Difference between pages "Blogs" and "JTAG Huawei TracFone M866C"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(Forensic Fora)
 
(Huawei M866C - Ascend Y)
 
Line 1: Line 1:
[[Computer forensics]] related '''blogs'''.
+
== Huawei  H866C - Ascend Y ==
  
= Forensic Blogs =
+
This phone is supported by the Tracfone. This uses a Qualcomm 7625A 800 MHz (S1) Processor and comes standard with Android version 2.3. This phone is unsupported by RIFF Box for the JTAG process for resurrector.
  
== English ==
+
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:Huawei-tracfone-m866c-front.JPG | 200px ]]
 +
|-
 +
|}
  
* [http://www.appleexaminer.com/ The Apple Examiner]
+
=== Getting Started ===
* [http://computer.forensikblog.de/en/ Andreas Schuster - Computer Forensics Blog]
+
* [http://www.niiconsulting.com/checkmate/ Checkmate - e-zine on Digital Forensics and Incident Response]
+
* [http://www.infosecinstitute.com/blog/ethical_hacking_computer_forensics.html Jack Koziol - Ethical Hacking and Computer Forensics]
+
* [http://windowsir.blogspot.com/ Windows Incident Response Blog] by [[Harlan Carvey]]
+
* [http://geschonneck.com/ Alexander Geschonneck - Computer Forensics Blog]
+
* [http://forensicblog.org/ Michael Murr - Computer Forensics Blog]
+
* [http://forenshick.blogspot.com/ Jordan Farr - Forensic news, Technology, TV, and more]
+
* [http://unixsadm.blogspot.com/ Criveti Mihai - UNIX, OpenVMS and Windows System Administration, Digital Forensics, High Performance Computing, Clustering and Distributed Systems]
+
* [http://intrusions.blogspot.com/ Various Authors - Intrusions and Malware Analysis]
+
* [http://chicago-ediscovery.com/education/computer-forensics-glossary/ Andrew Hoog - Computer Forensic Glossary Blog, HOWTOs and other resources]
+
* [http://secureartisan.wordpress.com/ Paul Bobby - Digital Forensics with a Focus on EnCase]
+
* [http://www.crimemuseum.org/blog/ National Museum of Crime and Punishment-CSI/Forensics Blog]
+
* [http://forensicsfromthesausagefactory.blogspot.com/ Forensics from the sausage factory]
+
* [http://integriography.wordpress.com Computer Forensics Blog by David Kovar]
+
* [[Jesse Kornblum]] - [http://jessekornblum.livejournal.com/ A Geek Raised by Wolves]
+
* [http://computer-forensics.sans.org/blog SANS Computer Forensics and Incident Response Blog by SANS Institute]
+
* [http://www.digitalforensicsource.com Digital Forensic Source]
+
* [http://dfsforensics.blogspot.com/ Digital Forensics Solutions]
+
* [http://forensicaliente.blogspot.com/ Forensicaliente]
+
* [http://www.ericjhuber.com/ A Fistful of Dongles]
+
* [http://gleeda.blogspot.com/ JL's stuff]
+
* [http://4n6k.blogspot.com/ 4n6k]
+
  
== Dutch ==
 
  
* [http://stam.blogs.com/8bits/ 8 bits] by Mark Stam ([http://translate.google.com/translate?u=http%3A%2F%2Fstam.blogs.com%2F8bits%2Fforensisch%2Findex.html&langpair=nl%7Cen&hl=en&ie=UTF-8 Google translation])
+
What you need:
  
== French ==
 
  
* [http://forensics-dev.blogspot.com Forensics-dev] ([http://translate.google.com/translate?u=http%3A%2F%2Fforensics-dev.blogspot.com%2F&langpair=fr%7Cen&hl=en&ie=UTF-8&oe=UTF-8&prev=%2Flanguage_tools Google translation])
+
# Riff Box
 +
# USB to Micro USB cord
  
== German ==
 
  
* [http://computer.forensikblog.de/ Andreas Schuster - Computer Forensik Blog Gesamtausgabe] ([http://computer.forensikblog.de/en/ English version])
+
=== NAND Dump Procedure ===
* [http://computer-forensik.org Alexander Geschonneck - computer-forensik.org] ([http://translate.google.com/translate?u=http%3A%2F%2Fwww.computer-forensik.org&langpair=de%7Cen&hl=en&ie=UTF-8&oe=UTF-8&prev=%2Flanguage_tools Google translation])
+
* [http://henrikbecker.blogspot.com Henrik Becker - Digitale Beweisführung] ([http://translate.google.com/translate?u=http%3A%2F%2Fhenrikbecker.blogspot.com&langpair=de%7Cen&hl=en&ie=UTF-8&oe=UTF-8&prev=%2Flanguage_tools Google translation])
+
  
== Spanish ==
 
  
* [http://www.forensic-es.org/blog forensic-es.org] ([http://translate.google.com/translate?u=http%3A%2F%2Fwww.forensic-es.org%2Fblog&langpair=es%7Cen&hl=en&ie=UTF-8&oe=UTF-8&prev=%2Flanguage_tools Google translation])
+
# Remove the battery and peel the label back to expose the TAPS.
* [http://www.inforenses.com Javier Pages - InForenseS] ([http://translate.google.com/translate?u=http%3A%2F%2Fwww.inforenses.com&langpair=es%7Cen&hl=es&ie=UTF-8&oe=UTF-8&prev=%2Flanguage_tools Google translation])
+
# Connect the RIFF box to the PC via USB.
* [http://windowstips.wordpress.com El diario de Juanito]
+
# Connect the RIFF box to the PCB via the JTAG pins.
* [http://conexioninversa.blogspot.com Conexión inversa]
+
# Connect the PCB to a Micro USB cord and power via a power supply.
 +
# Start the "RIFF box" software.
 +
# Power the PCB.
 +
# Dump the NAND.
  
== Russian ==
 
  
* Group-IB: [http://notheft.ru/blogs/group-ib blog at notheft.ru], [http://www.securitylab.ru/blog/company/group-ib/ blog at securitylab.ru]
+
The TAPS are located under the battery, behind the Huawei phone label. The phone will be powered by a Micro USB cord from an AC battery charger.
  
= Blogs related to forensics =
 
  
* [http://www.c64allstars.de C64Allstars Blog]
+
The TAPS order is as follows:
* [http://www.emergentchaos.com/ Adam Shostack - Emergent Chaos]
+
* [http://jeffjonas.typepad.com/ Jeff Jonas - Inventor of NORA discusses privacy and all things digital]
+
* [http://www.cs.uno.edu/~golden/weblog Digital Forensics, Coffee, Benevolent Hacking] - Written by [[Golden G. Richard III]]
+
  
= Forensic Fora =
+
# 1=Not Used
* [http://forensicfocus.com/ Forensic Focus]
+
# 2=TCK
 +
# 3=GND
 +
# 4=TMS
 +
# 5=TDI
 +
# 6=TDO
 +
# 7=RTCK
 +
# 8=TRST
 +
# 9=NRST
 +
 
 +
 
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:Hauwei_U866C_TAPS.jpg | 600px ]]
 +
|-
 +
|}
 +
 
 +
 
 +
After the wires are connected to the board, the phone is powered by the USB connection. Plug the Micro USB into the USB connection on the device and then plug the phone into a wall outlet. The phone should respond with the vibrator switch activating for less than a second.
 +
 
 +
 
 +
Launch the Riff Box JTAG Manager and use the following settings:
 +
 
 +
 
 +
* JTAG TCK Speed = RTCK
 +
* Resurrector Settings= Huawei U8655
 +
* Auto FullFlash size
 +
 
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:M866C_setting.jpg | 800px ]]
 +
|-
 +
|}
 +
 
 +
 
 +
Advanced Settings:
 +
 
 +
 
 +
* Ignore Target IDCODE during Resurrection and DCC Loader operations
 +
 
 +
 
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:huawei-tracfone-m865c-riff-advanced-settings.jpg | 600px ]]
 +
|-
 +
|}
 +
 
 +
 
 +
Then connect and get the ID, you should receive the dead body signal. Then read the memory.
 +
 
 +
 
 +
=== Notes ===
 +
 
 +
 
 +
The phone has a 512 MB NAND flash memory chip which should take approximately 30 minutes to download.
 +
 
 +
 
 +
=== References ===
 +
*http://www.phonescoop.com/phones/phone.php?p=3308
 +
*http://www.riffbox.org/

Latest revision as of 20:51, 25 November 2013

Huawei H866C - Ascend Y

This phone is supported by the Tracfone. This uses a Qualcomm 7625A 800 MHz (S1) Processor and comes standard with Android version 2.3. This phone is unsupported by RIFF Box for the JTAG process for resurrector.

Huawei-tracfone-m866c-front.JPG

Getting Started

What you need:


  1. Riff Box
  2. USB to Micro USB cord


NAND Dump Procedure

  1. Remove the battery and peel the label back to expose the TAPS.
  2. Connect the RIFF box to the PC via USB.
  3. Connect the RIFF box to the PCB via the JTAG pins.
  4. Connect the PCB to a Micro USB cord and power via a power supply.
  5. Start the "RIFF box" software.
  6. Power the PCB.
  7. Dump the NAND.


The TAPS are located under the battery, behind the Huawei phone label. The phone will be powered by a Micro USB cord from an AC battery charger.


The TAPS order is as follows:

  1. 1=Not Used
  2. 2=TCK
  3. 3=GND
  4. 4=TMS
  5. 5=TDI
  6. 6=TDO
  7. 7=RTCK
  8. 8=TRST
  9. 9=NRST


Hauwei U866C TAPS.jpg


After the wires are connected to the board, the phone is powered by the USB connection. Plug the Micro USB into the USB connection on the device and then plug the phone into a wall outlet. The phone should respond with the vibrator switch activating for less than a second.


Launch the Riff Box JTAG Manager and use the following settings:


  • JTAG TCK Speed = RTCK
  • Resurrector Settings= Huawei U8655
  • Auto FullFlash size
M866C setting.jpg


Advanced Settings:


  • Ignore Target IDCODE during Resurrection and DCC Loader operations


Huawei-tracfone-m865c-riff-advanced-settings.jpg


Then connect and get the ID, you should receive the dead body signal. Then read the memory.


Notes

The phone has a 512 MB NAND flash memory chip which should take approximately 30 minutes to download.


References