It will either have to be JTAG'ed or booted with a forensic bootloader using the UFED Cellebrite. Not sure whether the i9001 is supported, I've done a few i9000's with the UFED now.
Be careful if you are going to JTAG the device with a RIFF box or similar as the nand memory is strange to access on an i9000, if you don't tell it which part of ROM1 (as it shows it) to read you may end up just reading the wrong bit of the memory where the pictures are stored, not the system and swipe pattern.
Do you know how to find and decode the hash? If not look it up on the CCL website
↧