Difference between pages "OcfaLib API" and "JTAG Huawei TracFone M865C"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
 
(Created page with "== JTAG Huawei TracFone M865C (Ascend II) == This phone is supported by the Cricket Network and Tracfone. This uses a Qualcomm 7627 600 MHz (S1) Processo and comes standard...")
 
Line 1: Line 1:
The OcfaLib API is a C++ API that is meant for usage by modules in the [[Open Computer Forensics Architecture]].
+
== JTAG Huawei TracFone M865C (Ascend II) ==
The C++ class ocfa::module::OcfaModule defines the base class of what all OCFA modules are derived. Depending on the type of module, the ocfa::facade namespace provides different convenient subclasses.
+
The OcfaModule class defines a virtual function named ProcessEvidence that the final module class must implement.
+
A typical module implementation implements a subclass by implementing a constructor and a ProcessEvidence method.
+
The main function of the module program will create an instance of the module class and call the run method on the object. The module will connect and register itself to the OCFA Anycast Relay and thus be connected into the Open Computer Forensics Architecture. For each piece of evidence data the module receives, the ProcessEvidence method will get invoked. The implementation of the ProcessEvidence method can depending on the type of facade used as baseclass can:
+
  
* Gain read access to the input evidence data.
 
* Use its own private workdir for derived and temporary data
 
* Derive evidence from the input evidence.
 
* Access meta data created by other modules. 
 
* Add additional metadata to the input evidence or child evidences.
 
  
For a simple example of a module that derives data from data look at the tar module in OcfaModules/dissector/tar.
 
For a simple example of a module that extracts metadata from data look at the pgp module in OcfaModule/extractor/pgp.
 
  
Next to simple OCFA modules, the ocfa::treegraph namespace provides an aditional sub API for building treegraph loadable modules, that can be used to create modules that map evidence data to a tree graph of data and meta data.
+
This phone is supported by the Cricket Network and Tracfone. This uses a Qualcomm 7627 600 MHz (S1) Processo and comes standard with Android version 2.3. This phone is unsupported by RIFF Box for the JTAG process for resurrector.  
  
The only API available currently is the C++ API.
 
Work is currently being done to also create a Java API and plans exist to build a Perl API to OCFA in the future.
 
  
== See Also ==
+
{| border="1" cellpadding="2"
* [[Open Computer Forensics Architecture]]
+
|-
 +
| [[ File:huawei-tracfone-m865c-front.png | 400px ]]
 +
| [[ File:huawei-tracfone-m865c-back.png | 400px ]]
 +
|-
 +
|}
 +
 
 +
 
 +
 
 +
=== Getting Started ===
 +
 
 +
 
 +
What you need:
 +
 
 +
 
 +
# Riff Box
 +
 
 +
# USB to Micro USB cord
 +
 
 +
 
 +
 
 +
=== NAND Dump Procedure ===
 +
 
 +
# Disassemble the phone down to the PCB.
 +
# Connect the RIFF box to the PC via USB.
 +
# Connect the RIFF box to the PCB via the JTAG pins.
 +
# Connect the PCB to a Micro USB cord and power via a power supply.
 +
# Start the "RIFF box" software.
 +
# Power the PCB.
 +
# Dump the NAND.
 +
 
 +
The TAPS are located under the battery, behind the Huawei phone label.  The phone will be powered by a Micro USB cord from an AC battery charger.
 +
 
 +
The TAPS order is as follows:
 +
 
 +
# 1=Not Used
 +
# 2=TCK
 +
# 3=GND
 +
# 4=TMS
 +
# 5=TDI
 +
# 6=TDO
 +
# 7=RTCK
 +
# 8=TRST
 +
# 9=NRST
 +
 
 +
 
 +
 
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:huawei-tracfone-m865c-taps.png | 400px ]]
 +
|-
 +
|}
 +
 
 +
 
 +
 
 +
For the TAPs, the Huawei-8650 was utilized, pictured above. The TAPS on the M865C are located in the same location as the 8650. See below for TAPS locations.
 +
 
 +
 
 +
 
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:huawei-tracfone-m865c-soldered-taps.png | 400px ]]
 +
|-
 +
|}
 +
 
 +
 
 +
 
 +
After the wires are connected to the board, the phone is powered by the USB connection. Plug the Micro USB into the USB connection on the device and then plug the phone into a wall outlet. The phone should respond with the vibrator switch activating for less than a second.
 +
 
 +
Launch the Riff Box JTAG Manager and use the following settings:
 +
 
 +
* JTAG TCK Speed = RTCK
 +
* Resurrector Settings= Huawei U8650
 +
* Auto FullFlash size
 +
 
 +
 
 +
 
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:huawei-tracfone-m865c-riff-settings.png | 400px ]]
 +
|-
 +
|}
 +
 
 +
 
 +
 
 +
Advanced Settings:
 +
 
 +
* Ignore Target IDCODE during Resurrection and DCC Loader operations
 +
 
 +
 
 +
 
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:huawei-tracfone-m865c-riff-advanced-settings.png | 400px ]]
 +
|-
 +
|}
 +
 
 +
 
 +
 
 +
Then connect and get the ID, you should receive the dead body signal. Then read the memory.  JTAG complete.
 +
 
 +
 
 +
=== Notes ===
 +
 
 +
 
 +
 
 +
The phone has a 512 MB NAND flash memory chip which should take approximately 30 minutes to download.

Revision as of 20:29, 11 September 2013

JTAG Huawei TracFone M865C (Ascend II)

This phone is supported by the Cricket Network and Tracfone. This uses a Qualcomm 7627 600 MHz (S1) Processo and comes standard with Android version 2.3. This phone is unsupported by RIFF Box for the JTAG process for resurrector.


400px 400px


Getting Started

What you need:


  1. Riff Box
  1. USB to Micro USB cord


NAND Dump Procedure

  1. Disassemble the phone down to the PCB.
  2. Connect the RIFF box to the PC via USB.
  3. Connect the RIFF box to the PCB via the JTAG pins.
  4. Connect the PCB to a Micro USB cord and power via a power supply.
  5. Start the "RIFF box" software.
  6. Power the PCB.
  7. Dump the NAND.

The TAPS are located under the battery, behind the Huawei phone label. The phone will be powered by a Micro USB cord from an AC battery charger.

The TAPS order is as follows:

  1. 1=Not Used
  2. 2=TCK
  3. 3=GND
  4. 4=TMS
  5. 5=TDI
  6. 6=TDO
  7. 7=RTCK
  8. 8=TRST
  9. 9=NRST


400px


For the TAPs, the Huawei-8650 was utilized, pictured above. The TAPS on the M865C are located in the same location as the 8650. See below for TAPS locations.


Huawei-tracfone-m865c-soldered-taps.png


After the wires are connected to the board, the phone is powered by the USB connection. Plug the Micro USB into the USB connection on the device and then plug the phone into a wall outlet. The phone should respond with the vibrator switch activating for less than a second.

Launch the Riff Box JTAG Manager and use the following settings:

  • JTAG TCK Speed = RTCK
  • Resurrector Settings= Huawei U8650
  • Auto FullFlash size


400px


Advanced Settings:

  • Ignore Target IDCODE during Resurrection and DCC Loader operations


400px


Then connect and get the ID, you should receive the dead body signal. Then read the memory. JTAG complete.


Notes

The phone has a 512 MB NAND flash memory chip which should take approximately 30 minutes to download.