We developed emmcpinouts.com to provide clear and tested pinout diagrams for direct eMMC dumping of locked, damaged and unsupported Android and Windows devices, satnavs, Chromebooks and more.
Learn how to safely recover evidence from locked, damaged and unsupported devices containing UFS flash memory on our Flash Memory Chip Removal course. Recently updated to include Samsung Galaxy S6 chip-off.
Knowing how to handle Write Ahead Logging (WAL) files is a key skill in investigating smartphone apps. Learn how to preserve and present evidence from WAL files on our Smartphone App Forensics training course.
It feels like time to dispel some myths about chip-off and explain how the technique is just as relevant as it’s ever been (despite BlackBerry’s demise!)
https://dev.controlf.net/wp-content/uploads/2018/07/controlf-logo.png00Richard Sladehttps://dev.controlf.net/wp-content/uploads/2018/07/controlf-logo.pngRichard Slade2016-09-21 11:59:192018-09-13 07:30:29Chip-off – isn’t that just for BlackBerrys?
Our next chip-off course 13-17 March (Leeds, UK) will feature challenging Nokia Lumia and Sony Android models which cannot be extracted using bootloader or direct eMMC techniques.
https://dev.controlf.net/wp-content/uploads/2018/07/controlf-logo.png00Richard Sladehttps://dev.controlf.net/wp-content/uploads/2018/07/controlf-logo.pngRichard Slade2016-08-30 15:24:562018-09-13 07:30:29Chip-off now includes “chip back on” !
https://dev.controlf.net/wp-content/uploads/2018/07/controlf-logo.png00Richard Sladehttps://dev.controlf.net/wp-content/uploads/2018/07/controlf-logo.pngRichard Slade2016-04-18 09:21:382018-09-13 07:30:29Making sense of Android storage areas
New eMMC Device Forensics course added to schedule – 28 Nov – 1 Dec. Perform physical extractions of locked and unsupported Android & Windows devices, TomTom units and more.
Our new eMMC Device Forensics course launches July 2016. Learn how to bypass locks and perform physical extractions of unsupported Android & Windows Phone handsets and tablets.
Learning how to write simple Python scripts will help you recover and report evidence which commercial tools don’t support. Our 3 day Python Scripting 1 course gets complete beginners up and running in Python.
https://dev.controlf.net/wp-content/uploads/2018/07/controlf-logo.png00Richard Sladehttps://dev.controlf.net/wp-content/uploads/2018/07/controlf-logo.pngRichard Slade2015-07-21 21:34:362018-09-13 07:30:29Python scripts save you time
Over 140 ‘direct eMMC’ pinout schematics on emmcpinouts.com
We developed emmcpinouts.com to provide clear and tested pinout diagrams for direct eMMC dumping of locked, damaged and unsupported Android and Windows devices, satnavs, Chromebooks and more.
Samsung Galaxy S6 chip-off
Learn how to safely recover evidence from locked, damaged and unsupported devices containing UFS flash memory on our Flash Memory Chip Removal course. Recently updated to include Samsung Galaxy S6 chip-off.
Understanding Write Ahead Logging in SQLite
Knowing how to handle Write Ahead Logging (WAL) files is a key skill in investigating smartphone apps. Learn how to preserve and present evidence from WAL files on our Smartphone App Forensics training course.
Chip-off – isn’t that just for BlackBerrys?
It feels like time to dispel some myths about chip-off and explain how the technique is just as relevant as it’s ever been (despite BlackBerry’s demise!)
Chip-off now includes “chip back on” !
Our next chip-off course 13-17 March (Leeds, UK) will feature challenging Nokia Lumia and Sony Android models which cannot be extracted using bootloader or direct eMMC techniques.
New website makes “direct eMMC” (ISP) dumping easier
We’ve launched emmcpinouts.com to help make it easier to get physical extractions from locked and unsupported handsets, tablets and satnavs
Making sense of Android storage areas
Trying to figure out where
/mnt/shell/emulated/0
actually is on an Android device? Our Android folder paths for microSD and eMMC storage page should help2nd eMMC Device Forensics course sold out!
New eMMC Device Forensics course added to schedule – 28 Nov – 1 Dec. Perform physical extractions of locked and unsupported Android & Windows devices, TomTom units and more.
New eMMC Device Forensics course
Our new eMMC Device Forensics course launches July 2016. Learn how to bypass locks and perform physical extractions of unsupported Android & Windows Phone handsets and tablets.
Python scripts save you time
Learning how to write simple Python scripts will help you recover and report evidence which commercial tools don’t support. Our 3 day Python Scripting 1 course gets complete beginners up and running in Python.
SQLite everywhere!
Learn how to find and report key evidence from SQLite databases recovered from smartphone devices on our 4½ day Smartphone App Forensics course
Advanced Smartphone & Tablet Acquisition course success
Our Advanced Smartphone & Tablet Acquisition course is going down a treat. Learn how to bypass security mechanisms & exploit device backups on our next course.