±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 31952
New Yesterday: 1 Visitors: 95

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars

sony z3 d6603 PIN Code bypass ?

Discussion of forensic issues related to all types of mobile phones and underlying technologies (GSM, GPRS, UMTS/3G, HSDPA, LTE, Bluetooth etc.)
Subforums: Mobile Telephone Case Law
Reply to topicReply to topic Printer Friendly Page
Forum FAQSearchView unanswered posts
Go to page 1, 2  Next 
  

sony z3 d6603 PIN Code bypass ?

Post Posted: Sun Mar 19, 2017 12:06 pm

hello all ...
i try to bypass sony z3 pin code without success i fallow this steps
www.youtube.com/watch?...&t=55s

i read that xpin clip support bypass sony pin when i visted the offical website for the tool i didnt found details i found this :


any help i need some one to confirm that xpin clip can bypass d6603 model
and what about other solutions i there any way to jtag thet model any box support jtag for that model or anyway to bypass pin

if there is no solutions what about last one ( chip-off )  

qassam22222
Senior Member
 
 
  

Re: sony z3 d6603 PIN Code bypass ?

Post Posted: Sun Mar 19, 2017 3:43 pm

It's not really a bypass, but rather a bruteforce via OTG and this should work. JTAG is most likely not present at all, but there's pinout for ISP so no chip-off might be required. Keep in mind that it phones has Android 6 then it's using gatekeeper so it may not be possible to crack the PIN code anyway.  

arcaine2
Member
 
 
  

Re: sony z3 d6603 PIN Code bypass ?

Post Posted: Mon Mar 20, 2017 1:59 am

- arcaine2
It's not really a bypass, but rather a bruteforce via OTG and this should work. JTAG is most likely not present at all, but there's pinout for ISP so no chip-off might be required. Keep in mind that it phones has Android 6 then it's using gatekeeper so it may not be possible to crack the PIN code anyway.

what is OTG ??? i got this replay from xpin clip support


Hello,
If phone got OTG and counter don't rise after entering codes (you can check this by entering some codes by hand) then it's supported.


the phone counter is rising after 4 or 5 attemps
and about ISP pinout what to use to connect them i mean what is the box name  

qassam22222
Senior Member
 
 
  

Re: sony z3 d6603 PIN Code bypass ?

Post Posted: Mon Mar 20, 2017 2:47 am

VR-Table 10 pins + z3x box or similar for reading ISP.
_________________
Passcodeunlock - mobile/tablet screen unlocking
passcodeunlock.com 

passcodeunlock
Senior Member
 
 
  

Re: sony z3 d6603 PIN Code bypass ?

Post Posted: Mon Mar 20, 2017 2:51 am

- passcodeunlock
VR-Table 10 pins + z3x box or similar for reading ISP.


okay but what about gatekeeper ?? i didnt know anythink about it I have not heard of it before ? i read this ...
nelenkov.blogspot.com/...oid-m.html  

qassam22222
Senior Member
 
 
  

Re: sony z3 d6603 PIN Code bypass ?

Post Posted: Mon Mar 20, 2017 12:04 pm

- arcaine2
It's not really a bypass, but rather a bruteforce via OTG and this should work. JTAG is most likely not present at all, but there's pinout for ISP so no chip-off might be required. Keep in mind that it phones has Android 6 then it's using gatekeeper so it may not be possible to crack the PIN code anyway.

i didn't understand the first picture u said no need for chip-off but at the first picture u remove the chip :


can u explain well ?  

qassam22222
Senior Member
 
 
  

Re: sony z3 d6603 PIN Code bypass ?

Post Posted: Mon Mar 20, 2017 1:25 pm

[quote="qassam22222"]
- arcaine2

i didn't understand the first picture u said no need for chip-off but at the first picture u remove the chip :

can u explain well ?


Both images are the same thing. First one is just made by someone who removed the chip to find pinout easier. Essentially, you solder 6 wires to elements/pads that are around the chip, marked properly. Second image makes a bit clearer:



Also, OTG is also known as USB-HOST. Z3 supports it and allows you to connect external device like mouse, keyboard, pendrive to microUSB port. XPin emulates mouse and keyboard and simply tries every single code matching the pattern you set until it hits the correct one and unlocks the phone. By counter, they rather meant that some phones are set to wipe after some incorrect codes. Most of the Android phones allows you to enter 5 codes incorrectly, then wait 30 seconds, then try another 5 and so on, but you either need to know how yours is set or take a risk.

For ISP you can use medusa, z3x, emmc pro, riff2 etc. If phone is running Android 5.x or lower you can read (some boxes have a built-in file browser do you don't have to make a full dump) locksettings.db and password.key/pattern.key, crack it and unlock the phone with cracked code. Since Android 6, those devices are using gatekeeper so it may not be possible to crack PIN, password or pattern. I haven't seen any software cracking this but maybe it's possible. Company behind xpin clip claims they can crack this tho.

It might depend on what exacly you need to do. For forensic analysis it should be enough to read full dump via ISP/chip-off and at this point you won't have to bother if it has a password or not. If you need to unlock the device and use it, then you'd have to dump userdata partition via ISP/chip-off, remove the *.key files (and preferably make some changes in locksettings.db) from dumped image and restore such modified image back to the phone.  

Last edited by arcaine2 on Mon Mar 20, 2017 1:38 pm; edited 1 time in total

arcaine2
Member
 
 

Reply to topicReply to topic

Share and Like this forum topic to get more replies




Page 1 of 2
Go to page 1, 2  Next