zoukankan      html  css  js  c++  java
  • Overcome the Dilemma of "unlock" and "trust"

    When examining an Android phone, we have to overcome some barriers first so that we could extract data from it without fail. Usually the scenario is that Suspect's phone got pattern lock / password lock and you are not sure if USB Debug mode is ON or Off.

    So you connect this phone to your forensic workstation or phone extraction equipment, but guess what? A message popup as below:

    Because the phone is locked so you could not see what really pops up on its screen, let me show you what it is as below:

    You must check "Always allow from this computer" to build "Trust" relationship between this phone and your computer first.  But before that you should unlock the phone first...so that you could the prompt on the screen...that becomes a "Dilemma"...

    Some will say that don't worry, let's check support list first, let's see if got support physical extraction / logical extraction / bootloader bypass...But what if Suspect's phone is not in the support list?

    Let me show you how to solve this problem. All you need is to replace "Recovery Area" by flahsing TWRP/CWM Recovery ROM, and you could enter recovery mode to manpulate its powerful third party functions.

    Basically it won't affect "User Area", you don't have to worry about data loss. Somehow there is stiill a little risk if you could not flash Recovery IMG successfully, the phone maybe "bricked". Practice makes perfect. You need to believe in yourself.

    Then what? Use your imagination. Now you could update SuperSU zip file and got Root permissions. Worry about risk? Of course you could buy a same model phone to do a test firest. Once successed and you could do the same thing on Susupect's phone. Finally you could unlock any lock and see any prompt on the screen. No more barriers will stop you from extracting data on Android phones.

    It still depends on how much you want the data of Suspect's phone. You could just say that model is not on the list, and there is nothing you could do about this phone. Or you could try every possible method in order to extract data from Suspect's phone, to restore the truth, to reveal the Justice.

  • 相关阅读:
    【Monkey】Monkey稳定性测试常用命令
    【Monkey】Monkey基础概念
    推荐一些前端开发常用框架
    MySql 分表复制表结构和数据脚本
    通过apo切面,动态切换数据源
    MySq 数据迁移,把单字段数据解析出插入到另一张表中
    hadoop 集群搭建与mapreduce开发实战(二)
    hadoop mvn项目 pom配置
    hadoop 集群搭建与mapreduce开发实战(一)
    MySql 存储过程及调用方法
  • 原文地址:https://www.cnblogs.com/pieces0310/p/4857917.html
Copyright © 2011-2022 走看看