Difference between pages "JTAG LG L45C TracFone" and "JTAG Forensics"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(Created page with "=== LG - L45C -Optimus 2 === This phone is supported by the Tracfone. This uses a Qualcomm 7627 Processor and comes standard with Android version 2.3 and has internal storage...")
 
(Procedures)
 
Line 1: Line 1:
=== LG - L45C -Optimus 2 ===
+
== Definition ==
 +
=== From Wikipedia ([http://en.wikipedia.org/wiki/Joint_Test_Action_Group http://en.wikipedia.org/wiki/Joint_Test_Action_Group ]): ===
  
This phone is supported by the Tracfone. This uses a Qualcomm 7627 Processor and comes standard with Android version 2.3 and has internal storage of 512 MB. This phone is unsupported by RIFF Box for the JTAG process for resurrector. RIFF does support the Qualcomm 7627 processor.
+
Joint Test Action Group (JTAG) is the common name for what was later standardized as the IEEE 1149.1 Standard Test Access Port and Boundary-Scan Architecture. It was initially devised for testing printed circuit boards using boundary scan and is still widely used for this application. Today JTAG is also widely used for IC debug ports. In the embedded processor market, essentially all modern processors support JTAG when they have enough pins. Embedded systems development relies on debuggers talking to chips with JTAG to perform operations like single stepping and breakpointing. Digital electronics products such as cell phones or a wireless access point generally have no other debug or test interfaces.
  
{| border="1" cellpadding="2"
+
=== Forensic Application ===
|-
+
| [[ File:LG-L45C-front.PNG | 600px ]]
+
|-
+
|}
+
  
=== Getting Started ===
+
JTAG forensics is an acquisition procedure which involves connecting to the Standard Test Access Port (TAPs) on a device and instructing the processor to transfer the raw data stored on connected memory chips. Jtagging supported phones can be an extremely effective technique to extract a full physical image from devices that cannot be acquired by other means.
  
What you need:
+
== Tools and Equipment ==
  
# Riff Box
+
* [[JTAG and Chip-Off Tools and Equipment]]
# USB to Micro USB cord
+
  
 +
== Procedures ==
  
=== NAND Dump Procedure ===
+
* [[JTAG HTC Wildfire S]]
 
+
* [[JTAG Huawei TracFone M865C]]
# Disassemble the rear housing of the phone and metal plate covering the PCB board.
+
* [[JTAG Huawei Tracfone M866C]]
# Connect the RIFF box to the PC via USB.
+
* [[JTAG Huawei U8655]]
# Connect the RIFF box to the PCB via the JTAG pins.
+
* [[JTAG LG L45C TracFone]]
# Connect the PCB to a Micro USB cord and power via a power supply.
+
* [[JTAG LG P930 (Nitro HD)]]
# Start the "RIFF box" software.
+
* [[JTAG Samsung Galaxy S4 (SGH-I337)]]
# Power the PCB.
+
# Dump the NAND.
+
 
+
 
+
The Taps are located under the white LG sticker. The easiest way to access the TAPS is to remove the back cover of the phone. first remove the 7 screws (small Philips) and then the metal cover over the board.
+
 
+
{| border="1" cellpadding="2"
+
|-
+
| [[ File:LG-L45C-TAPS.PNG | 630px ]]
+
|-
+
|}
+
{| border="1" cellpadding="2"
+
|-
+
| [[ File:LG-L45C-TAPS-order.PNG | 400px ]]
+
|-
+
|}
+
The TAPS order is as follows:
+
 
+
# 1= TCK
+
# 2= RTCK
+
# 3= TDO
+
# 4= TDI
+
# 5= TMS
+
# 6= TRST
+
# 7= VCC
+
# 8= NRST
+
# 9= No Used
+
# 10=GND
+
 
+
 
+
This order applies to the RIFF box. Other boxes refer to the VCC as VREF and NRST as RESET.
+
 
+
 
+
After the wires are connected to the board, the phone is powered by the USB connection to a wall charger. May need a DC power supply to supplement the phone power. In that case, connect the DC power supply to the battery connections and set the DC power supply to 4.0. May also need to attach the two negative leads. During testing, one LG phone only responded to an actual battery and not the power supply.
+
 
+
 
+
Launch the Riff Box JTAG Manager and use the following settings:
+
 
+
*JTAG TCK Speed = RTCK
+
*Resurrector Settings= Qualcomm MSM 7XXX L41 D04 NAND
+
*Auto FullFlash size
+
 
+
{| border="1" cellpadding="2"
+
|-
+
| [[ File:JTAG_Mang_Setting.JPG | 800px ]]
+
|-
+
|}
+
 
+
 
+
Then connect and get the ID, you should receive the dead body signal. Then read the memory.
+
 
+
=== Notes ===
+
 
+
The phone has a 512 MB NAND flash memory chip which should take approximately 30 minutes to download.
+
 
+
=== References ===
+
*http://www.phonescoop.com/phones/phone.php?p=3308
+
*http://www.riffbox.org/
+

Revision as of 08:47, 13 September 2013

Definition

From Wikipedia (http://en.wikipedia.org/wiki/Joint_Test_Action_Group ):

Joint Test Action Group (JTAG) is the common name for what was later standardized as the IEEE 1149.1 Standard Test Access Port and Boundary-Scan Architecture. It was initially devised for testing printed circuit boards using boundary scan and is still widely used for this application. Today JTAG is also widely used for IC debug ports. In the embedded processor market, essentially all modern processors support JTAG when they have enough pins. Embedded systems development relies on debuggers talking to chips with JTAG to perform operations like single stepping and breakpointing. Digital electronics products such as cell phones or a wireless access point generally have no other debug or test interfaces.

Forensic Application

JTAG forensics is an acquisition procedure which involves connecting to the Standard Test Access Port (TAPs) on a device and instructing the processor to transfer the raw data stored on connected memory chips. Jtagging supported phones can be an extremely effective technique to extract a full physical image from devices that cannot be acquired by other means.

Tools and Equipment

Procedures