Information Technology Reference
In-Depth Information
The JTAG setup
3. Once the preceding steps are complete, power must be applied to boot the CPU.
The voltage that must be applied depends on the specifications released by the
hardware manufacturer. Do not apply a voltage beyond the number mentioned in
the specification.
4. After applying the power, a full binary memory dump of the NAND flash can be
extracted.
5. Analyze the extracted data using the forensic techniques and tools learned in this
book. A raw .bin file will be obtained during the acquisition and most forensic
tools support ingestion and analysis of this image format.
It is also important to understand that the JTAG technique should not result in loss of
functionality of the device. If reassembled properly, the device should function without
any problems. Although the JTAG technique is effective in extracting the data, only ex-
Search WWH ::




Custom Search