When examining an Android phone, we have to overcome some barriers first so that we could extract data from it without fail. Usually the scenario is that Suspect's phone got pattern lock / password lock and you are not sure if USB Debug mode is ON or Off.

So you connect this phone to your forensic workstation or phone extraction equipment, but guess what? A message popup as below:

Because the phone is locked so you could not see what really pops up on its screen, let me show you what it is as below:

You must check "Always allow from this computer" to build "Trust" relationship between this phone and your computer first.  But before that you should unlock the phone first...so that you could the prompt on the screen...that becomes a "Dilemma"...

Some will say that don't worry, let's check support list first, let's see if got support physical extraction / logical extraction / bootloader bypass...But what if Suspect's phone is not in the support list?

Let me show you how to solve this problem. All you need is to replace "Recovery Area" by flahsing TWRP/CWM Recovery ROM, and you could enter recovery mode to manpulate its powerful third party functions.

Basically it won't affect "User Area", you don't have to worry about data loss. Somehow there is stiill a little risk if you could not flash Recovery IMG successfully, the phone maybe "bricked". Practice makes perfect. You need to believe in yourself.

Then what? Use your imagination. Now you could update SuperSU zip file and got Root permissions. Worry about risk? Of course you could buy a same model phone to do a test firest. Once successed and you could do the same thing on Susupect's phone. Finally you could unlock any lock and see any prompt on the screen. No more barriers will stop you from extracting data on Android phones.

It still depends on how much you want the data of Suspect's phone. You could just say that model is not on the list, and there is nothing you could do about this phone. Or you could try every possible method in order to extract data from Suspect's phone, to restore the truth, to reveal the Justice.

Overcome the Dilemma of "unlock" and "trust"的更多相关文章

  1. Mastering Creativity:A brief guide on how to overcome creative blocks

    MASTERING CREATIVITY, 1st EditionThis guide is free and you are welcome to share it withothers.From ...

  2. 打开程序总是会提示“Enter password to unlock your login keyring” ,如何成功关掉?

    p { margin-bottom: 0.1in; line-height: 120% } 一.一开始我是按照网友所说的 : rm -f ~/.gnome2/keyrings/login.keyrin ...

  3. LOCK TABLES和UNLOCK TABLES与Transactions的交互

    LOCK TABLES对事务不安全,并且在试图锁定表之前隐式提交任何活动事务. UNLOCK TABLES只有在LOCK TABLES已经获取到表锁时,会隐式提交任何活动事务.对于下面的一组语句,UN ...

  4. [LeetCode] Android Unlock Patterns 安卓解锁模式

    Given an Android 3x3 key lock screen and two integers m and n, where 1 ≤ m ≤ n ≤ 9, count the total ...

  5. 【Java并发编程实战】-----“J.U.C”:ReentrantLock之三unlock方法分析

    前篇博客LZ已经分析了ReentrantLock的lock()实现过程,我们了解到lock实现机制有公平锁和非公平锁,两者的主要区别在于公平锁要按照CLH队列等待获取锁,而非公平锁无视CLH队列直接获 ...

  6. salesforce 零基础学习(四十五)Approval Lock & UnLock相关注意事项

    我们都知道,当一条记录进入审批流程以后会自动加锁,apex提供Approval类的lock和unlock方法可以让我们使用代码对记录进行加锁和解锁. 项目中遇到一个需求,需要当某种情况下对记录进行先解 ...

  7. Leetcode: Android Unlock Patterns

    Given an Android 3x3 key ≤ m ≤ n ≤ , count the total number of unlock patterns of the Android lock s ...

  8. Qt qml 模拟iphone slide to unlock 的聚光动画文字效果

    模拟iphone slide to unlock 的聚光动画文字效果    /底层放淡文字    /前景放高亮文字+半透明遮罩    /动画移动遮罩 Author: surfsky.cnblogs.c ...

  9. EX:The underlying connection was closed: Could not establish trust relationship for the SSL/TLS secure channel.

    EX:The underlying connection was closed: Could not establish trust relationship for the SSL/TLS secu ...

随机推荐

  1. 转--Android按钮单击事件的四种常用写法总结

    这篇文章主要介绍了Android按钮单击事件的四种常用写法总结,比较了常见的四种写法的优劣,有不错的参考借鉴价值,需要的朋友可以参考下     很多学习Android程序设计的人都会发现每个人对代码的 ...

  2. Input gameobject vector3 c#

    Input类中的常用方法 bool w=Input.GetKey(KeyCode.W);//检测是否按下键盘W Input.GetKeyDown(KeyCode.W);//表示检测按下时 Input. ...

  3. 树莓派+qt+opencv

    树莓派:Qt开发套件和opencv安装sudo apt-get install qt4-dev-tools libqt4-dev 不用qt core 的话,其实只要按照 qt4-qmake就行了(只做 ...

  4. linux中deb怎样安装

    deb是Debian Linux的安装格式,跟Red Hat的rpm非常相似,最基本的安装命令是:dpkg -i file.debdpkg 是Debian Package的简写,是为Debian 专门 ...

  5. JAVA集合小结

    下面是我自己画的,关系画得没上面好,但我自己看着清楚些 还有一张下载来的:   有序否 允许元素重复否 Collection 否 是 List 是 是 Set AbstractSet 否 否 Hash ...

  6. Android牟利之道(一)--界面嵌入有米广告

    经过了一番折腾,忙忙碌碌了一下午,终于搞明白了Android软件界面嵌入广告的方法,以下我以嵌入有米广告为例小结一下: 我的新浪微博(wind瑞):http://weibo.com/tianrui19 ...

  7. 关于DevExpress的GridView.VisibleIndex的赋值问题

    在DevExpress GridControl中,GridView中 如果VisibleIndex=-1,则这列将不会显示(不可见): 如果VisibleIndex>=0,则按照VisibleI ...

  8. spring声明式事务

    一.传统事务 二.通过spring配置完成事务: 1.配置spring,加入spring的jar包,加入spring的配置文件 2.配置数据源,这里使用c3p0,加入c3p0 jar包和mysql数据 ...

  9. webstrom配置node环境一张图片说明问题

  10. VB6的命令行参数

    在DOS窗口下执行如下命令: C:\Program Files\Microsoft Visual Studio\VB98>vb6 /?