Difference between pages "JTAG Samsung Galaxy Centura (SCH-S738C)" and "Windows Shadow Volumes"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
m (Samsung Galaxy Centura SCH-S738C)
 
(How to analyze Shadow Volumes)
 
Line 1: Line 1:
== Samsung Galaxy Centura SCH-S738C ==
+
{{expand}}
  
This phone is supported by the Tracfone network and uses a Qualcomm MSM7625A 800 MHz Snapdragon (S1) Processor. The phone has 4 GB of internal storage with a Samsung KMSJS000KM B308 MoviNAND flash memory chip. This phone is unsupported by RIFF Box for the JTAG process but can be imaged with the direct access plugin.  
+
==Volume Shadow Copy Service==
 +
Windows has included the Volume Shadow Copy Service in it's releases since Windows XP. The Shadow Copy Service creates differential backups periodically to create restore points for the user.  Windows 7 Professional and Ultimate editions include tools to work with and manage the Volume Shadow Copy Service, including the ability to [[mount shadow volumes on disk images]].
  
{| border="1" cellpadding="2"
+
In Windows 8 the shadow volumes seem to have been superseded by File History. For now it looks like it uses similar structures as its predecessors.
|-
+
| [[ File:S738C_front.JPG | 200px ]]
+
|-
+
|}
+
  
=== Getting Started ===
+
== Also see ==
 +
* [[Windows]]
 +
* [[Windows File History | File History]]
 +
* How to: [[Mount shadow volumes on disk images]]
  
 +
== External Links ==
  
What you need:
+
=== How to analyze Shadow Volumes ===
 +
* [http://computer-forensics.sans.org/blog/2008/10/10/shadow-forensics/ VISTA and Windows 7 Shadow Volume Forensics], by [[Rob Lee]], October 2008
 +
* [http://windowsir.blogspot.ch/2011/01/accessing-volume-shadow-copies.html Accessing Volume Shadow Copies], by [[Harlan Carvey]], January 2011
 +
* [http://windowsir.blogspot.ch/2011/01/more-vscs.html More VSCs], by [[Harlan Carvey]], January 2011
 +
* [http://journeyintoir.blogspot.ch/2011/04/little-help-with-volume-shadow-copies.html A Little Help with Volume Shadow Copies], by [[Corey Harrell]], April 2011
 +
* [http://toorcon.techpathways.com/uploads/VolumeShadowCopyWithProDiscover-0511.pdf Volume Shadow Copy with ProDiscover], May 2011
 +
* [http://windowsir.blogspot.ch/2011/09/howto-mount-and-access-vscs.html HowTo: Mount and Access VSCs], by [[Harlan Carvey]], September 2011
 +
* [http://computer-forensics.sans.org/blog/2011/09/16/shadow-timelines-and-other-shadowvolumecopy-digital-forensics-techniques-with-the-sleuthkit-on-windows/ Shadow Timelines And Other VolumeShadowCopy Digital Forensics Techniques with the Sleuthkit on Windows], by [[Rob Lee]], September 2011
 +
* [http://journeyintoir.blogspot.ch/2012/01/ripping-volume-shadow-copies.html Ripping Volume Shadow Copies – Introduction], by [[Corey Harrell]], January 2012
 +
* [http://journeyintoir.blogspot.ch/2012/02/ripping-vscs-practitioner-method.html Ripping VSCs – Practitioner Method], by [[Corey Harrell]], February 2012
 +
* [http://journeyintoir.blogspot.ch/2012/02/ripping-vscs-practitioner-examples.html Ripping VSCs – Practitioner Examples], by [[Corey Harrell]], February 2012
 +
* [http://journeyintoir.blogspot.ch/2012/02/ripping-vscs-developer-method.html Ripping VSCs – Developer Method], by [[Corey Harrell]], February 2012
 +
* [http://journeyintoir.blogspot.ch/2012/02/ripping-vscs-developer-examples.html Ripping VSCs – Developer Examples], by [[Corey Harrell]], February 2012
 +
* [http://journeyintoir.blogspot.ch/2012/02/examining-vscs-with-gui-tools.html Examining VSCs with GUI Tools], by [[Corey Harrell]], February 2012
 +
* [http://dfstream.blogspot.ch/2012/03/vsc-toolset-gui-tool-for-shadow-copies.html VSC Toolset: A GUI Tool for Shadow Copies], by [[Jason Hale]], March 2012
 +
* [http://encase-forensic-blog.guidancesoftware.com/2012/06/examining-volume-shadow-copies-easy-way.html Examining Volume Shadow Copies – The Easy Way!], by [[Simon Key]], June 2012
 +
* [http://justaskweg.com/?p=351 Getting Ready for a Shadow Volume Exam], by [[Jimmy Weg]], June 2012
 +
* [http://justaskweg.com/?p=466 Mounting Shadow Volumes], by [[Jimmy Weg]], July 2012
 +
* [http://justaskweg.com/?p=518 Examining the Shadow Volumes with X-Ways Forensics], by [[Jimmy Weg]], July 2012
 +
* [http://justaskweg.com/?p=710 “Weg, I’m afraid that I don’t have VMware. How do I Examime Shadow Volumes?”], by [[Jimmy Weg]], August 2012
 +
* [http://sandersonforensics.com/forum/content.php?168-Reconnoitre "Examining shadow copies with Reconnoitre (and without vssadmin), it's as easy as 1, 2, 3"], by [[Paul Sanderson]], January 2013
  
 +
* [http://computerforensicsblog.champlain.edu/2014/02/05/volume-shadow-copy-part-2/ Volume Shadow Copy Part 2], by Ryan Montelbano, Scott Barrett, Jacob Blend, February 5, 2014
 +
* [http://computerforensicsblog.champlain.edu/2014/02/26/volume-shadow-copy-part-3/ Volume Shadow Copy Part 3], by Scott Barrett, February 26, 2014
 +
* [http://computerforensicsblog.champlain.edu/2014/03/26/volume-shadow-copy-part-4/ Volume Shadow Copy Part 4], by Ryan Montelbano, March 26, 2014
  
# Riff Box
+
=== Shadow Volumes in depth ===
# USB to Micro USB cord
+
* [http://www.qccis.com/docs/publications/WP-VSS.pdf Reliably recovering evidential data from Volume Shadow Copies in Windows Vista and Windows 7], by [[James Crabtree]] and [[Gary Evans]], 2010
 +
* [http://forensic4cast.com/2010/04/19/into-the-shadows/ Into The Shadows] and [http://www.forensic4cast.com/2010/04/presentation-into-the-shadows/ Presentation], by [[Lee Whitfield]], April 2010
 +
* [https://googledrive.com/host/0B3fBvzttpiiSZDZXRFVMdnZCeHc/Volume%20Shadow%20Snapshot%20(VSS)%20format.pdf Volume Shadow Snapshot format], by the [[libvshadow|libvshadow project]], March 2011
 +
* [https://googledrive.com/host/0B3fBvzttpiiSZDZXRFVMdnZCeHc/Paper%20-%20Windowless%20Shadow%20Snapshots.pdf Windowless Shadow Snapshots - Analyzing Volume Shadow Snapshots (VSS) without using Windows] and [http://www.basistech.com/about-us/events/open-source-forensics-conference/ OSDFC 2012] [https://googledrive.com/host/0B3fBvzttpiiSZDZXRFVMdnZCeHc/Slides%20-%20Windowless%20Shadow%20Snapshots.pdf Slides], by [[Joachim Metz]], October 2012
  
 +
=== Other ===
 +
* [http://lanmaster53.com/talks/#hack3rcon2 Lurking in the Shadows – Hack3rcon II]
 +
* [http://pauldotcom.com/2012/10/volume-shadow-copies---the-los.html Volume Shadow Copies - The Lost Post], [[Mark Baggett]], October 2012
  
=== NAND Dump Procedure ===
+
== Tools ==
 +
* [[EnCase]] with VSS Examiner Enscript (available from the downloads section of the GSI Support Portal)
 +
* [[libvshadow]]
 +
* [[ProDiscover]]
 +
* [http://www.shadowexplorer.com/ ShadowExplorer]
 +
* [http://dfstream.blogspot.ch/p/vsc-toolset.html VSC Toolset]
 +
* [[X-Ways AG|X-Ways Forensics]]
 +
* [http://sandersonforensics.com/forum/content.php?168-Reconnoitre Reconnoitre]
  
 
+
[[Category:Volume Systems]]
# Remove the rear cover, exposing the 7 phillips head screws.
+
# Remove the screws and the rear plastic casing with a plastic pry tool.
+
# Remove the two molex connectors attached on the right and top of the printed circuit board.
+
# Remove the printed circuit board from the screen casing exposing the nine TAPS on the reverse side. Note the small copper carrot indicating the direction of the TAPS.
+
# Connect the RIFF box to the JTAG pins.
+
# Connect the PCB to a Micro USB cord and power via a power supply.
+
# Start the "RIFF box" software.
+
# Power the PCB.
+
# Dump the NAND.
+
 
+
{| border="1" cellpadding="2"
+
|-
+
| [[ File:S738C_back.JPG | 600px ]]
+
|-
+
|}
+
 
+
{| border="1" cellpadding="2"
+
|-
+
| [[ File:S738C_case.JPG | 600px ]]
+
|-
+
|}
+
 
+
{| border="1" cellpadding="2"
+
|-
+
| [[ File:S738C_molex.JPG | 600px ]]
+
|-
+
|}
+
The TAPS order is as follows:
+
 
+
# 1=GND
+
# 2=NRST
+
# 3=TDO
+
# 4=TCK
+
# 5=TDI
+
# 6=TRST
+
# 7=RTCK
+
# 8=TMS
+
# 9=N/A
+
 
+
 
+
{| border="1" cellpadding="2"
+
|-
+
| [[ File:S738C_TAPS.JPG | 600px ]]
+
|-
+
|}
+
 
+
***Test has shown for the best results and fewer read errors, use short wires directly to the RIFF box ribbon interface.***
+
 
+
After the wires are connected to the board, the phone is powered by the USB connection. Plug the Micro USB into the USB connection on the device and then plug the phone into the USB port on the laptop.
+
 
+
 
+
Launch the Riff Box JTAG Manager and use the following settings:
+
 
+
 
+
* Navigate to the Useful Plugins tab
+
* Select the Direct JTAG Access to Flash Memory Plugin. Note the directions displayed in the window along with supported processors.
+
* Activate the plugin
+
* Choose the MSM7627A from the drop down menu on the right side ** Note this is not the processor but it will allow access the the memory.
+
* Select eMMC SDC3 (via chipset) from the Memory Type & Host drop down.
+
* Check Auto FullFlash size
+
* Select Connect & Flash ID. ** This will not flash the memory chip initially, but will only connect**
+
* Choose the read button from the bottom left corner. This will connect to the device and display the partitions and chip ID.
+
 
+
{| border="1" cellpadding="2"
+
|-
+
| [[ File:active_plugin.JPG | 800px ]]
+
|-
+
|}
+
 
+
{| border="1" cellpadding="2"
+
|-
+
| [[ File:SCH-S738C_Setting2.JPG | 800px ]]
+
|-
+
|}
+
 
+
{| border="1" cellpadding="2"
+
|-
+
| [[ File:SCH_S738C_Setting2.PNG | 800px ]]
+
|-
+
|}
+
 
+
 
+
 
+
=== Notes ===
+
 
+
 
+
The phone has a 4GB MoviNAND flash memory chip which should take approximately 24 hours to download. This takes much longer the normal because the direct access plugin functions at a much slower speed then normal JTAG methods. Test have found using shorter large wires and no intermediate PCB board increases performance.
+
 
+
 
+
=== References ===
+
*http://www.riffbox.org/
+

Latest revision as of 11:36, 7 April 2014

Information icon.png

Please help to improve this article by expanding it.
Further information might be found on the discussion page.

Volume Shadow Copy Service

Windows has included the Volume Shadow Copy Service in it's releases since Windows XP. The Shadow Copy Service creates differential backups periodically to create restore points for the user. Windows 7 Professional and Ultimate editions include tools to work with and manage the Volume Shadow Copy Service, including the ability to mount shadow volumes on disk images.

In Windows 8 the shadow volumes seem to have been superseded by File History. For now it looks like it uses similar structures as its predecessors.

Also see

External Links

How to analyze Shadow Volumes

Shadow Volumes in depth

Other

Tools