| Deutsch English Français Italiano |
|
<vgnjg8$3p6n2$1@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!eternal-september.org!feeder2.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Java Jive <java@evij.com.invalid> Newsgroups: alt.comp.os.windows-10,comp.mobile.android Subject: Re: Extracting WiFi Passwords - SOLVED AT LAST! Date: Sat, 9 Nov 2024 12:10:47 +0000 Organization: A noiseless patient Spider Lines: 47 Message-ID: <vgnjg8$3p6n2$1@dont-email.me> References: <1ktfijp2bp4fisefbf95ptanhve79ab2od@4ax.com> <vg8ufv$hoo4$1@dont-email.me> <8b3gij5v1lhafk4bqa3f3iquuns3gnbskt@4ax.com> <vg9cpt$oua4$1@dont-email.me> <lor6jbFd6ktU1@mid.individual.net> <vgamqi$ujq$1@nnrp.usenet.blueworldhosting.com> <vgaqga$10q2u$1@dont-email.me> <vgb223$746$1@nnrp.usenet.blueworldhosting.com> <vgb7lh$1idh$1@nnrp.usenet.blueworldhosting.com> <vgctte$1g9ct$1@dont-email.me> <vgdq8h$17dm$1@nnrp.usenet.blueworldhosting.com> <vgg82t$2732h$1@dont-email.me> <vggekq$1ksn$1@nnrp.usenet.blueworldhosting.com> <vggkqn$295tf$1@dont-email.me> <vgglhr$2utg$1@nnrp.usenet.blueworldhosting.com> <vgirqm$2o2ft$1@dont-email.me> <vgitog$1ch3$1@nnrp.usenet.blueworldhosting.com> <vgm951$3dr8g$1@dont-email.me> <vgmc8i$3e9fd$1@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Injection-Date: Sat, 09 Nov 2024 13:10:49 +0100 (CET) Injection-Info: dont-email.me; posting-host="12f963d0f169405037c76b01b337574f"; logging-data="3971810"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+MLCZcL3EoPTBQTj2tT60Isdkwn44+Op0=" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:/K9BbQhKxhaPgTR69o31G/fcbXk= Content-Language: en-GB In-Reply-To: <vgmc8i$3e9fd$1@dont-email.me> Bytes: 3356 On 2024-11-09 01:01, Java Jive wrote: In response to Andrews' comments, I think I need to clarify these. In particular, the adb command given is probably wrong, because, after all the attempts to uninstall and reinstall Perl and Java the actual command I gave had fallen off the end of the DOSKey list, so I wrote it, late last night, from memory. However, I got it from here and can now tell that I must have misremembered it (312-314): https://gist.github.com/Pulimet/5013acf2cd5b28e55036c82c91bd56d8 So the (corrected) full procedure is: 1. <path>\adb backup -all -f backup.ab .... creates backup.ab in the current directory 2. Install or update to the latest Java Runtime Environment, currently 1.8.0_431: https://www.java.com/en/download/help/download_options.html 3. Download Nelenkov's abe*.jar file: https://github.com/nelenkov/android-backup-extractor https://github.com/nelenkov/android-backup-extractor/releases/download/latest/abe-3e9a273.jar 4. Give the command (without the square brackets around the password, they are merely a convention signifying that it is an optional parameter): java -jar <path>\abe-3e9a273.jar unpack <path>\backup.ab <path>\backup.tar [password] 5. The resulting tar file can be extracted by 7-zip. 6. Search the contents of the extracted files for an SSID known to be on the device, mine were in: \apps\com.android.providers.settings\d_f\flattened-data -- Fake news kills! I may be contacted via the contact address given on my website: www.macfh.co.uk