Difference between pages "Determining OS version from an evidence image" and "JTAG Huawei TracFone M865C"

From Forensics Wiki
(Difference between pages)
Jump to: navigation, search
(Solaris)
 
(Created page with "== JTAG Huawei TracFone M865C (Ascend II) == This phone is supported by the Cricket Network and Tracfone. This uses a Qualcomm 7627 600 MHz (S1) Processo and comes standard...")
 
Line 1: Line 1:
One of the first steps an examiners will need to carry out once they have an evidence image is to log system metadata, including OS version and patch level. This may be of particular importance if the image in question is from a machine that is suspected of having been compromised.
+
== JTAG Huawei TracFone M865C (Ascend II) ==
  
==Windows==
 
  
===Windows 95/98/ME===
 
  
Establish the boot volume, verify that it is a FAT file system, and locate the hidden text file \MSDOS.SYS. Locate the [Options]WinVer parameter:
+
This phone is supported by the Cricket Network and Tracfone. This uses a Qualcomm 7627 600 MHz (S1) Processo and comes standard with Android version 2.3. This phone is unsupported by RIFF Box for the JTAG process for resurrector.
  
{| class="wikitable"
+
 
|-
+
{| border="1" cellpadding="2"
! WinVer
+
! OS
+
|-
+
| 4.00.0950
+
| Windows 95
+
|-
+
| 4.00.1111
+
| Windows 95 OSR2
+
|-
+
| 4.03.1212
+
| Windows 95 OSR2.1
+
 
|-
 
|-
| 4.03.1214
+
| [[ File:huawei-tracfone-m865c-front.png | 400px ]]
| Windows 95 OSR2.5
+
| [[ File:huawei-tracfone-m865c-back.png | 400px ]]
 
|-
 
|-
| 4.10.1998
 
| Windows 98
 
|-
 
| 4.10.2222
 
| Windows 98 SE
 
|-
 
| 4.90.3000
 
| Windows ME
 
 
|}
 
|}
  
Alternatively, establish WinDir ([Paths]WinDir in \MSDOS.SYS), locate the %WINDIR%\SYSTEM.DAT registry file. Next, look up the registry key Software\Microsoft\Windows\CurrentVersion\, and values Version and VersionNumber. (Backup copies of SYSTEM.DAT may be found in .CAB files in %WINDIR%\SYSBCKUP.)
 
  
===Windows NT===
 
  
===Windows 2000/2003/XP/Vista===
+
=== Getting Started ===
Information about a running system can be displayed using the command `ver` (and `systeminfo` on some systems).
+
  
During a forensic examination, information regarding the version of Windows can be found in a number of places.  For example, by default, the Windows directory on Windows XP is "C:\Windows", where on Windows NT and 2000, it was "C:\Winnt".  This is not definitive, however, because this directory name is easily modified during installation.
 
  
Determining the version of Windows from the Software Registry Hive file - navigate to the ''Microsoft\Windows NT\CurrentVersion'' key, and examine the values beneath the key; specifically, values such as ProductName, CSDVersion, ProductId (if available), BuildLab, and on Vista, BuildLabEx.
+
What you need:
  
Determining the version of Windows from file version information - locate the file %WinDir%\system32\ntoskrnl.exe and review the file version information/strings from the resource section of the PE file.  You can view this information with a hex editor, or extract it using a variety of means.  There is a Perl module (Win32::File::VersionInfo) that will allow you to extract this information, and the Perl script [http://sourceforge.net/project/showfiles.php?group_id=164158&package_id=203967 kern.pl] illustrates a platform independent means of examining the PE header and ultimately locating the file version information.
 
  
In order to determine the difference between Windows XP Professional and Home versions, look for the %WinDir%\system32\prodspec.ini file; it contains information regarding the Product type (either XP Pro or Home). Another way to do this is to look at Microsoft Product Code (first 5 digits of ''Product ID''). Some of these values:
+
# Riff Box
  
{| class="wikitable" border="1"
+
# USB to Micro USB cord
 +
 
 +
 
 +
 
 +
=== NAND Dump Procedure ===
 +
 
 +
# Disassemble the phone down to the PCB.
 +
# Connect the RIFF box to the PC via USB.
 +
# Connect the RIFF box to the PCB via the JTAG pins.
 +
# Connect the PCB to a Micro USB cord and power via a power supply.
 +
# Start the "RIFF box" software.
 +
# Power the PCB.
 +
# Dump the NAND.
 +
 
 +
The TAPS are located under the battery, behind the Huawei phone label.  The phone will be powered by a Micro USB cord from an AC battery charger.
 +
 
 +
The TAPS order is as follows:
 +
 
 +
# 1=Not Used
 +
# 2=TCK
 +
# 3=GND
 +
# 4=TMS
 +
# 5=TDI
 +
# 6=TDO
 +
# 7=RTCK
 +
# 8=TRST
 +
# 9=NRST
 +
 
 +
 
 +
 
 +
{| border="1" cellpadding="2"
 
|-
 
|-
!Value (MPC)!!Version
+
| [[ File:huawei-tracfone-m865c-taps.png | 400px ]]
 
|-
 
|-
|55034 || Windows XP Professional English
 
|-
 
|55683 || Windows XP Professional Russian
 
|-
 
|55681 || Windows XP Home Edition Russian
 
 
|}
 
|}
  
==Unix/Linux==
 
Information about a running system, including the kernel version, can be displayed using the command `uname -a`. However, this is not much good if you performing dead analysis on a disk image.
 
  
===Linux===
 
A number of Linux distributions create a file in ''/etc'' to identify the release or version installed.
 
  
<pre>
+
For the TAPs, the Huawei-8650 was utilized, pictured above. The TAPS on the M865C are located in the same location as the 8650. See below for TAPS locations.  
/etc/issue
+
/etc/issue.net
+
</pre>
+
  
{| class="wikitable" border="1"
+
 
|-
+
 
!Distro!!Tag
+
{| border="1" cellpadding="2"
 
|-
 
|-
|Red Hat || /etc/redhat-release
+
| [[ File:huawei-tracfone-m865c-soldered-taps.png | 400px ]]
 
|-
 
|-
|Debian  || /etc/debian-version
 
 
|}
 
|}
  
=== (Open) Solaris ===
 
  
===Free/Net/OpenBSD===
 
A first indicator of the presence of a BSDs operating system is the partition table on a MBR-partitioned disk:
 
  
{| class="wikitable" border="1"
+
After the wires are connected to the board, the phone is powered by the USB connection. Plug the Micro USB into the USB connection on the device and then plug the phone into a wall outlet. The phone should respond with the vibrator switch activating for less than a second.
|-
+
 
!OS!!Partition type
+
Launch the Riff Box JTAG Manager and use the following settings:
 +
 
 +
* JTAG TCK Speed = RTCK
 +
* Resurrector Settings= Huawei U8650
 +
* Auto FullFlash size
 +
 
 +
 
 +
 
 +
{| border="1" cellpadding="2"
 
|-
 
|-
|FreeBSD || FreeBSD (0xA5)
+
| [[ File:huawei-tracfone-m865c-riff-settings.png | 400px ]]
|-
+
|OpenBSD || OpenBSD (0xA6)
+
|-
+
|NetBSD || NetBSD (0xA9)
+
 
|-
 
|-
 
|}
 
|}
  
You can get the release and version of BSDs operating system inside the kernel images, even with only a disk image.
 
  
{| class="wikitable" border="1"
+
 
 +
Advanced Settings:
 +
 
 +
* Ignore Target IDCODE during Resurrection and DCC Loader operations
 +
 
 +
 
 +
 
 +
{| border="1" cellpadding="2"
 
|-
 
|-
!OS!!Kernel path
+
| [[ File:huawei-tracfone-m865c-riff-advanced-settings.png | 400px ]]
|-
+
|FreeBSD || /boot/kernel/kernel
+
|-
+
|OpenBSD || /bsd
+
|-
+
|NetBSD || /netbsd
+
 
|-
 
|-
 
|}
 
|}
  
You can use <tt>strings</tt> and <tt>grep</tt> tools to find this information with <tt>strings kernel_path | grep os_name</tt>. (e.g.: <tt>strings /bsd | grep OpenBSD</tt>)
 
  
===AIX===
 
  
===HP/UX===
+
Then connect and get the ID, you should receive the dead body signal. Then read the memory.  JTAG complete.
 +
 
 +
 
 +
=== Notes ===
 +
 
 +
 
  
[[Category:Howtos]]
+
The phone has a 512 MB NAND flash memory chip which should take approximately 30 minutes to download.

Revision as of 19:29, 11 September 2013

Contents

JTAG Huawei TracFone M865C (Ascend II)

This phone is supported by the Cricket Network and Tracfone. This uses a Qualcomm 7627 600 MHz (S1) Processo and comes standard with Android version 2.3. This phone is unsupported by RIFF Box for the JTAG process for resurrector.


400px 400px


Getting Started

What you need:


  1. Riff Box
  1. USB to Micro USB cord


NAND Dump Procedure

  1. Disassemble the phone down to the PCB.
  2. Connect the RIFF box to the PC via USB.
  3. Connect the RIFF box to the PCB via the JTAG pins.
  4. Connect the PCB to a Micro USB cord and power via a power supply.
  5. Start the "RIFF box" software.
  6. Power the PCB.
  7. Dump the NAND.

The TAPS are located under the battery, behind the Huawei phone label. The phone will be powered by a Micro USB cord from an AC battery charger.

The TAPS order is as follows:

  1. 1=Not Used
  2. 2=TCK
  3. 3=GND
  4. 4=TMS
  5. 5=TDI
  6. 6=TDO
  7. 7=RTCK
  8. 8=TRST
  9. 9=NRST


400px


For the TAPs, the Huawei-8650 was utilized, pictured above. The TAPS on the M865C are located in the same location as the 8650. See below for TAPS locations.


Huawei-tracfone-m865c-soldered-taps.png


After the wires are connected to the board, the phone is powered by the USB connection. Plug the Micro USB into the USB connection on the device and then plug the phone into a wall outlet. The phone should respond with the vibrator switch activating for less than a second.

Launch the Riff Box JTAG Manager and use the following settings:

  • JTAG TCK Speed = RTCK
  • Resurrector Settings= Huawei U8650
  • Auto FullFlash size


400px


Advanced Settings:

  • Ignore Target IDCODE during Resurrection and DCC Loader operations


400px


Then connect and get the ID, you should receive the dead body signal. Then read the memory. JTAG complete.


Notes

The phone has a 512 MB NAND flash memory chip which should take approximately 30 minutes to download.