Updated Android Usage (markdown)

Knugi
2023-04-25 05:34:40 +00:00
parent 30e77c00b2
commit b6017ab99c

@@ -2,7 +2,7 @@
## Unencrypted WhatsApp database ## Unencrypted WhatsApp database
Extract the WhatsApp database with whatever means, one possible means is to use the [WhatsApp-Key-DB-Extractor](https://github.com/KnugiHK/WhatsApp-Key-DB-Extractor) Extract the WhatsApp database with whatever means, one possible means is to use the [WhatsApp-Key-DB-Extractor](https://github.com/KnugiHK/WhatsApp-Key-DB-Extractor)
After you obtain your WhatsApp databse, copy the WhatsApp database and media folder to the working directory. The database is called msgstore.db. If you also want the name of your contacts, get the contact database, which is called wa.db. And copy the WhatsApp (Media) directory from your phone directly. After you obtain your WhatsApp database, copy the WhatsApp database and media folder to the working directory. The database is called msgstore.db. If you also want the name of your contacts, get the contact database, which is called wa.db. And copy the WhatsApp (Media) directory from your phone directly.
And now, you should have something like this in the working directory. And now, you should have something like this in the working directory.
@@ -13,36 +13,37 @@ Simply invoke the following command from shell.
wtsexporter -a wtsexporter -a
``` ```
## Encrypted Android WhatsApp Backup (crypt12 or crypt14) ### Encrypted Android WhatsApp Backup
In order to support the decryption, install pycryptodome if it is not installed In order to support the decryption, install pycryptodome if it is not installed
```sh ```sh
pip install pycryptodome # Or pip install pycryptodome # Or
pip install whatsapp-chat-exporter["crypt14"] # install along with this software pip install whatsapp-chat-exporter["android_backup"] # install along with this software
``` ```
#### Crypt12 or Crypt14
Place the decryption key file (key) and the encrypted WhatsApp Backup (msgstore.db.crypt14) in the working directory. If you also want the name of your contacts, get the contact database, which is called wa.db. And copy the WhatsApp (Media) directory from your phone directly. Place the decryption key file (key) and the encrypted WhatsApp Backup (msgstore.db.crypt14) in the working directory. If you also want the name of your contacts, get the contact database, which is called wa.db. And copy the WhatsApp (Media) directory from your phone directly.
And now, you should have something like this in the working directory. And now, you should have something like this in the working directory.
![Android folder structure with WhatsApp Backup](https://github.com/KnugiHK/Whatsapp-Chat-Exporter/blob/main/imgs/android_structure_backup.png) ![Android folder structure with WhatsApp Backup](imgs/android_structure_backup.png)
### Extracting #### Extracting
Simply invoke the following command from shell. Simply invoke the following command from shell.
```sh ```sh
wtsexporter -a -k key -b msgstore.db.crypt14 wtsexporter -a -k key -b msgstore.db.crypt14
``` ```
## Encrypted Android WhatsApp Backup (crypt15) #### Crypt15 (End-to-End Encrypted Backup)
In order to support the crypt15 End-to-End Encrypted Backup decryption, install pycryptodome and javaobj-py3 if they not installed To support Crypt15 backup, install javaobj-py3 if it is not installed
```sh ```sh
pip install pycryptodome javaobj-py3 # Or pip install javaobj-py3 # Or
pip install whatsapp-chat-exporter["crypt15"] # install along with this software pip install whatsapp-chat-exporter["crypt15"] # install along with this software
``` ```
Place the encrypted WhatsApp Backup (msgstore.db.crypt15) in the working directory. If you also want the name of your contacts, get the contact database, which is called wa.db. And copy the WhatsApp (Media) directory from your phone directly. Place the encrypted WhatsApp Backup (msgstore.db.crypt15) in the working directory. If you also want the name of your contacts, get the contact database, which is called wa.db. And copy the WhatsApp (Media) directory from your phone directly.
If you do not have the 32 bytes hex key (64 hexdigits), place the decryption key file (encrypted_backup.key) extracted from Android. If you gave the 32 bytes hex key, simply put the key in the shell. If you do not have the 32 bytes hex key (64 hexdigits), place the decryption key file (encrypted_backup.key) extracted from Android. If you gave the 32 bytes hex key, simply put the key in the shell.
Now, you should have something like this in the working directory (if you do not have 32 bytes hex key). Now, you should have something like this in the working directory (if you do not have 32 bytes hex key).
![Android folder structure with WhatsApp Backup](https://github.com/KnugiHK/Whatsapp-Chat-Exporter/blob/main/imgs/android_structure_backup_crypt15.png) ![Android folder structure with WhatsApp Crypt15 Backup](imgs/android_structure_backup_crypt15.png)
### Extracting ##### Extracting
If you do not have 32 bytes hex key but have the key file available, simply invoke the following command from shell. If you do not have 32 bytes hex key but have the key file available, simply invoke the following command from shell.
```sh ```sh
wtsexporter -a -k encrypted_backup.key -b msgstore.db.crypt15 wtsexporter -a -k encrypted_backup.key -b msgstore.db.crypt15
@@ -50,5 +51,4 @@ wtsexporter -a -k encrypted_backup.key -b msgstore.db.crypt15
If you have the 32 bytes hex key, simply put the hex key in the -k option and invoke the command from shell like this: If you have the 32 bytes hex key, simply put the hex key in the -k option and invoke the command from shell like this:
```sh ```sh
wtsexporter -a -k 432435053b5204b08e5c3823423399aa30ff061435ab89bc4e6713969cdaa5a8 -b msgstore.db.crypt15 wtsexporter -a -k 432435053b5204b08e5c3823423399aa30ff061435ab89bc4e6713969cdaa5a8 -b msgstore.db.crypt15
```
``` ```