Difference between pages "Research Topics" and "JTAG Huawei TracFone M866C"

From Forensics Wiki
(Difference between pages)
Jump to: navigation, search
m (AFFEnhancement)
 
(Huawei M866C - Ascend Y)
 
Line 1: Line 1:
; Research Ideas
+
== Huawei  H866C - Ascend Y ==
  
Interested in doing research in computer forensics? Looking for a master's topic, or just some ideas for a research paper? Here is my list. Please feel free to add your own ideas.  
+
This phone is supported by the Tracfone. This uses a Qualcomm 7625A 800 MHz (S1) Processor and comes standard with Android version 2.3. This phone is unsupported by RIFF Box for the JTAG process for resurrector.  
  
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:Huawei-tracfone-m866c-front.JPG | 200px ]]
 +
|-
 +
|}
  
=Hard Problems=
+
=== Getting Started ===
* Stream Based Disk Forensics. Process the entire disk with one pass, or at most two, to minimize seek time. 
+
* Determine the device that created an image or video without metadata. (fingerprinting digital cameras)
+
* Automatically detect falsified digital evidence.
+
* Use the location of where data resides on a computer as a way of inferring information about the computer's past.
+
* Detect and diagnose sanitization attempts.
+
* Recover overwritten data.
+
  
=Tool Development=
 
==[[AFF]] Enhancement==
 
* Evaluation of the AFF data page size. What is the optimal page size for compressed forensic work?
 
* Replacement of the AFF "BADFLAG" approach for indicating bad data with a bitmap.
 
* Modify aimage so that it can take a partial disk image and a disk and just image what's missing.
 
* Improve the data recovery features of aimage.
 
* Replace AFF's current table-of-contents system with one based on B+ Trees.
 
  
==Decoders and Validators==
+
What you need:
* A JPEG decompresser that supports restarts and checkpointing for use in high-speed carving. It would also be useful it the JPEG decompressor didn't actually decompress --- all it needs to do is to verify the huffman table.
+
  
==Cell Phones==
 
Open source tools for:
 
* Imaging the contents of a cell phone memory
 
* Reassembling information in a cell phone memory
 
  
==Flash Memory==
+
# Riff Box
Flash memory devices such as USB keys implement a [http://www.st.com/stonline/products/literature/an/10122.htm wear leveling algorithm] in hardware so that frequently rewritten blocks are actually written to many different physical blocks. Are there any devices that let you access the raw flash cells underneath the wear leveling chip? Can you get statistics out of the device? Can you access pages that have been mapped out (and still have valid data) but haven't been mapped back yet? Can you use this as a technique for accessing deleted information?
+
# USB to Micro USB cord
  
=Corpora Development=
+
 
==Realistic Corpora==
+
=== NAND Dump Procedure ===
* Simulated disk imags
+
 
* Simulated network traffic
+
 
==Real Data==
+
# Remove the battery and peel the label back to expose the TAPS.
* Digital Cameras
+
# Connect the RIFF box to the PC via USB.
* Cell phones
+
# Connect the RIFF box to the PCB via the JTAG pins.
* USB Memory Sticks ''below'' the logical layer.
+
# Connect the PCB to a Micro USB cord and power via a power supply.
 +
# Start the "RIFF box" software.
 +
# Power the PCB.
 +
# Dump the NAND.
 +
 
 +
 
 +
The TAPS are located under the battery, behind the Huawei phone label. The phone will be powered by a Micro USB cord from an AC battery charger.
 +
 
 +
 
 +
The TAPS order is as follows:
 +
 
 +
# 1=Not Used
 +
# 2=TCK
 +
# 3=GND
 +
# 4=TMS
 +
# 5=TDI
 +
# 6=TDO
 +
# 7=RTCK
 +
# 8=TRST
 +
# 9=NRST
 +
 
 +
 
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:Hauwei_U866C_TAPS.jpg | 600px ]]
 +
|-
 +
|}
 +
 
 +
 
 +
After the wires are connected to the board, the phone is powered by the USB connection. Plug the Micro USB into the USB connection on the device and then plug the phone into a wall outlet. The phone should respond with the vibrator switch activating for less than a second.
 +
 
 +
 
 +
Launch the Riff Box JTAG Manager and use the following settings:
 +
 
 +
 
 +
* JTAG TCK Speed = RTCK
 +
* Resurrector Settings= Huawei U8655
 +
* Auto FullFlash size
 +
 
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:M866C_setting.jpg | 800px ]]
 +
|-
 +
|}
 +
 
 +
 
 +
Advanced Settings:
 +
 
 +
 
 +
* Ignore Target IDCODE during Resurrection and DCC Loader operations
 +
 
 +
 
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:huawei-tracfone-m865c-riff-advanced-settings.jpg | 600px ]]
 +
|-
 +
|}
 +
 
 +
 
 +
Then connect and get the ID, you should receive the dead body signal. Then read the memory.
 +
 
 +
 
 +
=== Notes ===
 +
 
 +
 
 +
The phone has a 512 MB NAND flash memory chip which should take approximately 30 minutes to download.
 +
 
 +
 
 +
=== References ===
 +
*http://www.phonescoop.com/phones/phone.php?p=3308
 +
*http://www.riffbox.org/

Latest revision as of 20:51, 25 November 2013

Contents

Huawei H866C - Ascend Y

This phone is supported by the Tracfone. This uses a Qualcomm 7625A 800 MHz (S1) Processor and comes standard with Android version 2.3. This phone is unsupported by RIFF Box for the JTAG process for resurrector.

Huawei-tracfone-m866c-front.JPG

Getting Started

What you need:


  1. Riff Box
  2. USB to Micro USB cord


NAND Dump Procedure

  1. Remove the battery and peel the label back to expose the TAPS.
  2. Connect the RIFF box to the PC via USB.
  3. Connect the RIFF box to the PCB via the JTAG pins.
  4. Connect the PCB to a Micro USB cord and power via a power supply.
  5. Start the "RIFF box" software.
  6. Power the PCB.
  7. Dump the NAND.


The TAPS are located under the battery, behind the Huawei phone label. The phone will be powered by a Micro USB cord from an AC battery charger.


The TAPS order is as follows:

  1. 1=Not Used
  2. 2=TCK
  3. 3=GND
  4. 4=TMS
  5. 5=TDI
  6. 6=TDO
  7. 7=RTCK
  8. 8=TRST
  9. 9=NRST


Hauwei U866C TAPS.jpg


After the wires are connected to the board, the phone is powered by the USB connection. Plug the Micro USB into the USB connection on the device and then plug the phone into a wall outlet. The phone should respond with the vibrator switch activating for less than a second.


Launch the Riff Box JTAG Manager and use the following settings:


  • JTAG TCK Speed = RTCK
  • Resurrector Settings= Huawei U8655
  • Auto FullFlash size
M866C setting.jpg


Advanced Settings:


  • Ignore Target IDCODE during Resurrection and DCC Loader operations


Huawei-tracfone-m865c-riff-advanced-settings.jpg


Then connect and get the ID, you should receive the dead body signal. Then read the memory.


Notes

The phone has a 512 MB NAND flash memory chip which should take approximately 30 minutes to download.


References