Difference between pages "Vendors" and "JTAG Huawei TracFone M866C"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(Software Vendors)
 
(Huawei M866C - Ascend Y)
 
Line 1: Line 1:
= Software Vendors =
+
== Huawei  H866C - Ascend Y ==
  
; [[AccessData]] - [[Forensic Toolkit]] ([[FTK]])
+
This phone is supported by the Tracfone. This uses a Qualcomm 7625A 800 MHz (S1) Processor and comes standard with Android version 2.3. This phone is unsupported by RIFF Box for the JTAG process for resurrector.  
: http://www.accessdata.com/products/
+
  
; [[ASR Data]] - [[SMART]]
+
{| border="1" cellpadding="2"
: http://www.asrdata.com/SMART/
+
|-
 +
| [[ File:Huawei-tracfone-m866c-front.JPG | 200px ]]
 +
|-
 +
|}
  
; [[BlackBag Technologies]]
+
=== Getting Started ===
: http://www.blackbagtech.com/software.html
+
  
; [[Computer Forensic Analysis]]
 
: http://www.porcupine.org/forensics/
 
  
; [[Computer Cop Forensic Examiner]]
+
What you need:
: http://www.computercop.com/examiner.html
+
  
; [[Forensic and Security Services, Inc.]] - [[Rainbow Tables]]
 
: http://www.For-Sec.com
 
  
; [[Guidance Software]] - [[EnCase]]
+
# Riff Box
: http://www.guidancesoftware.com/products/index.asp
+
# USB to Micro USB cord
  
; [[MaresWare Software]]
 
: http://www.maresware.com/maresware/software.htm
 
  
; [[NTI - Forensics International]] Division of Armor Forensics
+
=== NAND Dump Procedure ===
: http://www.forensics-intl.com/tools.html
+
  
; [[Nuix Pty Ltd]] - [[FBI]]
 
: http://www.nuix.com.au
 
  
; [[Paraben Forensics]]
+
# Remove the battery and peel the label back to expose the TAPS.
: http://www.paraben-forensics.com/
+
# Connect the RIFF box to the PC via USB.
 +
# Connect the RIFF box to the PCB via the JTAG pins.
 +
# Connect the PCB to a Micro USB cord and power via a power supply.
 +
# Start the "RIFF box" software.
 +
# Power the PCB.
 +
# Dump the NAND.
  
; [[PyFlag]]
 
: http://pyflag.sourceforge.net/
 
  
; Steganography Analysis and Research Center
+
The TAPS are located under the battery, behind the Huawei phone label. The phone will be powered by a Micro USB cord from an AC battery charger.
: General Product Information http://www.sarc-wv.com/products.aspx
+
: Steganography Application Fingerprint Database (SAFDB) http://www.sarc-wv.com/safdb.aspx
+
: Steganography Analyzer Artifact Scanner (StegAlyzerAS) http://www.sarc-wv.com/stegalyzeras.aspx
+
: Steganography Analyzer Signature Scanner (StegAlyzerSS) http://www.sarc-wv.com/stegalyzerss.aspx
+
  
; [[Tech Assist, Inc.]]
 
: http://www.toolsthatwork.com/
 
  
; [[Technology Pathways]] - [[Pro Discover]]
+
The TAPS order is as follows:
: http://www.techpathways.com/
+
  
; [[Wetstone Technologies]]
+
# 1=Not Used
:http://www.wetstonetech.com/page/page/3004314.htm
+
# 2=TCK
 +
# 3=GND
 +
# 4=TMS
 +
# 5=TDI
 +
# 6=TDO
 +
# 7=RTCK
 +
# 8=TRST
 +
# 9=NRST
  
; [[X-Ways Software]]
 
: http://www.x-ways.net/
 
  
= Hardware Vendors =
+
{| border="1" cellpadding="2"
; [[BlackBag Technologies]]
+
|-
: http://www.blackbagtech.com/hardware.html
+
| [[ File:Hauwei_U866C_TAPS.jpg | 600px ]]
: [[Write Blockers]]
+
|-
 +
|}
  
; [[Digital Intelligence]]
 
: http://www.digitalintelligence.com/forensichardware.php
 
: [[Write Blockers]], [[forensic field kit]]s, etc.
 
  
; [[Forensic-Computers]]
+
After the wires are connected to the board, the phone is powered by the USB connection. Plug the Micro USB into the USB connection on the device and then plug the phone into a wall outlet. The phone should respond with the vibrator switch activating for less than a second.  
: http://www.forensic-computers.com/
+
: Various systems, [[Write Blockers]], [[forensic field kit]]s, etc.
+
  
; [[ForensicPC]]
 
: http://www.forensicpc.com/
 
: Various [[Write Blockers]], [[forensic field kit]]s, forensics software, etc.
 
  
; [[MyKey Tech]]
+
Launch the Riff Box JTAG Manager and use the following settings:
: http://www.mykeytech.com/
+
: [[Write Blockers]]
+
  
; [[Paraben Forensics]]
 
: http://www.paraben-forensics.com/catalog/index.php?cPath=26
 
: [[Write Blockers]], [[forensic field kit]]s, etc.
 
  
; [[Technology Pathways]]
+
* JTAG TCK Speed = RTCK
: http://www.techpathways.com/
+
* Resurrector Settings= Huawei U8655
: [[Write Blockers]]
+
* Auto FullFlash size
  
; [[Wiebetech]]
+
{| border="1" cellpadding="2"
: http://wiebetech.com/
+
|-
: Various [[Write Blockers]], [[forensic field kit]]s, etc.
+
| [[ File:M866C_setting.jpg | 800px ]]
 +
|-
 +
|}
  
= Training =
 
  
== Open for everyone ==
+
Advanced Settings:
  
* [http://www.accessdata.com/training/ AccessData Training]
 
* [http://www.forensics-intl.com/training.html Armor Forensics (NTI - Forensics International)]
 
* [http://www.asrdata.com/training/ ASR Data Training]
 
* [http://www.blackbagtech.com/training.html BlackBag Tech Training]
 
* [http://www.cce-bootcamp.com/ Certified Computer Examiner BootCamp]
 
* [http://www.cftco.com/ Computer Forensics Training Center On-Line]
 
* [http://www.e-fense.com/training.html e-fense Inc]
 
* [http://www.nuix.com.au/screencasts.html FBI Screencast Training]
 
* [http://www.guidancesoftware.com/training/index.asp Guidance Software (EnCase) Training]
 
* [http://www.infosecinstitute.com/courses/security_training_courses.html InfoSec Institute]
 
* [http://www.crazytrain.com/training.html Linux Data Forensics Training]
 
* [http://www.maresware.com/maresware/training/maresware.htm Maresware Training]
 
* [http://www.paraben-training.com/ Paraben Forensics Training]
 
* [http://www.sarc-wv.com/training.aspx Steganography Analysis and Research Center]
 
* [http://www.techpathways.com/DesktopDefault.aspx?tabindex=5&tabid=9 Technology Pathways Pro Discover Training]
 
* [http://www.vigilar.com/training.html Vigilar]
 
* [http://www.wetstonetech.com/page/page/3004314.htm Wetstone Technologies]
 
  
== Law enforcement only ==
+
* Ignore Target IDCODE during Resurrection and DCC Loader operations
  
* [http://www.fletc.gov/cfi/fy06tibsched.htm Federal Law Enforcement Training Center]
+
 
* [http://www.cops.org/ IACIS Computer Training/Certification]
+
{| border="1" cellpadding="2"
* [http://nw3c.org/ocr/courses_desc.cfm National White Collar Crime Center]
+
|-
* [http://www.search.org/programs/hightech/courses.asp Search.Org]
+
| [[ File:huawei-tracfone-m865c-riff-advanced-settings.jpg | 600px ]]
 +
|-
 +
|}
 +
 
 +
 
 +
Then connect and get the ID, you should receive the dead body signal. Then read the memory.  
 +
 
 +
 
 +
=== Notes ===
 +
 
 +
 
 +
The phone has a 512 MB NAND flash memory chip which should take approximately 30 minutes to download.
 +
 
 +
 
 +
=== References ===
 +
*http://www.phonescoop.com/phones/phone.php?p=3308
 +
*http://www.riffbox.org/

Latest revision as of 21:51, 25 November 2013

Huawei H866C - Ascend Y

This phone is supported by the Tracfone. This uses a Qualcomm 7625A 800 MHz (S1) Processor and comes standard with Android version 2.3. This phone is unsupported by RIFF Box for the JTAG process for resurrector.

Huawei-tracfone-m866c-front.JPG

Getting Started

What you need:


  1. Riff Box
  2. USB to Micro USB cord


NAND Dump Procedure

  1. Remove the battery and peel the label back to expose the TAPS.
  2. Connect the RIFF box to the PC via USB.
  3. Connect the RIFF box to the PCB via the JTAG pins.
  4. Connect the PCB to a Micro USB cord and power via a power supply.
  5. Start the "RIFF box" software.
  6. Power the PCB.
  7. Dump the NAND.


The TAPS are located under the battery, behind the Huawei phone label. The phone will be powered by a Micro USB cord from an AC battery charger.


The TAPS order is as follows:

  1. 1=Not Used
  2. 2=TCK
  3. 3=GND
  4. 4=TMS
  5. 5=TDI
  6. 6=TDO
  7. 7=RTCK
  8. 8=TRST
  9. 9=NRST


Hauwei U866C TAPS.jpg


After the wires are connected to the board, the phone is powered by the USB connection. Plug the Micro USB into the USB connection on the device and then plug the phone into a wall outlet. The phone should respond with the vibrator switch activating for less than a second.


Launch the Riff Box JTAG Manager and use the following settings:


  • JTAG TCK Speed = RTCK
  • Resurrector Settings= Huawei U8655
  • Auto FullFlash size
M866C setting.jpg


Advanced Settings:


  • Ignore Target IDCODE during Resurrection and DCC Loader operations


Huawei-tracfone-m865c-riff-advanced-settings.jpg


Then connect and get the ID, you should receive the dead body signal. Then read the memory.


Notes

The phone has a 512 MB NAND flash memory chip which should take approximately 30 minutes to download.


References