Skip to content

Decrypt an encrypted iOS 13+ backup created by iTunes on Windows. Customized for WhatsApp-Chat-Exporter

License

Notifications You must be signed in to change notification settings

KnugiHK/iphone_backup_decrypt

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

24 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

iphone-backup-decrypt

Decrypt an encrypted, local (i.e. non-iCloud), iPhone backup created from iOS13 or newer. This code is mainly a wrapper for this StackOverflow answer, itself based on the iphone-dataprotection code.

This fork is customized for WhatsApp-Chat-Exporter.

Install

Requires Python 3.4 or higher.

The code requires a cryptographic library providing the Crypto name. Use pycryptodome (but note that this clashes with pycrypto, if that is already installed).

The backup decryption keys are protected using 10 million rounds of PBKDF2 with SHA256, then 10 thousand further iterations of PBKDF2 with SHA-1. To speed up decryption, fastpbkdf2 is desirable; otherwise the code will fall back to using standard library functions. The fallback is much slower, but does not require the complicated build and install of fastpbkdf2.

Ideal dependencies:

pip install biplist pycryptodome fastpbkdf2

Minimal required dependencies (automatically installed):

pip install biplist pycryptodome

Install directly from GitHub via pip:

pip install git+https://github.com/KnugiHK/iphone_backup_decrypt
# Optionally:
pip install fastpbkdf2

Usage

This code decrypts the backup using the passphrase chosen when encrypted backups were enabled in iTunes.

The relativePath of the file(s) to be decrypted also needs to be known. Very common files, like those for the call history or text message databases, can be found in the RelativePath class: e.g. use RelativePath.CALL_HISTORY instead of the full Library/CallHistoryDB/CallHistory.storedata.

If the relative path is not known, you can manually open the Manifest.db SQLite database and explore the Files table to find those of interest. After creating the class, use the EncryptedBackup.save_manifest_file(...) method to store a decrypted version.

A minimal example to decrypt and extract some files might look like:

from iphone_backup_decrypt import EncryptedBackup, RelativePath, RelativePathsLike

passphrase = "..."  # Or load passphrase more securely from stdin, or a file, etc.
backup_path = "%AppData%\\Apple Computer\\MobileSync\\Backup\\[device-specific-hash]"

backup = EncryptedBackup(backup_directory=backup_path, passphrase=passphrase)

# Extract the call history SQLite database:
backup.extract_file(relative_path=RelativePath.CALL_HISTORY, 
                    output_filename="./output/call_history.sqlite")

# Extract all photos from the camera roll:
backup.extract_files(relative_paths_like=RelativePathsLike.CAMERA_ROLL,
                     output_folder="./output/camera_roll")

# Extract WhatsApp SQLite database and attachments:
backup.extract_file(relative_path=RelativePath.WHATSAPP_MESSAGES,
                    output_filename="./output/whatsapp.sqlite")
backup.extract_files(relative_paths_like=RelativePathsLike.WHATSAPP_ATTACHMENTS,
                     output_folder="./output/whatsapp")

About

Decrypt an encrypted iOS 13+ backup created by iTunes on Windows. Customized for WhatsApp-Chat-Exporter

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%