Deutsch   English   Français   Italiano  
<vgnq2c$2mp0$1@nnrp.usenet.blueworldhosting.com>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!weretis.net!feeder9.news.weretis.net!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail
From: Andrews <andrews@spam.net>
Newsgroups: alt.comp.os.windows-10,comp.mobile.android
Subject: Re: Extracting WiFi Passwords - SOLVED AT LAST!
Date: Sat, 9 Nov 2024 14:02:53 -0000 (UTC)
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Message-ID: <vgnq2c$2mp0$1@nnrp.usenet.blueworldhosting.com>
References: <1ktfijp2bp4fisefbf95ptanhve79ab2od@4ax.com> <vg8ufv$hoo4$1@dont-email.me> <8b3gij5v1lhafk4bqa3f3iquuns3gnbskt@4ax.com> <vg9cpt$oua4$1@dont-email.me> <lor6jbFd6ktU1@mid.individual.net> <vgamqi$ujq$1@nnrp.usenet.blueworldhosting.com> <vgaqga$10q2u$1@dont-email.me> <vgb223$746$1@nnrp.usenet.blueworldhosting.com> <vgb7lh$1idh$1@nnrp.usenet.blueworldhosting.com> <vgctte$1g9ct$1@dont-email.me> <vgdq8h$17dm$1@nnrp.usenet.blueworldhosting.com> <vgg82t$2732h$1@dont-email.me> <vggekq$1ksn$1@nnrp.usenet.blueworldhosting.com> <vggkqn$295tf$1@dont-email.me> <vgglhr$2utg$1@nnrp.usenet.blueworldhosting.com> <vgirqm$2o2ft$1@dont-email.me> <vgitog$1ch3$1@nnrp.usenet.blueworldhosting.com> <vgm951$3dr8g$1@dont-email.me> <vgmc8i$3e9fd$1@dont-email.me> <vgmd4c$3eclt$1@dont-email.me> <vgmpu1$1rhd$1@nnrp.usenet.blueworldhosting.com>
MIME-Version: 1.0
Injection-Date: Sat, 9 Nov 2024 14:02:53 -0000 (UTC)
Injection-Info: nnrp.usenet.blueworldhosting.com;
	logging-data="88864"; mail-complaints-to="usenet@blueworldhosting.com"
User-Agent: Gnus/5.13 (Gnus v5.13)
Cancel-Lock: sha1:ae+ENWlYzfVfDHSyQfZFRevtrnA= sha256:wUWdeAQnZoIIooiCu5CDGX8qpSe2FAN3YonyztfupNg=
	sha1:S2qwUujgHnDxjKaj6ZJrXzNQ7/s= sha256:L8w0HXXOxOkrjQvz2mZKTLN9Y4hM+YjEUutVqVlxoX4=
Bytes: 4785
Lines: 59

Andrews wrote on Sat, 9 Nov 2024 04:54:25 -0000 (UTC) :

> Single app backup (the app has to actually be installed already).
>  C:\app\editor\android\scrcpy> adb restore myAndroidBackup.ab

Bear in mind, for those who don't already know it, Android *never* deletes
the actual installer that was used to install an app, so it's there.

You just have to find it.

Also, note it's far easier to manage Android from Windows than from the
phone (for so many obvious reasons, I won't even list them for you).

So let's assume we want a backup on Windows of osmand~ *and* its data.

First you have to find the package name if you don't already know it.
 C:\> adb shell pm list packages | findStr /i "osmand" 
      package:net.osmand.plus

Then you have to find the location of the APK stored on your phone.
 C:\> adb shell pm path net.osmand.plus
      package:/data/app/~~k-jK7n2qHWcW_giNy6oVEA==/net.osmand.plus-6ws8wQWIkEi8vVgL5q3EdA==/base.apk

Then you can copy that APK manually if that's what you really want to do.
 C:\> adb pull /data/app/~~k-jK7n2qHWcW_giNy6oVEA==/net.osmand.plus-6ws8wQWIkEi8vVgL5q3EdA==/base.apk

Since *every* stored APK on Android is named, "base.apk", rename it:
 C:\> move base.apk net.osmand.plus_bck.apk

But nobody would copy an apk that way (unless they're writing scripts).
That's why they made all those free Android APK extraction tools.
 <https://play.google.com/store/apps/details?id=de.onyxbits.listmyapps>
 <https://play.google.com/store/apps/details?id=com.jenos.shareapkfile>
 <https://play.google.com/store/apps/details?id=sk.styk.martin.apkanalyzer>

Now that you have the APK backed up, it's time to use adb's data backup:
 C:\> adb backup -f net.osmand.plus_bck.ab net.osmand.plus
      WARNING: adb backup is deprecated and may be removed in a future release
      Now unlock your device and confirm the backup operation...

Now you have both the installer & the data on your Windows system:
 C:\> dir *osmand*
      11/09/2024  05:45 AM       146,644,539 net.osmand.plus_bck.apk
      11/09/2024  05:50 AM                47 net.osmand.plus_bck.ab

Note that I'm not sure what is in that data ball of string since the help
for adb backup says you need to copy over some things manually from your
sdcard. I suspect that's the internal sdcard they were referring to since
some people don't have an external sdcard.

To find where sdcard information is installed, I will *guess* it's in the
information that is spit out with a query using adb. Maybe this query?
 C:\> adb shell pm dump net.osmand.plus > net.osmand.plus_bck.txt

That file is over eight thousand lines long, so I'm not sure if it tells us
where the map data is stored & whether or not that's backed up.

Anyone know how to find the map data for osmand if it's stored on your
external sdcard? (Of course, you know where you put it - but this is for
general use where the user is backing up a device so they might not know.)