Chip-Off BlackBerry Z10

From ForensicsWiki
Revision as of 14:21, 9 August 2016 by Chris.klimosko (Talk | contribs) (Tear Down)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Tear Down

1Z10.JPG
  1. Remove the back panel.
  1. Remove the Battery, SIM and SD Memory Card.
  1. Using a torx-4 screw driver, remove the visible screws on the back of the phone.
2Z10.JPG
  1. Un-clip the back panel using a shim, guitar pick, or prying tool. This will expose the mainboard.
3Z10.JPG
  1. Un-clip all connectors (5) from the mainboard, and simply lift the board out of the phone.
4Z10.JPG 5Z10.JPG
  1. Remove the shield to expose the memory module. There will be epoxy on the chip so take your time, use adequate heat, and gently remove the chip from the board.
6Z10.JPG
  1. Prepare the chip for reading. Again, take your time to carefully remove the epoxy without applying too much direct heat, and consistently adding flux paste.
7Z10.JPG
  1. The chip is now ready to be read. The chip in our test phone is a Samsung KLMAG2GE4A-A001. It was read using an UP-828 Programmer with the VBGA169E adapter. The resulting .bin was parsed in UFED Physical Analyzer.
8Z10.JPG