Deutsch   English   Français   Italiano  
<vgmc8i$3e9fd$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!eternal-september.org!feeder2.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Java Jive <java@evij.com.invalid>
Newsgroups: alt.comp.os.windows-10,comp.mobile.android
Subject: Extracting WiFi Passwords - SOLVED AT LAST!
Date: Sat, 9 Nov 2024 01:01:04 +0000
Organization: A noiseless patient Spider
Lines: 58
Message-ID: <vgmc8i$3e9fd$1@dont-email.me>
References: <1ktfijp2bp4fisefbf95ptanhve79ab2od@4ax.com>
 <vg8ufv$hoo4$1@dont-email.me> <8b3gij5v1lhafk4bqa3f3iquuns3gnbskt@4ax.com>
 <vg9cpt$oua4$1@dont-email.me> <lor6jbFd6ktU1@mid.individual.net>
 <vgamqi$ujq$1@nnrp.usenet.blueworldhosting.com>
 <vgaqga$10q2u$1@dont-email.me>
 <vgb223$746$1@nnrp.usenet.blueworldhosting.com>
 <vgb7lh$1idh$1@nnrp.usenet.blueworldhosting.com>
 <vgctte$1g9ct$1@dont-email.me>
 <vgdq8h$17dm$1@nnrp.usenet.blueworldhosting.com>
 <vgg82t$2732h$1@dont-email.me>
 <vggekq$1ksn$1@nnrp.usenet.blueworldhosting.com>
 <vggkqn$295tf$1@dont-email.me>
 <vgglhr$2utg$1@nnrp.usenet.blueworldhosting.com>
 <vgirqm$2o2ft$1@dont-email.me>
 <vgitog$1ch3$1@nnrp.usenet.blueworldhosting.com>
 <vgm951$3dr8g$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Sat, 09 Nov 2024 02:01:06 +0100 (CET)
Injection-Info: dont-email.me; posting-host="12f963d0f169405037c76b01b337574f";
	logging-data="3614189"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX19dFGA8DG9ziIlPm7mVwHqqnJ+yn6xpy1w="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:ibr2/JnttWwoVjvwJMBh1OeLFWU=
In-Reply-To: <vgm951$3dr8g$1@dont-email.me>
Content-Language: en-GB
Bytes: 3938

On 2024-11-09 00:08, Java Jive wrote:
> 
> There is a command ...
>    <path>\adb backup
> ... which creates a backup of the phone or tablet on your computer. 
> However, the backup so created, called backup.ab, is a unique tar file 
> format that almost nothing else can read as is, though there are neat 
> workarounds as long as it is not encrypted; however, because my tablet 
> is encrypted, so is the backup, which means that the simple workarounds 
> don't work.
> 
> A whole Perl upgrade later, where the biggest problem was actually 
> uninstalling the previous version, to run a Perl script to extract the 
> contents resulted only in a message that it couldn't do anything with 
> this version 4, a version later than that for which it was written.
> 
> A whole Java upgrade later, where again the biggest problem was 
> uninstalling the previous JDK and JRE, finally extracted it, but it 
> seems to contain nothing useful that was not available already simply by 
> connecting the phone to the PC in the normal way.

Actually they were there all along, which shows just how useless is 
Windows Search, by contrast Textpad's Find in Files option found them.

So, the full procedure is:

1.    <path>\adb backup

.... creates backup.ab in the current directory

2.    Install or update to the latest Java Runtime Environment, 
currently 1.8.0_431:

https://www.java.com/en/download/help/download_options.html

3.    Download Nelenkov's abe*.jar file:

https://github.com/nelenkov/android-backup-extractor
https://github.com/nelenkov/android-backup-extractor/releases/download/latest/abe-3e9a273.jar

Give the command (without the square brackets around the password, they 
are merely a convention signifying that it is an optional parameter):

java -jar <path>\abe-3e9a273.jar unpack <path>\backup.ab 
<path>\backup.tar [password]

The resulting tar file can be extracted by 7-zip.  Search the extracted 
files' contents for an SSID known to be on the device, mine were in:

\apps\com.android.providers.settings\d_f\flattened-data

-- 

Fake news kills!

I may be contacted via the contact address given on my website: 
www.macfh.co.uk