My Goal: Extract my phones stock firmware (specifically boot/recovery image) during an OTA update from manufacturer.
Why I Want To: I've been trying to get root access or flash a custom recovery on another phone I recently got. Its a UMX Model U693CL phone provided through assurance wireless (Obama-Phone). I've done almost all the troubleshooting and researching within my skill set to figure this out. After no luck with calling the company to find out how/where to download the firmware and finding nothing available on the internet, I've hit a dead end.
Steps I've Taken:
Called Assurance Wireless asking for stock firmware downloads or where to get them...no help. Despite this phone being shipped with bootloader unlocked...they seem very eager to prevent the end-user from utilizing the feature.
Searched personally online to see if anyone has done this before, as well as any forums for Android development...XDA does have threads however it's regarding the previous UMX model U683CL phone (I have U693CL)
I've done some of my own troubleshooting and "trial and error" investigating using ADB/Fastboot via my laptop and a secondary Android.
I did read online about using recovery software on a PC to extract firmware... However the programs mentioned seem to have a high affinity for malicious clones and/or seem too outdated. The most common ones mentioned are "QPST" or some sort of "Qualcomm Recovery Software" After having to restore my laptop multiple times from getting viruses for downloading/installing a few of those programs I switched my approach.
What I'm REALLY asking:
I'm not asking you to solve this for me. I use these situations as a way to learn. While I do know SOME things, I do like to keep a beginner's mindset/attitude. When you stop learning, you stop growing...the worst attitude to have is one where you've got nothing left to learn.
That said I'd like to first have these questions answered:
While I know packets can be monitored/intercepted/injected/etc...is it possible do the same for a file that's being uploaded/downloaded?
In that case, could I simply replicate an equivalent MITM attack scenario and adjust some things? For example, identify the file and either "redirect" to be downloaded elsewhere? Or if I proxy traffic through another device...can I "duplicate" the download onto the device hosting the proxy traffic while still sending everything to the original device? And if so...can it be detected? Or noticed?
Do OTA updates actually send the file directly to the device like I'm pulling a file from my Google Drive? Is there encryption involved or tunneling used to prevent someone from altering anything during transit?
Maybe I'm complicating this and overthinking...is there software already that allows me to extract the stock firmware via USB on a PC? Outside of the Qualcomm programs I mentioned, I'm not familiar with any software that's universal. Unfortunately this phone has little support from my research...
I know I could have gotten the same results using 1/4 of the words... I'm hoping to come across as someone who appreciates "the journey" asking for expertise/knowledge and not someone who's lazy and just cares about the result. Thanks #nuc13us