CN105141784A - Mobile phone evidence obtaining method based on recovery - Google Patents

Mobile phone evidence obtaining method based on recovery Download PDF

Info

Publication number
CN105141784A
CN105141784A CN201510662883.7A CN201510662883A CN105141784A CN 105141784 A CN105141784 A CN 105141784A CN 201510662883 A CN201510662883 A CN 201510662883A CN 105141784 A CN105141784 A CN 105141784A
Authority
CN
China
Prior art keywords
mobile phone
computer
recovery
pattern
fastboot
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510662883.7A
Other languages
Chinese (zh)
Inventor
吴松洋
刘善军
金波
王旭鹏
熊雄
杜琳
郭波
张勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Third Research Institute of the Ministry of Public Security
Original Assignee
Third Research Institute of the Ministry of Public Security
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Third Research Institute of the Ministry of Public Security filed Critical Third Research Institute of the Ministry of Public Security
Priority to CN201510662883.7A priority Critical patent/CN105141784A/en
Publication of CN105141784A publication Critical patent/CN105141784A/en
Pending legal-status Critical Current

Links

Abstract

The invention relates to a mobile phone evidence obtaining method based on recovery. The method comprises the following steps that (1) whether a mobile phone is connected with a computer in a fastboot mode is judged by the computer; (2) if the mobile phone is connected with the computer in the fastboot mode, recovery of the third party is reinstalled; (3) the partition of the mobile phone is mounted; (4) files in the mobile phone are derived to the computer; (5) and if there is no mobile phone connected with the computer in the fastboot mode, the step (1) is continued. The mobile phone evidence obtaining method based on recovery of the structure is adopted to perform mobile phone information reading on the Android mobile phone so that Android mobile phone information reading efficiency is greatly enhanced, data reading is complete and effective, judicial evidence obtaining and actual work demands can be effectively assisted, and thus the mobile phone evidence obtaining method based on recovery is suitable for large-scale popularization and application.

Description

Based on the Mobile Phone Forensics method of recovery
Technical field
The present invention relates to areas of information technology, particularly relate to information security, specifically refer to a kind of Mobile Phone Forensics method based on recovery.
Background technology
Present stage is for the evidence obtaining of Android intelligent, mainly contain two kinds, the first utilizes the debugging interface of Android phone or is won by storage chip by means of the technology of chip level, obtain the physics mirror image of mobile phone bottom, then the file system of physics mirror image is resolved, obtain corresponding data file, and then evidence obtaining.Another kind is by software approach, by means of the adb.exe that Google provides, also with regard to the debugging acid of Android mobile phone, connects mobile phone, by adb order, is derived by the file of required parsing.But these two kinds of methods have its weak point.For first method, very harsh to the hardware requirement of mobile phone, need the open case debugging interface of mobile phone, major part mobile phone is less than exploitation, so solved by the method for tearing machine open with regard to needing, but can destroy original evidence mobile phone obviously, and disassemble the very difficult of mobile phone, other is supported to need laboratory-scale.Another kind method also has some relatively strict restrictive conditions, such as need startup password, need ROOT, need USB to debug to open, as long as wherein some conditions do not meet, just probably cannot collect evidence to mobile phone, but these restrictions can be walked around by means of Recovery evidence obtaining work is carried out to mobile phone.
Summary of the invention
The object of the invention is the shortcoming overcoming above-mentioned prior art, provide a kind of improve Android phone information reading efficiency, digital independent complete effectively, can be directly the Mobile Phone Forensics method based on recovery that judicial evidence collection and real work demand extend efficient help.
To achieve these goals, the Mobile Phone Forensics method based on recovery of the present invention has following formation:
Should based on the Mobile Phone Forensics method of recovery, its main feature is, described method comprises the following steps:
(1) whether the mobile phone described in computer judgement is connected into computer with fastboot pattern;
(2) if described mobile phone is connected into computer with fastboot pattern, then brush into third-party recovery;
(3) subregion of the mobile phone described in carry;
(4) file on mobile phone is exported in described computer;
(5) if be connected into computer without mobile phone with fastboot pattern, then step (1) is continued.
Further, described step (1) specifically comprises the following steps:
(1.1) mobile phone described in enters fastboot pattern;
(1.2) mobile phone described in is connected to computer;
(1.3) whether the mobile phone described in the computer described in judges is connected into computer with fastboot pattern.
Further, described step (1.2) is specially:
(1.2) computer described in install with described mobile phone relative to driving;
(1.3) mobile phone described in is connected to computer.
Further, described step (1.3) is specially:
Described computer is looked into by the fastbootdevices order that Google provides and is seen if there is mobile phone and be connected into computer with fastboot pattern.
Further, described brush enters third-party recovery, specifically comprises the following steps:
(2.1) computer described in has judged whether that plurality of mobile phones is connected into computer;
(2.2) if there is plurality of mobile phones to be connected into computer, then enter recovery by fastboot-s.img order to the mobile phone brush of specifying, wherein s is handset serial;
(1.3) if only have a mobile phone to be connected into computer, then enter recovery by fastboots.img order to the mobile phone brush of specifying, wherein s is handset serial.
Further, the subregion of the mobile phone described in described carry, is specially:
Select the USB flash disk pattern under recovery pattern, under directly all subregions of mobile phone being mounted to corresponding catalogue;
Or
By specific option under selection recovery pattern, the specific subregion of carry.
Have employed the Mobile Phone Forensics method based on recovery in this invention, cellphone information reading can be carried out to Android phone, substantially increase Android phone information reading efficiency, digital independent is effectively complete, directly can extend efficient help for judicial evidence collection and real work demand, be applicable to large-scale promotion application.
Accompanying drawing explanation
Fig. 1 is the overall flow figure of the Mobile Phone Forensics method based on recovery of the present invention.
Embodiment
In order to more clearly describe technology contents of the present invention, conduct further description below in conjunction with specific embodiment.
The evidence obtaining of the Android mobile phone concrete storing data files mainly under right/data/data catalogue reads, read these files to need to obtain ROOT authority, then connect computer to read, but it is all not all right to be connected computer when there being startup password not open with USB debugging, and simple ROOT is impracticable.
Android phone provides fastboot pattern, and in Android system mobile phone, fastboot is a kind of brush machine pattern than recovery more bottom.It is exactly a kind of brush machine pattern using USB data line to connect mobile phone.Relative to some system card brush, line brush is more reliable, safety; If we claim recovery pattern to be reforestation practices, so fastboot is exactly real brush machine pattern, because the brush machine bag that official provides and Phoenix much all complete under fastboot pattern, fastboot pattern is real brush machine pattern thus.
Recovery pattern refers to a kind of pattern (being similar to windowsPE or DOS) can modified to the data of Android machine inside or system.We can brush into new Android system under this scheme, or back up existing system or upgrade, also can in this factory reset, the subregion that carry is corresponding.
The Recovery that official provides does not hang over authority, or USB debugging mode, cannot connect computer, is obtained the relevant information of mobile phone, so need to input third-party recovery by ADB.EXE.
Refer to shown in Fig. 1, evidence obtaining concrete steps:
(1) mobile phone enters fastboot pattern, and the method that different mobile phones enters fastboot pattern is different, such as millet mobile phone be by simultaneously by start and volume down fastboot pattern.The fastboot pattern of Samsung mobile phone i.e. brush machine pattern have a special title the pattern of mining for coal.
(2) connect computer, allow computer identify mobile phone.Need the website of cell phone manufacturer or third party website to download corresponding mobile phone to drive, do not drive computer to be None-identified mobile phone, it is failed for connecting computer.
(3) judge that whether mobile phone is with fastboot pattern exact connect ion computer.Utilize the fastboot.exe that Google provides, utilize fastbootdevices order to look into see if there is mobile phone to connect with fastboot pattern, if the sequence number of display mobile phone and fastboot printed words and successful connection separate with Zhi Biaofu t.
(4) brush into third-party recovery.Obtain the third party recovery.img file of corresponding mobile phone, the recovery that official provides generally can not develop adb debugging interface so inapplicable.After finding suitable IMG file, enter recovery by fastboot***.img to mobile phone brush, if there is plurality of mobile phones to connect computer simultaneously, needs to perform fastboot – s (handset serial) * * * .img and enter recovery to the mobile phone brush of specifying.If file mates, can automatically enter recovery pattern by mobile phone after brushing recovery.
(5) the mobile phone subregion that carry is corresponding.First method is the USB flash disk pattern under selection recovery pattern, under directly all subregions of mobile phone being mounted to corresponding catalogue; Second method, by option concrete under selecting recovery pattern, by specific subregion carry, as " carry data " be exactly/under subregion that data is corresponding hangs over this catalogue.The third is the shell-command calling adb, utilizes mount (hanging over catalogue) (hanging over subregion), subregion is mounted to particular category.
(6) file on mobile phone is exported to local computing to resolve.By adb.exepull (source directory) (destination directory), mobile phone file is derived.
Have employed the Mobile Phone Forensics method based on recovery in this invention, cellphone information reading can be carried out to Android phone, substantially increase Android phone information reading efficiency, digital independent is effectively complete, directly can extend efficient help for judicial evidence collection and real work demand, be applicable to large-scale promotion application.
In this description, the present invention is described with reference to its specific embodiment.But, still can make various amendment and conversion obviously and not deviate from the spirit and scope of the present invention.Therefore, specification and accompanying drawing are regarded in an illustrative, rather than a restrictive.

Claims (6)

1. based on a Mobile Phone Forensics method of recovery, it is characterized in that, described method comprises the following steps:
(1) whether the mobile phone described in computer judgement is connected into computer with fastboot pattern;
(2) if described mobile phone is connected into computer with fastboot pattern, then brush into third-party recovery;
(3) subregion of the mobile phone described in carry;
(4) file on mobile phone is exported in described computer;
(5) if be connected into computer without mobile phone with fastboot pattern, then step (1) is continued.
2. the Mobile Phone Forensics method based on recovery according to claim 1, is characterized in that, described step (1) specifically comprises the following steps:
(1.1) mobile phone described in enters fastboot pattern;
(1.2) mobile phone described in is connected to computer;
(1.3) whether the mobile phone described in the computer described in judges is connected into computer with fastboot pattern.
3. the Mobile Phone Forensics method based on recovery according to claim 2, is characterized in that, described step (1.2) is specially:
(1.2) computer described in install with described mobile phone relative to driving;
(1.3) mobile phone described in is connected to computer.
4. the Mobile Phone Forensics method based on recovery according to claim 2, is characterized in that, described step (1.3) is specially:
Described computer is looked into by the fastbootdevices order that Google provides and is seen if there is mobile phone and be connected into computer with fastboot pattern.
5. the Mobile Phone Forensics method based on recovery according to claim 1, it is characterized in that, described brush enters third-party recovery, specifically comprises the following steps:
(2.1) computer described in has judged whether that plurality of mobile phones is connected into computer;
(2.2) if there is plurality of mobile phones to be connected into computer, then enter recovery by fastboot-s.img order to the mobile phone brush of specifying, wherein s is handset serial;
(1.3) if only have a mobile phone to be connected into computer, then enter recovery by fastboots.img order to the mobile phone brush of specifying, wherein s is handset serial.
6. the Mobile Phone Forensics method based on recovery according to claim 1, it is characterized in that, the subregion of the mobile phone described in described carry, is specially:
Select the USB flash disk pattern under recovery pattern, under directly all subregions of mobile phone being mounted to corresponding catalogue;
Or
By specific option under selection recovery pattern, the specific subregion of carry.
CN201510662883.7A 2015-10-14 2015-10-14 Mobile phone evidence obtaining method based on recovery Pending CN105141784A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510662883.7A CN105141784A (en) 2015-10-14 2015-10-14 Mobile phone evidence obtaining method based on recovery

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510662883.7A CN105141784A (en) 2015-10-14 2015-10-14 Mobile phone evidence obtaining method based on recovery

Publications (1)

Publication Number Publication Date
CN105141784A true CN105141784A (en) 2015-12-09

Family

ID=54726983

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510662883.7A Pending CN105141784A (en) 2015-10-14 2015-10-14 Mobile phone evidence obtaining method based on recovery

Country Status (1)

Country Link
CN (1) CN105141784A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503539A (en) * 2016-10-13 2017-03-15 公安部第三研究所 Smart machine screen-lock password crack method and evidence-obtaining system based on Mobex agreements
CN106528688A (en) * 2016-10-25 2017-03-22 公安部第三研究所 Analysis evidence-taking method for Twitter
CN106528470A (en) * 2016-11-29 2017-03-22 维沃移动通信有限公司 Data transmission method and mobile terminal
CN106775670A (en) * 2016-11-30 2017-05-31 惠州Tcl移动通信有限公司 The making application method and kit of a kind of kit for being applied to mobile terminal
CN107066350A (en) * 2017-02-06 2017-08-18 四川秘无痕信息安全技术有限责任公司 A kind of mirror method of WindowsPhone data in mobile phone
CN108319519A (en) * 2017-12-19 2018-07-24 南京烽火软件科技有限公司 A kind of evidence-gathering and fixing means based on Android phone
CN112003982A (en) * 2020-08-12 2020-11-27 厦门市美亚柏科信息股份有限公司 Mobile phone unlocking method and system based on chip detachment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050055595A1 (en) * 2001-09-17 2005-03-10 Mark Frazer Software update method, apparatus and system
CN103559126A (en) * 2013-10-25 2014-02-05 深圳市欧珀通信软件有限公司 Method, device and computer terminal for testing software versions

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050055595A1 (en) * 2001-09-17 2005-03-10 Mark Frazer Software update method, apparatus and system
CN103559126A (en) * 2013-10-25 2014-02-05 深圳市欧珀通信软件有限公司 Method, device and computer terminal for testing software versions

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
LONGMING035889: "《安卓刷机基础普及 使用Fastboot命令秒杀一切》", 《360个人图书馆》 *
QQTZONG: "《好好利用Recovery的U盘模式》", 《台电P76TI》 *
ZHUDI1989: "《求助recovery如何挂载优盘模式》", 《机锋论坛》 *
ZXD6899: "《最详细的【Recovery】使用说明,刷机必备》", 《360个人图书馆》 *
未知: "《Recovery刷机工具v5.0.2.8中文版》", 《绿茶软件园》 *
未知: "《安卓刷机如何进入Recovery模式的通用方式详解》", 《ROM下载之家》 *
韦博华: "《Android手机Recovery模式取证方法研究》", 《信息通信》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503539A (en) * 2016-10-13 2017-03-15 公安部第三研究所 Smart machine screen-lock password crack method and evidence-obtaining system based on Mobex agreements
CN106528688A (en) * 2016-10-25 2017-03-22 公安部第三研究所 Analysis evidence-taking method for Twitter
CN106528688B (en) * 2016-10-25 2020-03-10 公安部第三研究所 Analysis evidence obtaining method aiming at Twitter
CN106528470A (en) * 2016-11-29 2017-03-22 维沃移动通信有限公司 Data transmission method and mobile terminal
CN106775670A (en) * 2016-11-30 2017-05-31 惠州Tcl移动通信有限公司 The making application method and kit of a kind of kit for being applied to mobile terminal
CN106775670B (en) * 2016-11-30 2020-09-22 惠州Tcl移动通信有限公司 Manufacturing and using method of tool kit applied to mobile terminal and tool kit
CN107066350A (en) * 2017-02-06 2017-08-18 四川秘无痕信息安全技术有限责任公司 A kind of mirror method of WindowsPhone data in mobile phone
CN107066350B (en) * 2017-02-06 2020-11-03 四川秘无痕科技有限责任公司 Mirroring method for Windows Phone mobile Phone data
CN108319519A (en) * 2017-12-19 2018-07-24 南京烽火软件科技有限公司 A kind of evidence-gathering and fixing means based on Android phone
CN112003982A (en) * 2020-08-12 2020-11-27 厦门市美亚柏科信息股份有限公司 Mobile phone unlocking method and system based on chip detachment

Similar Documents

Publication Publication Date Title
CN105141784A (en) Mobile phone evidence obtaining method based on recovery
CN102736978B (en) A kind of method and device detecting the installment state of application program
CN102520948B (en) Application maintenance update method and device
EP2076056A1 (en) Management method for intelligent terminal system and intelligent terminal
WO2011130971A1 (en) Method and mobile terminal for deleting files
CN103279706A (en) Method and device for intercepting installation of Android application program in mobile terminal
CN104199706A (en) Firmware upgrade method and device for eMMC
CN103544031B (en) The android system upgrade method and system of multi partition peripheral storage device
CN103559591A (en) Software management system and management method based on trusted computing
CN110225078B (en) Application service updating method, system and terminal equipment
US20170316209A1 (en) Method and device for preventing application in an operating system from being uninstalled
CN105718289A (en) Component relationship establishing method and equipment
CN103677880A (en) Information processing method and electronic equipment
CN101937351A (en) Method and system for automatically installing application software
CN106326171A (en) Method and device for recognizing hard disk type of hard disk back plate
CN103902480A (en) Android phone driving method and system
CN106569854B (en) Method and system for setting equipment firmware and realizing factory test
CN104216840A (en) USB (universal serial bus) setting and method and device for operating external equipment
CN102646056A (en) Function expansion method and device for grid GIS (geographic information system) platform based applications
CN107770299A (en) A kind of MAC Address writes with a brush dipped in Chinese ink method, system, device and storage medium
CN102722669B (en) Completeness verification method of operating system
CN105718788A (en) Malicious application processing method and apparatus, and terminal
CN105207830A (en) Detection method and apparatus for terminal information, and terminal
CN103455750A (en) High-security verification method and high-security verification system for embedded devices
CN103885784A (en) Method for establishing Android platform with security module and plugging function

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20151209