{"id":2706,"date":"2017-05-02T07:18:15","date_gmt":"2017-05-02T11:18:15","guid":{"rendered":"https:\/\/www.digitalforensicscorp.com\/blog\/?p=2706"},"modified":"2024-12-11T18:37:20","modified_gmt":"2024-12-11T18:37:20","slug":"creating-physical-dumps-and-unlocking-android-lg-phones","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/software\/creating-physical-dumps-and-unlocking-android-lg-phones\/","title":{"rendered":"Creating physical dumps and unlocking Android LG phones"},"content":{"rendered":"<p>Sometimes a question is asked at forensic conferences and on Internet sites: &#8220;Is it possible to create a complete copy of the memory of a mobile device without superuser&#8217;s privileges (i.e. create a full copy of the memory of the&#8221; non-rooted &#8220;mobile device)?&#8221; Yes, it is possible. You can use hardware methods to create a complete copy of the memory of such a device: a method of connecting to a device using the testing and debugging interface (JTAG interface), or a method of reading data directly from a memory chip (\u201cchip-off\u201d method) as well as software methods. Using software methods that typically exploit various vulnerabilities in system software you can extract data from mobile devices without having root privileges. This is possible for modern LG devices and a number of other devices, for example, devices that use &#8220;MTK&#8221; processors (MediaTek Inc.). In this article, we&#8217;ll talk about how to make a complete copy of the memory of a LG mobile device without having superuser\u2019s rights, and discuss a number of other features of expert&#8217;s work with LG mobile devices.<\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p>LG has developed a technology that greatly simplifies the replacement of system firmware in the device. This technology is called &#8220;LAF&#8221; (LG Advanced Flash). Initially, LAF technology was developed for LG service centers. In particular, it allowed to restore \u00a0working capacity of LG mobile devices \u00a0which do not turn on and do not react to attempts to turn them on (often mobile devices go into this state when trying to increase user&#8217;s privileges in their operating system or in the case of errors in updating the system software produced by Unqualified users).However, a large number of utilities that use this technology appeared quite quickly outside specialized service centers for flashing the modified system software of LG mobile devices.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>LAF protocol<\/strong><\/p>\n<p>LAF documentation is the property of LG and was not published in open access. However, there are enthusiasts who conducted the reverse development of proprietary files &#8220;Send_Command.exe&#8221;, &#8220;LGD855_20140526_LGFLASHv160.dll&#8221; and received the following data [1]:<\/p>\n<p>&nbsp;<\/p>\n<p>LAF is a simple request \/ response protocol that works via USB interface. Each message consists of a header followed by a body. The header contains 32-bit words. The integers are coded in direct sequence.<\/p>\n<p>&nbsp;<\/p>\n<p>Structure of the message<\/p>\n<table width=\"641\">\n<tbody>\n<tr>\n<td width=\"160\">Offset\u00a0 (in hexadecimal)<\/td>\n<td width=\"160\">Offset (in decimal)<\/td>\n<td width=\"160\"><strong>type<\/strong><\/td>\n<td width=\"160\"><strong>description<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"160\">0\u044500<\/td>\n<td width=\"160\">0<\/td>\n<td width=\"160\">Variable type<\/td>\n<td width=\"160\">command<\/td>\n<\/tr>\n<tr>\n<td width=\"160\">0\u044504<\/td>\n<td width=\"160\">4<\/td>\n<td width=\"160\">Variable<\/td>\n<td width=\"160\">Argument 1<\/td>\n<\/tr>\n<tr>\n<td width=\"160\">0\u044508<\/td>\n<td width=\"160\">8<\/td>\n<td width=\"160\">Variable<\/td>\n<td width=\"160\">Argument 2<\/td>\n<\/tr>\n<tr>\n<td width=\"160\">0\u04450\u0441<\/td>\n<td width=\"160\">12<\/td>\n<td width=\"160\">Variable<\/td>\n<td width=\"160\">Argument 3<\/td>\n<\/tr>\n<tr>\n<td width=\"160\">0\u044510<\/td>\n<td width=\"160\">16<\/td>\n<td width=\"160\">Variable<\/td>\n<td width=\"160\">Argument 4<\/td>\n<\/tr>\n<tr>\n<td width=\"160\">0\u044514<\/td>\n<td width=\"160\">20<\/td>\n<td width=\"160\">integer<\/td>\n<td width=\"160\">Message length<\/td>\n<\/tr>\n<tr>\n<td width=\"160\">0\u044518<\/td>\n<td width=\"160\">24<\/td>\n<td width=\"160\">integer<\/td>\n<td width=\"160\">Check sum (CRC-16)<\/td>\n<\/tr>\n<tr>\n<td width=\"160\">0\u04451\u0441<\/td>\n<td width=\"160\">28<\/td>\n<td width=\"160\">Variable type<\/td>\n<td width=\"160\">Bitwise inversion of the instruction by offset 0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>LAF instructions<\/p>\n<p>&nbsp;<\/p>\n<p>List of identified instructions:<\/p>\n<table width=\"640\">\n<tbody>\n<tr>\n<td width=\"320\"><strong>command<\/strong><\/td>\n<td width=\"320\"><strong>description<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"320\">OPEN<\/td>\n<td width=\"320\">To open the file<\/td>\n<\/tr>\n<tr>\n<td width=\"320\">CLSE<\/td>\n<td width=\"320\">To close the file<\/td>\n<\/tr>\n<tr>\n<td width=\"320\">HELO<\/td>\n<td width=\"320\">Hello. Sends the version of the communication protocol.<\/td>\n<\/tr>\n<tr>\n<td width=\"320\">CTRL<\/td>\n<td width=\"320\">Control. Depending on the argument, it reboots or turns off the device.<\/td>\n<\/tr>\n<tr>\n<td width=\"320\">WRTE<\/td>\n<td width=\"320\">Writing a file. Depending on the argument, it writes a file descriptor, a data block (multiple of 512 bytes), it writes a block of a certain length from the specified offset.<\/td>\n<\/tr>\n<tr>\n<td width=\"320\">READ<\/td>\n<td width=\"320\">Reading the file. Depending on the argument, it reads a file descriptor, a data block (multiple of 512 bytes), a block of a certain length or reads a block of a certain length from the specified offset.<\/td>\n<\/tr>\n<tr>\n<td width=\"320\">ERSE<\/td>\n<td width=\"320\">Erasing. Depending on the argument, it erases the file descriptor, data block (multiple of 512 bytes), it erases the block length from the specified offset.<\/td>\n<\/tr>\n<tr>\n<td width=\"320\">EXEC<\/td>\n<td width=\"320\">Executable \u00a0command.<\/td>\n<\/tr>\n<tr>\n<td width=\"320\">INFO<\/td>\n<td width=\"320\">Requesting or setting properties (depending on the argument).<\/td>\n<\/tr>\n<tr>\n<td width=\"320\">UNLK<\/td>\n<td width=\"320\">Delete the file.<\/td>\n<\/tr>\n<tr>\n<td width=\"320\">RSVD<\/td>\n<td width=\"320\">Making a reservation.<\/td>\n<\/tr>\n<tr>\n<td width=\"320\">IOCT<\/td>\n<td width=\"320\">The purpose is not set.<\/td>\n<\/tr>\n<tr>\n<td width=\"320\">MISC<\/td>\n<td width=\"320\">The purpose is not set<\/td>\n<\/tr>\n<tr>\n<td width=\"320\">KILO<\/td>\n<td width=\"320\">The purpose is not set<\/td>\n<\/tr>\n<tr>\n<td width=\"320\">DIFF<\/td>\n<td width=\"320\">The purpose is not set<\/td>\n<\/tr>\n<tr>\n<td width=\"320\">USB layer<\/td>\n<td width=\"320\">\u00a0It installs two consecutive virtual ports: LGANDNETMDM0 and LGANDNETDIAG1. LGANDNETDIAG1 port is used for &#8220;LAF&#8221;.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Boot Mode<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>The main conditions for the successful creation of a complete copy of the memory of a LG mobile device and transferring the device to the Download Mode are:<\/p>\n<p>1) Installing the latest driver for mobile devices, LG<\/p>\n<p>2) Following the instructions for transferring the device to the Boot Mode.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2698 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001.png\" alt=\"\" width=\"662\" height=\"530\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001.png 662w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-300x240.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-512x410.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-16x13.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-32x26.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-28x22.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-56x45.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-64x51.png 64w\" sizes=\"auto, (max-width: 662px) 100vw, 662px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 1. Instructions for transferring a LG mobile device to the &#8220;Oxygen Forensic Suite&#8221; download mode<\/p>\n<p>There is an alternative instruction for transferring a LG mobile device to the Download Mode published on the site &#8220;LG Download Mode utility and documentation&#8221; [1]<\/p>\n<ol>\n<li>Turn off the mobile device.<\/li>\n<li>Connect the mobile device to the computer using the USB cable.<\/li>\n<li>Press and hold the volume up key.<\/li>\n<li>Click on the &#8220;Start&#8221; (&#8220;Power&#8221;) button.<\/li>\n<li>Wait for the mobile device to display the message &#8220;Download mode&#8221;.<\/li>\n<li>Release the volume up key. You should see the inscription on the screen of the mobile device: &#8220;Firmware Update&#8221; (&#8220;Firmware Update&#8221;).<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2699 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/05\/Fig002.png\" alt=\"\" width=\"468\" height=\"308\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig002.png 468w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig002-300x197.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig002-16x11.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig002-32x21.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig002-28x18.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig002-56x37.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig002-64x42.png 64w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig002-184x120.png 184w\" sizes=\"auto, (max-width: 468px) 100vw, 468px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 2. The image on the LG phone screen switched into the &#8220;Firmware Update&#8221; mode.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Creating a physical dump <\/strong><\/p>\n<p>To create a full copy of the memory of the LG mobile device you must:<\/p>\n<p>Run the Data Extraction Wizard and select the option &#8220;LG Android dump&#8221;:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2700 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003.png\" alt=\"\" width=\"663\" height=\"531\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003.png 663w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003-300x240.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003-512x410.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003-16x13.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003-32x26.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003-28x22.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003-56x45.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003-64x51.png 64w\" sizes=\"auto, (max-width: 663px) 100vw, 663px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 3. The main window of the Data Extraction Wizard<\/p>\n<p>Then you need to use the instructions in the &#8220;Download Mode&#8221; section of this article.<\/p>\n<p>&nbsp;<\/p>\n<p>After that click on the button &#8220;Next&#8221; and after a short time you will see that the device is connected to the Data Extraction Wizard and you can go directly to creating a full copy of the mobile device&#8217;s memory.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2701 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004.png\" alt=\"\" width=\"660\" height=\"532\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004.png 660w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004-300x242.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004-512x413.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004-16x13.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004-32x26.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004-28x23.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004-56x45.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004-64x52.png 64w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 4. Image of the Data Extraction Wizard window with a connected mobile device LG<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2702 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/05\/Fig005.png\" alt=\"\" width=\"662\" height=\"528\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig005.png 662w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig005-300x239.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig005-512x408.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig005-16x13.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig005-32x26.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig005-28x22.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig005-56x45.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig005-64x51.png 64w\" sizes=\"auto, (max-width: 662px) 100vw, 662px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 5. The process of creating a full copy of the mobile device&#8217;s memory<\/p>\n<p><strong>Disabling screen lock<\/strong><\/p>\n<p>You can disable the screen lock for LG mobile devices. It does not matter which type of lock is set by the device owner: PIN, pattern, or fingerprint access.<\/p>\n<p>To perform this operation the option &#8220;Unlock the screen lock&#8221; is selected in the main window of the Data Extraction Wizard.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2703 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006.png\" alt=\"\" width=\"360\" height=\"63\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006.png 360w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006-300x53.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006-16x3.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006-32x6.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006-28x5.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006-56x10.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006-64x11.png 64w\" sizes=\"auto, (max-width: 360px) 100vw, 360px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 6. The item &#8220;Unlocking the screen&#8221;<\/p>\n<p>Then follow the instructions of the Data Extraction Wizard.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2704 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007.png\" alt=\"\" width=\"739\" height=\"260\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007.png 739w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-300x106.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-512x180.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-16x6.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-32x11.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-28x10.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-56x20.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-64x23.png 64w\" sizes=\"auto, (max-width: 739px) 100vw, 739px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 7. Instructions for the Data Extraction Wizard that are required to unlock the phone screen<\/p>\n<p>When the program is running, it gives a command \u2018unlock device\u2019 to the LG phone. After that the phone will be unlocked. Changing other data of the system section of the mobile device does not occur.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>The peculiarity of the approach to the devices with Android 6 operating system <\/strong><\/p>\n<p>When examining mobile devices running the Android operating system version 6, the expert may encounter the following problems:<\/p>\n<ol>\n<li>Encrypting the section with user data (&#8220;userdata&#8221;). Although this option is disabled by default, in the course of mobile devices research devices with an encrypted logical section of the user (&#8220;userdata&#8221;) are more common. Approaches to deciphering such sections will be considered in a separate article.<\/li>\n<li>Data storage in the cloud. In mobile devices with the Android operating system version 6, it is possible to save application data not in the phone&#8217;s memory, but in the cloud [2]. Therefore, the process of extracting user data from a mobile device may fail due to the fact that initially this data was not stored in the device. In this situation, you can use the functionality of the program &#8220;Mobile forensics&#8221;, which allows you to restore users\u2019 names and passwords from cloud storage (or to find cloud storage tokens in your device) and access the device data stored in the clouds.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>Getting a full copy of the mobile device&#8217;s memory and learning <a href=\"https:\/\/www.digitalforensics.com\/blog\/software\/extracting-data-from-a-locked-android-device\/\">how to access files on a locked Android device<\/a> are important steps in obtaining meaningful information when investigating cases. This article explored how to get a full copy of the LG mobile device&#8217;s memory without having superuser privileges and how to access the data of a locked LG mobile device, regardless of the type of lock installed by the device owner. Features of working with mobile devices running the Android 6 operating system have been considered.<\/p>\n<p>&nbsp;<\/p>\n<p>Sources:<\/p>\n<ol>\n<li>LG Download Mode utility and documentation https:\/\/github.com\/Lekensteyn\/lglaf<\/li>\n<li>Auto Backup for Apps https:\/\/developer.android.com\/guide\/topics\/data\/autobackup.html<\/li>\n<\/ol>\n<p>Authors:<\/p>\n<p><a href=\"https:\/\/linkedin.com\/in\/igormikhaylovcf\">Igor Mikhaylov<\/a> &amp; <a href=\"https:\/\/linkedin.com\/in\/oleg-skulkin\">Oleg Skulkin<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Sometimes a question is asked at forensic conferences and on Internet sites: &#8220;Is it possible to create a&hellip;","protected":false},"author":126,"featured_media":2705,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[6],"tags":[],"class_list":{"0":"post-2706","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-software","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Creating physical dumps and unlocking Android LG phones<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/software\/creating-physical-dumps-and-unlocking-android-lg-phones\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Creating physical dumps and unlocking Android LG phones\" \/>\n<meta property=\"og:description\" content=\"Sometimes a question is asked at forensic conferences and on Internet sites: &#8220;Is it possible to create a&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/software\/creating-physical-dumps-and-unlocking-android-lg-phones\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-02T11:18:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-11T18:37:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig008.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"509\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Viktor Sobiecki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Viktor Sobiecki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/creating-physical-dumps-and-unlocking-android-lg-phones\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/creating-physical-dumps-and-unlocking-android-lg-phones\\\/\"},\"author\":{\"name\":\"Viktor Sobiecki\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\"},\"headline\":\"Creating physical dumps and unlocking Android LG phones\",\"datePublished\":\"2017-05-02T11:18:15+00:00\",\"dateModified\":\"2024-12-11T18:37:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/creating-physical-dumps-and-unlocking-android-lg-phones\\\/\"},\"wordCount\":1338,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/creating-physical-dumps-and-unlocking-android-lg-phones\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/Fig008.png\",\"articleSection\":[\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/creating-physical-dumps-and-unlocking-android-lg-phones\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/creating-physical-dumps-and-unlocking-android-lg-phones\\\/\",\"name\":\"Creating physical dumps and unlocking Android LG phones\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/creating-physical-dumps-and-unlocking-android-lg-phones\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/creating-physical-dumps-and-unlocking-android-lg-phones\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/Fig008.png\",\"datePublished\":\"2017-05-02T11:18:15+00:00\",\"dateModified\":\"2024-12-11T18:37:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/creating-physical-dumps-and-unlocking-android-lg-phones\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/creating-physical-dumps-and-unlocking-android-lg-phones\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/creating-physical-dumps-and-unlocking-android-lg-phones\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/Fig008.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/Fig008.png\",\"width\":800,\"height\":509},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/creating-physical-dumps-and-unlocking-android-lg-phones\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Creating physical dumps and unlocking Android LG phones\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\",\"name\":\"Viktor Sobiecki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"caption\":\"Viktor Sobiecki\"},\"description\":\"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.\",\"sameAs\":[\"https:\\\/\\\/www.digitalforensics.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/viktor-sobiecki\\\/\"],\"honorificPrefix\":\"Dr\",\"jobTitle\":\"Chief Technology Officer (CTO)\",\"worksFor\":\"Digital Forensics Corporation\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/visor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Creating physical dumps and unlocking Android LG phones","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/software\/creating-physical-dumps-and-unlocking-android-lg-phones\/","og_locale":"en_US","og_type":"article","og_title":"Creating physical dumps and unlocking Android LG phones","og_description":"Sometimes a question is asked at forensic conferences and on Internet sites: &#8220;Is it possible to create a&hellip;","og_url":"https:\/\/www.digitalforensics.com\/blog\/software\/creating-physical-dumps-and-unlocking-android-lg-phones\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2017-05-02T11:18:15+00:00","article_modified_time":"2024-12-11T18:37:20+00:00","og_image":[{"width":800,"height":509,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig008.png","type":"image\/png"}],"author":"Viktor Sobiecki","twitter_card":"summary_large_image","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Viktor Sobiecki","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/creating-physical-dumps-and-unlocking-android-lg-phones\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/creating-physical-dumps-and-unlocking-android-lg-phones\/"},"author":{"name":"Viktor Sobiecki","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce"},"headline":"Creating physical dumps and unlocking Android LG phones","datePublished":"2017-05-02T11:18:15+00:00","dateModified":"2024-12-11T18:37:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/creating-physical-dumps-and-unlocking-android-lg-phones\/"},"wordCount":1338,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/creating-physical-dumps-and-unlocking-android-lg-phones\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig008.png","articleSection":["Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/creating-physical-dumps-and-unlocking-android-lg-phones\/","url":"https:\/\/www.digitalforensics.com\/blog\/software\/creating-physical-dumps-and-unlocking-android-lg-phones\/","name":"Creating physical dumps and unlocking Android LG phones","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/creating-physical-dumps-and-unlocking-android-lg-phones\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/creating-physical-dumps-and-unlocking-android-lg-phones\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig008.png","datePublished":"2017-05-02T11:18:15+00:00","dateModified":"2024-12-11T18:37:20+00:00","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/creating-physical-dumps-and-unlocking-android-lg-phones\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/software\/creating-physical-dumps-and-unlocking-android-lg-phones\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/creating-physical-dumps-and-unlocking-android-lg-phones\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig008.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig008.png","width":800,"height":509},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/creating-physical-dumps-and-unlocking-android-lg-phones\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims","item":"https:\/\/www.digitalforensics.com\/blog\/software\/"},{"@type":"ListItem","position":3,"name":"Creating physical dumps and unlocking Android LG phones"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce","name":"Viktor Sobiecki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","caption":"Viktor Sobiecki"},"description":"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.","sameAs":["https:\/\/www.digitalforensics.com\/","https:\/\/www.linkedin.com\/in\/viktor-sobiecki\/"],"honorificPrefix":"Dr","jobTitle":"Chief Technology Officer (CTO)","worksFor":"Digital Forensics Corporation","url":"https:\/\/www.digitalforensics.com\/blog\/author\/visor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/2706","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/126"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=2706"}],"version-history":[{"count":2,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/2706\/revisions"}],"predecessor-version":[{"id":14806,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/2706\/revisions\/14806"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/2705"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=2706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=2706"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=2706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}