Difference between pages "Linux Repositories" and "JTAG Huawei TracFone M865C"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(fedora)
 
(Created page with "== JTAG Huawei TracFone M865C (Ascend II) == This phone is supported by the Cricket Network and Tracfone. This uses a Qualcomm 7627 600 MHz (S1) Processo and comes standard...")
 
Line 1: Line 1:
 +
== JTAG Huawei TracFone M865C (Ascend II) ==
  
There are a number of linux distributions.
 
  
In general they have primary repositories which are setup for every installation of the operating system and they have special purpose repositories which require specific setup.
 
  
=Repository Setup=
+
This phone is supported by the Cricket Network and Tracfone. This uses a Qualcomm 7627 600 MHz (S1) Processo and comes standard with Android version 2.3. This phone is unsupported by RIFF Box for the JTAG process for resurrector.
==openSUSE==
+
For current openSUSE 11.4 and 12.1 users it is necessary to have the following repositories configured:
+
  
*security
 
*devel:languages:perl
 
*devel:languages:python
 
  
This is most easily done from the command line via (assumes openSUSE 12.1):
+
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:huawei-tracfone-m865c-front.png | 400px ]]
 +
| [[ File:huawei-tracfone-m865c-back.png | 400px ]]
 +
|-
 +
|}
  
sudo zypper ar -f <nowiki>http://download.opensuse.org/repositories/security/openSUSE_12.1</nowiki> security
 
sudo zypper ar -f <nowiki>http://download.opensuse.org/repositories/devel:/languages:/perl</nowiki>/openSUSE_12.1 perl
 
sudo zypper ar -f <nowiki>http://download.opensuse.org/repositories/devel:/languages:/python/openSUSE_12.1</nowiki> python
 
 
zypper lr  <nowiki>          </nowiki>  # used to verify you have the repos installed
 
  
==fedora==
 
  
[http://www.cert.org/forensics/tools/ CERT] maintains a fedora security repository with a large number of DFIR applicaitons.
+
=== Getting Started ===
  
==debian==
 
==ubuntu==
 
  
=Computer Forensic Tools=
+
What you need:
Below is a list of computer forensic tools.  For each tool the repository it can be found in and the version in the repository is shown.
+
  
As an example, aimage is in the openSUSE security repository and it is version 3.2.5
 
  
==Imaging Tools==
+
# Riff Box
  
{|border="1" cellpadding="2" cellspacing="0" {{repository table}}
+
# USB to Micro USB cord
|-
+
|rowspan=1| '''Tool'''
+
|'''openSUSE'''
+
|'''fedora'''
+
|'''debian'''
+
|'''ubuntu'''
+
|'''comment'''
+
|'''General Remarks'''
+
  
|-
 
|rowspan=1| [http://www.e-fense.com/helix/ adepto]
 
|N/A <!-- opensuse -->
 
|?              <!-- fedora-->
 
|?              <!-- debian-->
 
|?              <!-- ubuntu-->
 
|  <!-- comment -->
 
|adepto is included in the helix boot cd<!-- General Remarks -->
 
  
|-
 
|rowspan=1| [[aimage]]
 
|security/3.2.5 <!-- opensuse -->
 
|?              <!-- fedora-->
 
|?              <!-- debian-->
 
|?              <!-- ubuntu-->
 
|a imaging tool to create aff format images  <!-- comment -->
 
|aimage has been EOL'ed.  guymager or ftkimager (windows/mac) are recommended for creating aff images. <!-- General Remarks -->
 
  
|-
+
=== NAND Dump Procedure ===
|rowspan=1| [[AIR]]
+
|N/A <!-- opensuse -->
+
|?              <!-- fedora-->
+
|?              <!-- debian-->
+
|?              <!-- ubuntu-->
+
|Automated Image and Restore  <!-- comment -->
+
|a GUI front-end to dd and dc3dd designed for easily creating forensic bit images <!-- General Remarks -->
+
  
|-
+
# Disassemble the phone down to the PCB.
|rowspan=1| [[dc3dd]]
+
# Connect the RIFF box to the PC via USB.
|security*/7.1.614 <!-- opensuse -->
+
# Connect the RIFF box to the PCB via the JTAG pins.
|?              <!-- fedora-->
+
# Connect the PCB to a Micro USB cord and power via a power supply.
|?              <!-- debian-->
+
# Start the "RIFF box" software.
|?              <!-- ubuntu-->
+
# Power the PCB.
|DoD Cyber Crime Center DD  <!-- comment -->
+
# Dump the NAND.
|This tool was formerly known as dcfldd. When released as dc3dd it was totally rewritten. <!-- General Remarks -->
+
  
|-
+
The TAPS are located under the battery, behind the Huawei phone label. The phone will be powered by a Micro USB cord from an AC battery charger.
|rowspan=1| [[ddrescue]]
+
|Base/1.14 <!-- opensuse -->
+
|?              <!-- fedora-->
+
|?              <!-- debian-->
+
|?              <!-- ubuntu-->
+
|Also known as GNU ddrescue<!-- comment -->
+
|This tool is different than dd_rescue.
+
  
|-
+
The TAPS order is as follows:
|rowspan=1| [[dd_rescue]]
+
|N/A <!-- opensuse -->
+
|?              <!-- fedora-->
+
|?              <!-- debian-->
+
|?              <!-- ubuntu-->
+
|<!-- comment -->
+
|This tool is different than GNU ddrescue.
+
  
|-
+
# 1=Not Used
|rowspan=1| [[IXimager]]
+
# 2=TCK
|N/A <!-- opensuse -->
+
# 3=GND
|?              <!-- fedora-->
+
# 4=TMS
|?              <!-- debian-->
+
# 5=TDI
|?              <!-- ubuntu-->
+
# 6=TDO
|A law enforcement only imager<!-- comment -->
+
# 7=RTCK
|used in conjunction with ILook Investigator
+
# 8=TRST
 +
# 9=NRST
  
|-
 
|rowspan=1| [[libewf|ewfacquire]]
 
|security*/20100226 <!-- opensuse -->
 
|?              <!-- fedora-->
 
|?              <!-- debian-->
 
|?              <!-- ubuntu-->
 
|a imaging tool to create ewf format images  <!-- comment -->
 
|ewfacquire is part of ewftools in some distributions.<!-- General Remarks -->
 
  
|-
 
|rowspan=1| [[LinEn]]
 
|N/A <!-- opensuse -->
 
|?              <!-- fedora-->
 
|?              <!-- debian-->
 
|?              <!-- ubuntu-->
 
|a proprietary imaging tool to create ewf format images  <!-- comment -->
 
|included on the Helix boot CD<!-- General Remarks -->
 
  
 +
{| border="1" cellpadding="2"
 
|-
 
|-
|rowspan=1| [[guymager]]
+
| [[ File:huawei-tracfone-m865c-taps.png | 400px ]]
|N/A<!-- opensuse -->
+
|-
|?              <!-- fedora-->
+
|}
|?              <!-- debian-->
+
 
|?              <!-- ubuntu-->
+
 
|a imaging tool to create aff format images  <!-- comment -->
+
 
|Guymager is an open source forensic imager. It focuses on user friendliness and high speed. <!-- General Remarks -->
+
For the TAPs, the Huawei-8650 was utilized, pictured above. The TAPS on the M865C are located in the same location as the 8650. See below for TAPS locations.
 +
 
 +
 
  
 +
{| border="1" cellpadding="2"
 
|-
 
|-
|rowspan=1| [http://sourceforge.net/projects/rdd rdd]
+
| [[ File:huawei-tracfone-m865c-soldered-taps.png | 400px ]]
|N/A <!-- opensuse -->
+
|-
|?              <!-- fedora-->
+
|}
|?              <!-- debian-->
+
|?              <!-- ubuntu-->
+
|a dd-like tool, with forensic imaging features  <!-- comment -->
+
|Rdd is robust with respect to read errors<!-- General Remarks -->
+
  
 +
 +
 +
After the wires are connected to the board, the phone is powered by the USB connection. Plug the Micro USB into the USB connection on the device and then plug the phone into a wall outlet. The phone should respond with the vibrator switch activating for less than a second.
 +
 +
Launch the Riff Box JTAG Manager and use the following settings:
 +
 +
* JTAG TCK Speed = RTCK
 +
* Resurrector Settings= Huawei U8650
 +
* Auto FullFlash size
 +
 +
 +
 +
{| border="1" cellpadding="2"
 
|-
 
|-
|rowspan=1| [ftp://ftp.berlios.de/pub/sdd/ sdd]
+
| [[ File:huawei-tracfone-m865c-riff-settings.png | 400px ]]
|Archiving:Backup/1.52 <!-- opensuse -->
+
|-
|?              <!-- fedora-->
+
|}
|?              <!-- debian-->
+
|?              <!-- ubuntu-->
+
|a dd-like tool<!-- comment -->
+
|Designed to work well when IBS != OBS.  Working with tape is an example.<!-- General Remarks -->
+
  
 +
 +
 +
Advanced Settings:
 +
 +
* Ignore Target IDCODE during Resurrection and DCC Loader operations
 +
 +
 +
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:huawei-tracfone-m865c-riff-advanced-settings.png | 400px ]]
 +
|-
 
|}
 
|}
  
*package will appear in the base release with the next full distribution release.
+
 
 +
 
 +
Then connect and get the ID, you should receive the dead body signal. Then read the memory.  JTAG complete.
 +
 
 +
 
 +
=== Notes ===
 +
 
 +
 
 +
 
 +
The phone has a 512 MB NAND flash memory chip which should take approximately 30 minutes to download.

Revision as of 20:29, 11 September 2013

JTAG Huawei TracFone M865C (Ascend II)

This phone is supported by the Cricket Network and Tracfone. This uses a Qualcomm 7627 600 MHz (S1) Processo and comes standard with Android version 2.3. This phone is unsupported by RIFF Box for the JTAG process for resurrector.


400px 400px


Getting Started

What you need:


  1. Riff Box
  1. USB to Micro USB cord


NAND Dump Procedure

  1. Disassemble the phone down to the PCB.
  2. Connect the RIFF box to the PC via USB.
  3. Connect the RIFF box to the PCB via the JTAG pins.
  4. Connect the PCB to a Micro USB cord and power via a power supply.
  5. Start the "RIFF box" software.
  6. Power the PCB.
  7. Dump the NAND.

The TAPS are located under the battery, behind the Huawei phone label. The phone will be powered by a Micro USB cord from an AC battery charger.

The TAPS order is as follows:

  1. 1=Not Used
  2. 2=TCK
  3. 3=GND
  4. 4=TMS
  5. 5=TDI
  6. 6=TDO
  7. 7=RTCK
  8. 8=TRST
  9. 9=NRST


400px


For the TAPs, the Huawei-8650 was utilized, pictured above. The TAPS on the M865C are located in the same location as the 8650. See below for TAPS locations.


Huawei-tracfone-m865c-soldered-taps.png


After the wires are connected to the board, the phone is powered by the USB connection. Plug the Micro USB into the USB connection on the device and then plug the phone into a wall outlet. The phone should respond with the vibrator switch activating for less than a second.

Launch the Riff Box JTAG Manager and use the following settings:

  • JTAG TCK Speed = RTCK
  • Resurrector Settings= Huawei U8650
  • Auto FullFlash size


400px


Advanced Settings:

  • Ignore Target IDCODE during Resurrection and DCC Loader operations


400px


Then connect and get the ID, you should receive the dead body signal. Then read the memory. JTAG complete.


Notes

The phone has a 512 MB NAND flash memory chip which should take approximately 30 minutes to download.