zoukankan      html  css  js  c++  java
  • Overcome the Dilemma of "unlock" and "trust"

    When examining an Android phone, we have to overcome some barriers first so that we could extract data from it without fail. Usually the scenario is that Suspect's phone got pattern lock / password lock and you are not sure if USB Debug mode is ON or Off.

    So you connect this phone to your forensic workstation or phone extraction equipment, but guess what? A message popup as below:

    Because the phone is locked so you could not see what really pops up on its screen, let me show you what it is as below:

    You must check "Always allow from this computer" to build "Trust" relationship between this phone and your computer first.  But before that you should unlock the phone first...so that you could the prompt on the screen...that becomes a "Dilemma"...

    Some will say that don't worry, let's check support list first, let's see if got support physical extraction / logical extraction / bootloader bypass...But what if Suspect's phone is not in the support list?

    Let me show you how to solve this problem. All you need is to replace "Recovery Area" by flahsing TWRP/CWM Recovery ROM, and you could enter recovery mode to manpulate its powerful third party functions.

    Basically it won't affect "User Area", you don't have to worry about data loss. Somehow there is stiill a little risk if you could not flash Recovery IMG successfully, the phone maybe "bricked". Practice makes perfect. You need to believe in yourself.

    Then what? Use your imagination. Now you could update SuperSU zip file and got Root permissions. Worry about risk? Of course you could buy a same model phone to do a test firest. Once successed and you could do the same thing on Susupect's phone. Finally you could unlock any lock and see any prompt on the screen. No more barriers will stop you from extracting data on Android phones.

    It still depends on how much you want the data of Suspect's phone. You could just say that model is not on the list, and there is nothing you could do about this phone. Or you could try every possible method in order to extract data from Suspect's phone, to restore the truth, to reveal the Justice.

  • 相关阅读:
    【Python】表白代码
    有关加密技术的概述,黑客是如何破解加密数据?
    Kali Linux的发展史,专为数字取证和渗透测试而设计
    在Wi-Fi路由器中发现了新的安全漏洞
    太可怕!看看黑客是怎样利用社会工程学窃取你的密码?
    不可不知!未来警惕被黑客植入微芯片
    什么是计算机漏洞,为什么会有漏洞呢?
    揭秘人工智能将如何影响今天的工作
    Linux为程序员添加了行为准则
    不可不知!4种常见的黑客攻击手段
  • 原文地址:https://www.cnblogs.com/pieces0310/p/4857917.html
Copyright © 2011-2022 走看看