Difference between pages "File Format Identification" and "JTAG Huawei TracFone M866C"

From Forensics Wiki
(Difference between pages)
Jump to: navigation, search
m
 
(Huawei M866C - Ascend Y)
 
Line 1: Line 1:
File Format Identification is the process of figuring out the format of a sequence of bytes. Operating systems typically do this by file extension or by embedded MIME information. Forensic applications need to identify file types by content.
+
== Huawei  H866C - Ascend Y ==
  
=Tools=
+
This phone is supported by the Tracfone. This uses a Qualcomm 7625A 800 MHz (S1) Processor and comes standard with Android version 2.3. This phone is unsupported by RIFF Box for the JTAG process for resurrector.  
==libmagic==
+
* Written in C.  
+
* Rules in /usr/share/file/magic and compiled at runtime.
+
* Powers the Unix “file” command, but you can also call the library directly from a C program.
+
* http://sourceforge.net/projects/libmagic
+
  
==DROID==
+
{| border="1" cellpadding="2"
* Writen in Java
+
|-
* Developed by National Archives of the United Kingdom.
+
| [[ File:Huawei-tracfone-m866c-front.JPG | 200px ]]
* http://droid.sourceforge.net
+
|-
 +
|}
  
==TrID==
+
=== Getting Started ===
* XML config file
+
* Closed source; free for non-commercial use
+
* http://mark0.net/soft-trid-e.html
+
  
==Stellent/Oracle Outside-In==
 
* Proprietary but free demo.
 
* http://www.oracle.com/technology/products/content-management/oit/oit_all.html
 
  
[[Category:Tools]]
+
What you need:
  
=Bibliography=
 
Current research papers on the file format identification problem. Most of these papers concern themselves with identifying file format of a few file sectors, rather than an entire file.
 
  
; [http://www.dfrws.org/2008/proceedings/p14-calhoun.pdf Predicting the Types of File Fragments], William Calhoun, Drue Coles, DFRWS 2008 [http://www.dfrws.org/2008/proceedings/p14-calhoun_pres.pdf [slides]]
+
# Riff Box
 +
# USB to Micro USB cord
  
  
 +
=== NAND Dump Procedure ===
  
[[Category:Bibliography]]
+
 
 +
# Remove the battery and peel the label back to expose the TAPS.
 +
# Connect the RIFF box to the PC via USB.
 +
# Connect the RIFF box to the PCB via the JTAG pins.
 +
# Connect the PCB to a Micro USB cord and power via a power supply.
 +
# Start the "RIFF box" software.
 +
# Power the PCB.
 +
# Dump the NAND.
 +
 
 +
 
 +
The TAPS are located under the battery, behind the Huawei phone label. The phone will be powered by a Micro USB cord from an AC battery charger.
 +
 
 +
 
 +
The TAPS order is as follows:
 +
 
 +
# 1=Not Used
 +
# 2=TCK
 +
# 3=GND
 +
# 4=TMS
 +
# 5=TDI
 +
# 6=TDO
 +
# 7=RTCK
 +
# 8=TRST
 +
# 9=NRST
 +
 
 +
 
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:Hauwei_U866C_TAPS.jpg | 600px ]]
 +
|-
 +
|}
 +
 
 +
 
 +
After the wires are connected to the board, the phone is powered by the USB connection. Plug the Micro USB into the USB connection on the device and then plug the phone into a wall outlet. The phone should respond with the vibrator switch activating for less than a second.
 +
 
 +
 
 +
Launch the Riff Box JTAG Manager and use the following settings:
 +
 
 +
 
 +
* JTAG TCK Speed = RTCK
 +
* Resurrector Settings= Huawei U8655
 +
* Auto FullFlash size
 +
 
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:M866C_setting.jpg | 800px ]]
 +
|-
 +
|}
 +
 
 +
 
 +
Advanced Settings:
 +
 
 +
 
 +
* Ignore Target IDCODE during Resurrection and DCC Loader operations
 +
 
 +
 
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:huawei-tracfone-m865c-riff-advanced-settings.jpg | 600px ]]
 +
|-
 +
|}
 +
 
 +
 
 +
Then connect and get the ID, you should receive the dead body signal. Then read the memory.
 +
 
 +
 
 +
=== Notes ===
 +
 
 +
 
 +
The phone has a 512 MB NAND flash memory chip which should take approximately 30 minutes to download.
 +
 
 +
 
 +
=== References ===
 +
*http://www.phonescoop.com/phones/phone.php?p=3308
 +
*http://www.riffbox.org/

Latest revision as of 20:51, 25 November 2013

Contents

Huawei H866C - Ascend Y

This phone is supported by the Tracfone. This uses a Qualcomm 7625A 800 MHz (S1) Processor and comes standard with Android version 2.3. This phone is unsupported by RIFF Box for the JTAG process for resurrector.

Huawei-tracfone-m866c-front.JPG

Getting Started

What you need:


  1. Riff Box
  2. USB to Micro USB cord


NAND Dump Procedure

  1. Remove the battery and peel the label back to expose the TAPS.
  2. Connect the RIFF box to the PC via USB.
  3. Connect the RIFF box to the PCB via the JTAG pins.
  4. Connect the PCB to a Micro USB cord and power via a power supply.
  5. Start the "RIFF box" software.
  6. Power the PCB.
  7. Dump the NAND.


The TAPS are located under the battery, behind the Huawei phone label. The phone will be powered by a Micro USB cord from an AC battery charger.


The TAPS order is as follows:

  1. 1=Not Used
  2. 2=TCK
  3. 3=GND
  4. 4=TMS
  5. 5=TDI
  6. 6=TDO
  7. 7=RTCK
  8. 8=TRST
  9. 9=NRST


Hauwei U866C TAPS.jpg


After the wires are connected to the board, the phone is powered by the USB connection. Plug the Micro USB into the USB connection on the device and then plug the phone into a wall outlet. The phone should respond with the vibrator switch activating for less than a second.


Launch the Riff Box JTAG Manager and use the following settings:


  • JTAG TCK Speed = RTCK
  • Resurrector Settings= Huawei U8655
  • Auto FullFlash size
M866C setting.jpg


Advanced Settings:


  • Ignore Target IDCODE during Resurrection and DCC Loader operations


Huawei-tracfone-m865c-riff-advanced-settings.jpg


Then connect and get the ID, you should receive the dead body signal. Then read the memory.


Notes

The phone has a 512 MB NAND flash memory chip which should take approximately 30 minutes to download.


References