Data recovery software industry is sometimes plagued with misinformation and also with companies that push their software with false pretenses. They shamelessly pay YouTubers to lie to their viewers. Watch us expose some of these lies in a 3 part expose.
We received this case from one of our partners. The phone was password locked and the screen was smashed. After attempting to gain access via USB, we have decided to use another known method called ISP (in-system programming). This way we can avoid the risk of a chip off and chip damage. Watch our master technician Krzysztof in his element.
This case came in about a month ago, it was quite intriguing as we have seen this exact problem many times, but not the failure that was caused by the problem.
The failure point was the controller caused by a shorted capacitor. In most cases, the shorten capacitor does not kill the controller but in this case, it did. The heat and prolonged-time have completely killed the controller and we had to recover the data using Rusolut VNR.
Watch how our master technician Krzysztof manages to recover this data, explaining each step.
This case was quite interesting. We received this strange broken flash drive that used an eMMC chip as its storage chip, what was more strange, is that the USB drive also contained an external controller. This type of configuration is unique, this is due to the fact that the eMMC chip already comes with an embedded controller, and the external controller was either redundant or was there for a different reason.
After some investigation, we discovered that the controller had a purpose and it was to act as a USB 3.0 bridge and to encrypt the data between the eMMC and the host.
Watch our video below and see how we managed to save thousands of encrypted documents by using a donor flash drive.
In this new video, we employ new checkm8 exploit combined with Cellebrite UFED, to gain access into a password protected iPhone and perform a BFU (Before First Unlock) extraction. And then compare the results with an iPhone for which a password is provided. While this extraction is very limited, it is at most important for forensic purposes. Watch the video below to find out more.