±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 7 Overall: 36105
New Yesterday: 9 Visitors: 137

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Videos

±Latest Jobs

Huawei HiSilicon access and manipulation

Discussion of forensic issues related to all types of mobile phones and underlying technologies (GSM, GPRS, UMTS/3G, HSDPA, LTE, Bluetooth etc.)
Subforums: Mobile Telephone Case Law
Reply to topicReply to topic Printer Friendly Page
Forum FAQSearchView unanswered posts
Page Previous  1, 2 
  

trewmte
Senior Member
 

Re: Huawei HiSilicon access and manipulation

Post Posted: Jul 30, 19 07:17

- mshibo
So, straight to the point.
In Qualcomm based devices, we can enter EDL mode and with the right firehose programmer, we can do so much in the device such as access the storage and flash custom binaries or inject some commands.
The question is, what can we do with Hisilicon based devices?
Hisilicon based devices have some boot mode that equals to EDL from Qualcomm and I believe that we can achieve so much from there but how it works and to make a real use of it.


Cellebrite's UFED4PC/Touch has a profile using Search//Generic//Huawei Generic//Physical//xxxxxxxxx
_________________
Institute for Digital Forensics (IDF) - www.linkedin.com/groups/2436720
Mobile Telephone Examination Board (MTEB) - www.linkedin.com/groups/141739
Universal Network Investigations - www.linkedin.com/groups/13536130
Mobile Telephone Evidence & Forensics trewmte.blogspot.com 
 
  

passcodeunlock
Senior Member
 

Re: Huawei HiSilicon access and manipulation

Post Posted: Jul 30, 19 12:37

UFED4PC/Touch 2 isn't working with newer firmwares even if you match the Kirin version profile.
_________________
Apple passcode unlock + decrypted filesystem dump, Android user locks unlock + physical dump with decrypted userdata partition. We provide our services world-wide, but we reserve the right for choosing which tasks we take and which we deny! 
 
  

trewmte
Senior Member
 

Re: Huawei HiSilicon access and manipulation

Post Posted: Jul 30, 19 13:48

- passcodeunlock
UFED4PC/Touch 2 isn't working with newer firmwares even if you match the Kirin version profile.


Ohh, that's interesting. I was reading from Cellebrite's own material ( www.cellebrite.com/en/...-evidence/ ). Thank you passcodeunlock for the heads up.
_________________
Institute for Digital Forensics (IDF) - www.linkedin.com/groups/2436720
Mobile Telephone Examination Board (MTEB) - www.linkedin.com/groups/141739
Universal Network Investigations - www.linkedin.com/groups/13536130
Mobile Telephone Evidence & Forensics trewmte.blogspot.com 
 
  

passcodeunlock
Senior Member
 

Re: Huawei HiSilicon access and manipulation

Post Posted: Jul 30, 19 14:28

CAS is supporting a wider range of devices then they got implemented using bootloader in the UFED4PC/Touch 2. If anybody needs the service, please approach Cellebrite.

On the other hand, I got some solutions for physical dumping (decrypted filesystem dump) mostly any open Huawei device, up to the current date of this post (2019-07-30).
_________________
Apple passcode unlock + decrypted filesystem dump, Android user locks unlock + physical dump with decrypted userdata partition. We provide our services world-wide, but we reserve the right for choosing which tasks we take and which we deny! 
 

Page 2 of 2
Page Previous  1, 2