![]() ![]() ![]() |
![]() |
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | [ Easy-JTAG ] | Direct Unlock Source | Search | Today's Posts | Mark Forums Read |
Easy-Jtag / Easy-Jtag Plus The official support section. You can ask here your question and get answer regarding using Easy-Jtag / Easy-Jtag Plus. |
![]() |
| LinkBack | Thread Tools | Display Modes |
![]() | #31 (permalink) | |
Freak Poster ![]() ![]() ![]() ![]() Join Date: May 2014
Posts: 263
Member: 2182001 Status: Offline Thanks Meter: 51 | Quote:
| |
![]() |
![]() | #32 (permalink) |
Freak Poster ![]() ![]() ![]() ![]() Join Date: May 2014
Posts: 263
Member: 2182001 Status: Offline Thanks Meter: 51 | For who have a working phone you can do that You need to extract Simply invoke the python script fde_bruteforce.py using: The crypto footer from the device The leaked KeyMaster keys For other i think the only ways is swap emmc and cpu e recover the data... |
![]() |
![]() | #34 (permalink) | |
Freak Poster ![]() ![]() ![]() ![]() Join Date: May 2014
Posts: 263
Member: 2182001 Status: Offline Thanks Meter: 51 | Quote:
For my case, after i backup the full image i try to solve the motherboard hw, reball the pm the phone was in full working condition... Done, see in my twitter the little story https://twitter.com/Nick_Il_Vento | |
![]() |
The Following User Says Thank You to genhack23 For This Useful Post: |
![]() | #35 (permalink) | |
No Life Poster ![]() ![]() ![]() ![]() ![]() ![]() Join Date: Jul 2007 Location: My Computer
Posts: 1,305
Member: 553178 Status: Offline Sonork: 100.1592454 Thanks Meter: 956 ![]() | Quote:
My problem still not solved but if someone have full short phone just watch this video to remove shortage easily. | |
![]() |
![]() | #36 (permalink) |
Freak Poster ![]() ![]() ![]() ![]() Join Date: Apr 2007 Location: syria Age: 34
Posts: 406
Member: 495542 Status: Offline Sonork: 100.1650191 Thanks Meter: 45 | how to get data from Encryption phone i try many phone new type like g610f j250f c7000 c9000 always give me that Code: Setting interface to EasyJtag2/ISP Setting bus width to 1 Bit Setting frequence to 36 Mhz CMD Pullup Level: 2749 mV CMD Active Level: 2807 mV EMMC Device Information : EMMC CID: 150100434A4E4234521097F959BF2431 EMMC CSD: D02701320F5903FFF6DBFFEF8E40400D EMMC Manufacture : SAMSUNG , EMMC NAME: CJNB4R , HEX: 434A4E423452 , S/N: 97F959BF , rev. 0x10 EMMC Manufacture ID: 0x15 , OEM ID: 0x00 , Device Type: BGA (Discrete embedded) , Date: 2/2017 EMMC ROM 1 (Main User Data) Capacity: 59640 MB (000E8F800000) EMMC ROM 2/3 (Boot Partition 1/2) Capacity: 4096 KB (000000400000) EMMC RPMB (Replay Protected Memory Block) Capacity: 4096 KB (000000400000) EMMC Permanent Write Protection: No EMMC Temporary Write Protection: No Extended CSD Information : Extended CSD rev: 1.8 (MMC 5.1) Boot configuration [PARTITION_CONFIG]: 0x38 , Boot from: ROM1 (Main User Area) Boot Bus Config: 0x00 , width 1bit H/W Reset Function [RST_N_FUNCTION]: 0x01, RST_n signal is permanently enabled Supported partition features [PARTITIONING_SUPPORT]: 0x07 Device supports partitioning features Device can have enhanced technological features in partitions and user data area Device can have extended partitions attribute Partition Settings [PARTITION_SETTING_COMPLETED]: 0x00 Backup saved: CJNB4R_97F959BF_20181220_141126.extcsd EMMC Init completed. Scan from: CJNB4R Vendor: Samsung Searching GPT ... GPT header is found and is valid GPT header successfully parsed Scan done Mount [efs] successfully PartType: LINUX Mount [persist] successfully PartType: LINUX Mount [dsp] successfully PartType: LINUX Mount [modem] successfully PartType: FAT16 Mount [apnhlos] successfully PartType: FAT16 Mount [persdata] successfully PartType: LINUX Mount [system] successfully PartType: LINUX Mount [cache] successfully PartType: LINUX Mount [userdata] SKIPPED PartType: Full Disk Encryption |
![]() |
The Following User Says Thank You to tahernike For This Useful Post: |
![]() | #37 (permalink) | |
Product Supporter ![]() ![]() ![]() Join Date: Mar 2005 Location: China
Posts: 3,329
Member: 129885 Status: Offline Sonork: 100:1603514 Thanks Meter: 6,191 | Quote:
There is no way , without knowledge of password pin etc , used for FDE encryption. | |
![]() |
![]() | #39 (permalink) |
Insane Poster ![]() ![]() ![]() Join Date: May 2005 Age: 45
Posts: 95
Member: 149217 Status: Offline Thanks Meter: 21 | of emmc will it be possible to read the user's data partition and then write it to another cell of the same model that works very well? Will it be possible for me to see your user data? thank you very much I hope soon answer. |
![]() |
![]() | #42 (permalink) |
Insane Poster ![]() ![]() ![]() Join Date: Feb 2009
Posts: 60
Member: 971036 Status: Offline Thanks Meter: 1 | I have problem to extract data from samsung a520f. This is my log: Vendor: Qualcomm Searching GPT ... GPT header is found and is valid GPT header successfully parsed Scan done Mount [efs] successfully PartType: LINUX Mount [system] successfully PartType: LINUX Mount [cache] successfully PartType: LINUX Mount [preload] successfully PartType: LINUX Mount [USERDATA] SKIPPED PartType: Full Disk Encryption I try with easyjtag plus, classic and emmc file manager addon 1.17 but nothing. Any solution? Last edited by 25gianni25; 06-12-2019 at 16:26. Reason: ext forensic too |
![]() |
![]() | #44 (permalink) |
Junior Member Join Date: Apr 2017
Posts: 9
Member: 2701984 Status: Offline Thanks Meter: 0 | HELP USERDATA] SKIPPED PartType: Full Disk Encryption HELP USERDATA] SKIPPED PartType: Full Disk Encryption I do not have access to the data partition I need to remove pattern or read it |
![]() |
![]() |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|