Difference between pages "QCOW Image Format" and "JTAG Huawei TracFone M865C"

From Forensics Wiki
(Difference between pages)
Jump to: navigation, search
(External Links)
 
(Created page with "== JTAG Huawei TracFone M865C (Ascend II) == This phone is supported by the Cricket Network and Tracfone. This uses a Qualcomm 7627 600 MHz (S1) Processo and comes standard...")
 
Line 1: Line 1:
[[QEMU]] uses the '''QEMU Copy-On-Write (QCOW)''' files to store a disk image.
+
== JTAG Huawei TracFone M865C (Ascend II) ==
  
== MIME types ==
 
  
== File signature ==
 
QCOW files start with hexadecimal: 0x51 0x46 0x49 0xfb (ASCII: "QFI.")
 
  
== File types ==
+
This phone is supported by the Cricket Network and Tracfone. This uses a Qualcomm 7627 600 MHz (S1) Processo and comes standard with Android version 2.3. This phone is unsupported by RIFF Box for the JTAG process for resurrector.  
Currently there two are versions of the QCOW format; version 1 and 2. Version 2 is the preferred format.
+
  
== Contents ==
 
The QCOW format is used to store storage media data, e.g. disk images.
 
  
The QCOW image file consists of:
+
{| border="1" cellpadding="2"
* the file header
+
|-
* the L1 table (cluster aligned)
+
| [[ File:huawei-tracfone-m865c-front.png | 400px ]]
* the reference count table (cluster aligned)
+
| [[ File:huawei-tracfone-m865c-back.png | 400px ]]
* reference count blocks
+
|-
* snapshot headers (8-byte aligned on cluster boundary)
+
|}
* clusters containing:
+
** L2 tables
+
** storage media data
+
  
The clusters are 512 bytes of size
 
  
== Encryption ==
 
The QCOW2 format supports optional AES encryption
 
  
== See Also ==
+
=== Getting Started ===
* [[Disk Images]]
+
  
== External Links ==
 
  
* [http://people.gnome.org/~markmc/qcow-image-format-version-1.html The QCOW Image Format], by [[Mark McLoughlin]], June 2006
+
What you need:
* [http://people.gnome.org/~markmc/qcow-image-format.html The QCOW2 Image Format], by [[Mark McLoughlin]], September 2008
+
* [https://code.google.com/p/libqcow/downloads/detail?name=QEMU%20Copy-On-Write%20file%20format.pdf QEMU Copy-On-Write file format], by the [[libqcow|libqcow project]], December 2010
+
  
[[Category:File Formats]]
+
 
 +
# Riff Box
 +
 
 +
# USB to Micro USB cord
 +
 
 +
 
 +
 
 +
=== NAND Dump Procedure ===
 +
 
 +
# Disassemble the phone down to the PCB.
 +
# Connect the RIFF box to the PC via USB.
 +
# Connect the RIFF box to the PCB via the JTAG pins.
 +
# Connect the PCB to a Micro USB cord and power via a power supply.
 +
# Start the "RIFF box" software.
 +
# Power the PCB.
 +
# Dump the NAND.
 +
 
 +
The TAPS are located under the battery, behind the Huawei phone label.  The phone will be powered by a Micro USB cord from an AC battery charger.
 +
 
 +
The TAPS order is as follows:
 +
 
 +
# 1=Not Used
 +
# 2=TCK
 +
# 3=GND
 +
# 4=TMS
 +
# 5=TDI
 +
# 6=TDO
 +
# 7=RTCK
 +
# 8=TRST
 +
# 9=NRST
 +
 
 +
 
 +
 
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:huawei-tracfone-m865c-taps.png | 400px ]]
 +
|-
 +
|}
 +
 
 +
 
 +
 
 +
For the TAPs, the Huawei-8650 was utilized, pictured above. The TAPS on the M865C are located in the same location as the 8650. See below for TAPS locations.
 +
 
 +
 
 +
 
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:huawei-tracfone-m865c-soldered-taps.png | 400px ]]
 +
|-
 +
|}
 +
 
 +
 
 +
 
 +
After the wires are connected to the board, the phone is powered by the USB connection. Plug the Micro USB into the USB connection on the device and then plug the phone into a wall outlet. The phone should respond with the vibrator switch activating for less than a second.
 +
 
 +
Launch the Riff Box JTAG Manager and use the following settings:
 +
 
 +
* JTAG TCK Speed = RTCK
 +
* Resurrector Settings= Huawei U8650
 +
* Auto FullFlash size
 +
 
 +
 
 +
 
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:huawei-tracfone-m865c-riff-settings.png | 400px ]]
 +
|-
 +
|}
 +
 
 +
 
 +
 
 +
Advanced Settings:
 +
 
 +
* Ignore Target IDCODE during Resurrection and DCC Loader operations
 +
 
 +
 
 +
 
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:huawei-tracfone-m865c-riff-advanced-settings.png | 400px ]]
 +
|-
 +
|}
 +
 
 +
 
 +
 
 +
Then connect and get the ID, you should receive the dead body signal. Then read the memory.  JTAG complete.
 +
 
 +
 
 +
=== Notes ===
 +
 
 +
 
 +
 
 +
The phone has a 512 MB NAND flash memory chip which should take approximately 30 minutes to download.

Revision as of 19:29, 11 September 2013

Contents

JTAG Huawei TracFone M865C (Ascend II)

This phone is supported by the Cricket Network and Tracfone. This uses a Qualcomm 7627 600 MHz (S1) Processo and comes standard with Android version 2.3. This phone is unsupported by RIFF Box for the JTAG process for resurrector.


400px 400px


Getting Started

What you need:


  1. Riff Box
  1. USB to Micro USB cord


NAND Dump Procedure

  1. Disassemble the phone down to the PCB.
  2. Connect the RIFF box to the PC via USB.
  3. Connect the RIFF box to the PCB via the JTAG pins.
  4. Connect the PCB to a Micro USB cord and power via a power supply.
  5. Start the "RIFF box" software.
  6. Power the PCB.
  7. Dump the NAND.

The TAPS are located under the battery, behind the Huawei phone label. The phone will be powered by a Micro USB cord from an AC battery charger.

The TAPS order is as follows:

  1. 1=Not Used
  2. 2=TCK
  3. 3=GND
  4. 4=TMS
  5. 5=TDI
  6. 6=TDO
  7. 7=RTCK
  8. 8=TRST
  9. 9=NRST


400px


For the TAPs, the Huawei-8650 was utilized, pictured above. The TAPS on the M865C are located in the same location as the 8650. See below for TAPS locations.


Huawei-tracfone-m865c-soldered-taps.png


After the wires are connected to the board, the phone is powered by the USB connection. Plug the Micro USB into the USB connection on the device and then plug the phone into a wall outlet. The phone should respond with the vibrator switch activating for less than a second.

Launch the Riff Box JTAG Manager and use the following settings:

  • JTAG TCK Speed = RTCK
  • Resurrector Settings= Huawei U8650
  • Auto FullFlash size


400px


Advanced Settings:

  • Ignore Target IDCODE during Resurrection and DCC Loader operations


400px


Then connect and get the ID, you should receive the dead body signal. Then read the memory. JTAG complete.


Notes

The phone has a 512 MB NAND flash memory chip which should take approximately 30 minutes to download.