Physical Extraction (LG Hack)
The "LG Hack" feature works on all LG smartphones with the new version of LG LAF protocol (this is a service download mode similar to Samsung Odin download mode) One of the first devices to feature this version was the first LG G flagship.
Every LG smartphone from the year 2013 and newer should therefore support our LG hack.
With some of them - LG G4 for example - you are even able to browse the phone's filesystem via the "Browse Phone" option in Forensic Express.
There is a way that you may be able to extract a physical image from LG phones without root access (rooting the phone).
This exploit takes advantage of "LG Flash Mode" - used primarily for updating firmware.
MOBILedit Forensic Express is capable of performing this procedure, and can guide you through the process step by step:
On the start page click on "Hack phone".
Select "Get physical dump from LG phone".

- Follow the on-screen guide as seen in the pictures below.







- You can see the physical image is being extracted on the next screen. This may take a while, depending on the amount of data stored in your device.

Related Articles
Physical extraction
MOBILedit Forensic Express can perform physical extraction to create a bit-by-bit image of the data in the phone. Please note: physical acquisition and analysis is available only in the unlimited phone license; the single-phone license does not ...
Physical Extraction (EDL Hack)
There is a way of extracting physical images from phones with Qualcomm chipsets without root access (rooting the phone). This exploit method does not work on all Qualcomm-equipped devices. MOBILedit Forensic Express has implemented this feature and ...
Physical Extraction (MTK Hack)
There is a way of extracting physical image from phones with MediaTek chipsets without root access (rooting the phone). This exploit method does not work on all MTK-equipped devices, but sometimes it is the only way of acquiring the physical image ...
Rooting a device (Dirty cow)
If you have a device that has an Android version up to 7 then you can try to root your device with a Dirty cow exploit. This is a temporary root and will be gone once you will restart your device 1. Click on "Hack phone" and choose "Root using ...
Data - data extraction log
Following tab displays information about ongoing extraction: if you select the Data Extraction Log option in the Specific selection, you will get a brief resume of the extraction tab in your report as well: