Re: [sleuthkit-users] android device taking image
Brought to you by:
carrier
From: Derrick K. <dk...@gm...> - 2014-05-26 05:10:24
|
Hello. A bit off topic on this mailing list but take a look at the JTAG documents on the forensicswiki.org. Using JTAG you can read directly into the NAND so you can effectively get a copy of the internal memory without rooting (or even booting) the device. http://www.forensicswiki.org/wiki/JTAG_Forensics Derrick On Sun, May 25, 2014 at 11:01 PM, Enkidu Mo Shiri <vol...@gm...> wrote: > Hi, > i have an android device which i need to take image of its internal memory. > is it possible to do so without rooting the device? i did some research and > found JTAG application can do so. is it true? can i take full image without > rooting device using jtag? > Ehsan Moshiri (Enkidu) > Digital Forensic Student > H/P:+96164953954 , +961124249769 > Linkedin: http://my.linkedin.com/pub/enkidu-moshiri/59/baa/90b/ > Facebook: Enkidu Mo Shi Ri > wechat: Enkidu-Moshiri > Line: Enkidu.Moshiri > > ------------------------------------------------------------------------------ > The best possible search technologies are now affordable for all companies. > Download your FREE open source Enterprise Search Engine today! > Our experts will assist you in its installation for $59/mo, no commitment. > Test it for FREE on our Cloud platform anytime! > http://pubads.g.doubleclick.net/gampad/clk?id=145328191&iu=/4140/ostg.clktrk > _______________________________________________ > sleuthkit-users mailing list > https://lists.sourceforge.net/lists/listinfo/sleuthkit-users > http://www.sleuthkit.org > |