logo elektroda
logo elektroda
X
logo elektroda

Samsung J3 2016 - Recover Data via ADB with Smashed Screen & Enabled USB Debugging

GothPony 6855 11
ADVERTISEMENT
Treść została przetłumaczona polish » english Zobacz oryginalną wersję tematu
  • #1 16247646
    GothPony
    Level 10  
    I have the phone mentioned above and the task of recovering data from it (the most important contacts). The problem is that the phone has a completely smashed screen, nor does it display or respond to touch. The good news is that the phone has usb debugging enabled. The problem is that when I connect it and try to do anything with adb commands, it turns out that on the phone you need to allow the computer to use debugging. Is this something you can do?
  • ADVERTISEMENT
  • #2 16253665
    Multi_COM
    GSM specialist
    Answering the question: You can't free ways. There are specially crafted flashes that ignore the need for such verification. In this particular model (J3 2106) you can also read (dump) even without the ADB turned on and the screen broken.
  • ADVERTISEMENT
  • #3 16259434
    GothPony
    Level 10  
    I solved the problem, it came to my website the second J3 2016 to replace the screen so I had the lcd for a moment.
  • #4 16395084
    131XIII
    Level 11  
    What is the Dump reading ??
  • ADVERTISEMENT
  • #5 16395107
    mobista
    Level 35  
    Multi_COM wrote:
    Answering the question: You can't free ways. There are specially crafted flashes that ignore the need for such verification. In this particular model (J3 2106) you can also read (dump) even without the ADB turned on and the screen broken.


    What about if the phone has FRP turned on like 90% of the phones on the market? In my opinion, this is misleading future readers of this topic.

    Added after 6 [minutes]:

    131XIII wrote:
    What is the Dump reading ??


    Dump reading is the reading of a binary image of the device's memory chip using ADB (favorable conditions required), reading via a virtual port e.g. DOWNLOAD MODE (favorable conditions required), indirect reading via JTAG (favorable conditions required), indirect reading ISP (required acceptors) conditions), ChipOff (only functional bone NOR / NAND / eMMC / eMCP / uncrypted UFS is required).
  • #6 16395132
    Multi_COM
    GSM specialist
    @mobista: I assure you that in this model we can read even if it has FRP and there is no ADB enabled - we do not load any customs or TWRP
  • #7 16395149
    mobista
    Level 35  
    Multi_COM wrote:
    @mobista: I assure you that in this model we can read even if it has FRP and there is no ADB enabled - we do not load any customs or TWRP


    Just like me and a gro of other websites in Poland. The problem is that you are writing about kernel substitution with authorization confirmation turned off in a model that has a relatively fresh SECURITY PATCH, which in my opinion generates at least a few understatements.
  • #8 16395268
    Multi_COM
    GSM specialist
    I don't upload anything to the phone, so I don't replace the Kernel via BL ...... to be precise - it can be done without undressing (without ISP, ChipOff), without ADB enabled (so we exclude the vulnerability patched in October), without replacing the kernel ( BL), without TWRP ....... maybe I will give you a bit - it will take a lot of time (16Gb reading about 40h) but it can be - to make it more precise, we did not invent the access method in such a way that does not change the fact that it can be ..

    Samsung J3 2016 - Recover Data via ADB with Smashed Screen & Enabled USB Debugging
  • #9 16395317
    mobista
    Level 35  
    And this is the correct answer :)
  • ADVERTISEMENT
  • #10 16396520
    131XIII
    Level 11  
    And what is ISP and ChipOff ??
    Sorry to ask so, but as I type in Google, I have different results
  • #11 16396662
    mobista
    Level 35  
    And what equipment do you have in the field of GSM?
  • #12 16396736
    131XIII
    Level 11  
    Cutters for sim cards for micro / nano sim, usb sim card reader, meter, soldering irons, 3m double-sided tape, screwdrivers and riff box which has a colleague
    And why do you ask??

Topic summary

The discussion revolves around recovering data from a Samsung J3 2016 with a smashed screen and enabled USB debugging. The main challenge is that the device requires authorization to allow ADB commands, which is not possible due to the screen damage. Some users suggest that it is feasible to read data even without ADB enabled or with a broken screen, using specialized methods such as dump reading, JTAG, or ChipOff techniques. Others mention that certain conditions, like having FRP (Factory Reset Protection) enabled, could complicate the recovery process. A user successfully resolved their issue by temporarily replacing the screen, allowing access to the device. The conversation also touches on the technical aspects of data recovery methods and the necessary equipment for GSM repairs.
Summary generated by the language model.
ADVERTISEMENT