_N_FUNCTION]: 0x01, RST_n signal is permanently enabled

Supported partition features [PARTITIONING_SUPPORT]: 0x07

Device supports partitioning features

Device can have enhanced technological features in partitions and user data area

Device can have extended partitions attribute

Partition Settings [PARTITION_SETTING_COMPLETED]: 0x00

Backup saved: CJNB4R_97F959BF_20181220_141126.extcsd

EMMC Init completed.



Scan from: CJNB4R



Vendor: Samsung

Searching GPT ...

GPT header is found and is valid



GPT header successfully parsed



Scan done



Mount [efs] successfully   PartType: LINUX

Mount [persist] successfully   PartType: LINUX

Mount [dsp] successfully   PartType: LINUX

Mount [modem] successfully   PartType: FAT16

Mount [apnhlos] successfully   PartType: FAT16

Mount [persdata] successfully   PartType: LINUX

Mount [system] successfully   PartType: LINUX

Mount [cache] successfully   PartType: LINUX

Mount [userdata] SKIPPED   PartType: Full Disk Encryption


There is no way , without knowledge of password pin etc , used for FDE encryption.
  Reply With Quote
The Following 2 Users Say Thank You to NoName® For This Useful Post:
Old 01-24-2019, 13:53   #38 (permalink)
Freak Poster
 
Join Date: Feb 2014
Posts: 183
Member: 2127758
Status: Offline
Thanks Meter: 25
Quote:
Originally Posted by NoName® View Post
There is no way , without knowledge of password pin etc , used for FDE encryption.
Do you mean pattern code?
So if we have the pin/pattern we can decrypt the data?
  Reply With Quote
Old 03-18-2019, 04:59   #39 (permalink)
Insane Poster
 
c3llf3r's Avatar
 
Join Date: May 2005
Age: 43
Posts: 95
Member: 149217
Status: Offline
Thanks Meter: 21
of emmc will it be possible to read the user's data partition and then write it to another cell of the same model that works very well?
Will it be possible for me to see your user data?
thank you very much I hope soon answer.
  Reply With Quote
Old 05-07-2019, 16:33   #40 (permalink)
No Life Poster
 
Join Date: Feb 2009
Location: inside apple a12
Posts: 503
Member: 975554
Status: Offline
Thanks Meter: 108
Donate money to this user
Quote:
Originally Posted by SILVER ANJEL View Post
s7 s7edge is support?
phone has ufs storage this is deferent type
  Reply With Quote
Old 05-07-2019, 23:05   #41 (permalink)
Product Supporter
 
layder's Avatar
 
Join Date: Jun 2002
Location: Belarus
Age: 44
Posts: 2,461
Member: 13148
Status: Offline
Thanks Meter: 2,144
At new phones userdata is crypted

Last edited by layder; 05-07-2019 at 23:32.
  Reply With Quote
Old 06-12-2019, 17:25   #42 (permalink)
Crazy Poster
 
Join Date: Feb 2009
Posts: 58
Member: 971036
Status: Offline
Thanks Meter: 1
I have problem to extract data from samsung a520f.
This is my log:

Vendor: Qualcomm
Searching GPT ...
GPT header is found and is valid

GPT header successfully parsed

Scan done

Mount [efs] successfully PartType: LINUX
Mount [system] successfully PartType: LINUX
Mount [cache] successfully PartType: LINUX
Mount [preload] successfully PartType: LINUX
Mount [USERDATA] SKIPPED PartType: Full Disk Encryption


I try with easyjtag plus, classic and emmc file manager addon 1.17 but nothing. Any solution?

Last edited by 25gianni25; 06-12-2019 at 17:26. Reason: ext forensic too
  Reply With Quote
Old 06-12-2019, 20:50   #43 (permalink)
Product Supporter
 
layder's Avatar
 
Join Date: Jun 2002
Location: Belarus
Age: 44
Posts: 2,461
Member: 13148
Status: Offline
Thanks Meter: 2,144
Currently there are no solutions

perhaps in the future it will be possible to somehow recognize the partition encryption keys
  Reply With Quote
Old 06-28-2019, 13:24   #44 (permalink)
Junior Member
 
Join Date: Apr 2017
Posts: 9
Member: 2701984
Status: Offline
Thanks Meter: 0
HELP USERDATA] SKIPPED PartType: Full Disk Encryption

HELP USERDATA] SKIPPED PartType: Full Disk Encryption


I do not have access to the data partition I need to remove pattern or read it
  Reply With Quote
Old 06-29-2019, 09:15   #45 (permalink)
Product Supporter
 
layder's Avatar
 
Join Date: Jun 2002
Location: Belarus
Age: 44
Posts: 2,461
Member: 13148
Status: Offline
Thanks Meter: 2,144
There are no simple way to decode data from crypted partition - only format it, and data lost (with password settings)
  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 00:48.



Powered by Searchlight © 2020 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2020 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2017 -
Page generated in 0.39187 seconds with 8 queries

SEO by vBSEO