[Tool] WhatsApp Key/DB Extractor | CRYPT6-12 | NON-ROOT | UPDATED OCTOBER 2016

Search This thread

Deltafox79

Senior Member
Oct 20, 2008
194
34
I am getting error while extracting key. Attached plz find the screen cap of error.

Same problem for me on HTC m7 GPE lollipop 5.0.1.. I have also update abe.jar package downloaded here :

http://sourceforge.net/projects/adbextractor/?source=typ_redirect

But have the problems display in attachement..

I see the line command "bin\adb.exe backup -f tmp\whatsapp.ab -noapk com.whatsapp" produce a file whatsapp.ab of 1kb only.. maybe this is the problems but why?

Regards
 

Attachments

  • WE.jpg
    WE.jpg
    205.2 KB · Views: 947

kanj004

New member
Dec 12, 2014
1
0
please help

It works just fine on my galaxy note3 and my galaxy grand 2. But i try it using my xperia z it doesn't work
The error message in the attachments

Thank you
 

Attachments

  • Capture.JPG
    Capture.JPG
    170.4 KB · Views: 821

DURKH3IM

Member
Aug 29, 2014
10
0
Same problem for me on HTC m7 GPE lollipop 5.0.1.. I have also update abe.jar package downloaded here :

But have the problems display in attachement..

I see the line command "bin\adb.exe backup -f tmp\whatsapp.ab -noapk com.whatsapp" produce a file whatsapp.ab of 1kb only.. maybe this is the problems but why?

Regards

The backup seems to be null, maybe whatsapp change the app folder? The com.whatsapp are empty!!:confused:

No info about crypt8?
 

cyb3r

Member
Jun 7, 2004
7
3
Hy are you working on crypt8 ? I didnt test that new format i found crypt8 in the newest whatsapp :( I hope we dont get problems

crypt8 is pretty easy to decode:
get the key from "data/data/com.whatsapp/files/key" once and latest db-backup from "sdcard/Whatsapp/Databases/msgstore.db.crypt8", then execute in bash:

hexdump -e '2/1 "%02x"' key | cut -b 253-316 > tmp/aes.txt
hexdump -e '2/1 "%02x"' key | cut -b 221-252 > tmp/iv.txt
dd if=msgstore.db.crypt8 of=tmp/msgstore.db.crypt8.nohdr ibs=67 skip=1 &> /dev/null
openssl enc -aes-256-cbc -d -nosalt -nopad -bufsize 16384 -in tmp/msgstore.db.crypt8.nohdr -K $(cat tmp/aes.txt) -iv $(cat tmp/iv.txt) > tmp/msgstore.gz
gzip -cdq tmp/msgstore.gz >msgstore.db

source: http://party3d.com/2014/12/16/nachste-whatsapp-version-bereits-geknackt/
 
  • Like
Reactions: DURKH3IM

DURKH3IM

Member
Aug 29, 2014
10
0
crypt8 is pretty easy to decode:
get the key from "data/data/com.whatsapp/files/key" once and latest db-backup from "sdcard/Whatsapp/Databases/msgstore.db.crypt8", then execute in bash:

hexdump -e '2/1 "%02x"' key | cut -b 253-316 > tmp/aes.txt
hexdump -e '2/1 "%02x"' key | cut -b 221-252 > tmp/iv.txt
dd if=msgstore.db.crypt8 of=tmp/msgstore.db.crypt8.nohdr ibs=67 skip=1 &> /dev/null
openssl enc -aes-256-cbc -d -nosalt -nopad -bufsize 16384 -in tmp/msgstore.db.crypt8.nohdr -K $(cat tmp/aes.txt) -iv $(cat tmp/iv.txt) > tmp/msgstore.gz
gzip -cdq tmp/msgstore.gz >msgstore.db

Nice info! But, the problem was in extracting the key file, when you did the android backup its seem to be empty! Now whatsapp its protected to android backup? Or it is impossible?

(soz bad english)
 

SimJoSt

New member
Jun 25, 2012
3
0
It seems that WhatsApp has opted out of the Android-Backup feature. Atleast my Helium/Carbon-Backup-App says so.
I have Version 2.11.476 installed.

At first I thought it had something todo with me installing a WhatsApp beta APK, because one of my friends send me one of these messages, that crashes WA when I open it... :)
 

collateral47

New member
Dec 2, 2014
3
0
Hi guys, I tried to do this one a HTC M7 but using the original attachment (in OPs post) I get an "exception in thread main java.lang..."

I also tried Abinash's version from Github but I get a file not found error this time.
Ive attached the screencaps

Am I correct in assuming that on a rooted device the bat file wont do anything, as Ive tried to test this on a rooted S3 and nothing happens.
 

DURKH3IM

Member
Aug 29, 2014
10
0
It seems that WhatsApp has opted out of the Android-Backup feature. Atleast my Helium/Carbon-Backup-App says so.
I have Version 2.11.476 installed.

At first I thought it had something todo with me installing a WhatsApp beta APK, because one of my friends send me one of these messages, that crashes WA when I open it... :)

Yep...now its impossible to get the key file without root...
 

DURKH3IM

Member
Aug 29, 2014
10
0
I can modify the latest whatsapp apk to re-enable adb backup. You'll be able to use helium and other adb backup services. I'll do it if someone needs it. :)

Cheers!

---------- Post added at 10:50 PM ---------- Previous post was at 10:45 PM ----------



I can translate your app to English if you want.

It can be awesome if u can modify the apk! I really need it!!

Ah, and im working in translating my app, btw thanks for your help!

Regards!
 

SimJoSt

New member
Jun 25, 2012
3
0
I can modify the latest whatsapp apk to re-enable adb backup. You'll be able to use helium and other adb backup services. I'll do it if someone needs it. :)

Cheers!

---------- Post added at 10:50 PM ---------- Previous post was at 10:45 PM ----------



I can translate your app to English if you want.

I would definitively be interested! In general I am not relying on regular updates, so why not?
Thanks!
 

tayade.ameya

New member
Dec 25, 2014
1
0
This tool worked for a phone but did not for another phone

Thank you for this wonderful tool. I was able to extract key file from Moto G easily using this tool. But when I connect another phone, HTC Desire 816, the key is not extracted and an error message is shown. I have included an image to show the error:
10872587_761861090533989_1088684848_n.jpg


Can somebody please help me?
 

TripCode

Senior Member
Mar 13, 2014
171
162
This tool will still work on the latest WhatsApp, but you will need to patch the APK to re-enable ADB Backups. Please see: WhatsApp ADB Patch if you wish to patch your official apk with a simple drag and drop bat script. It will work with the current and all future versions of WhatsApp.
 

insigniared

Member
Jun 30, 2010
47
2
confirmed working

Confirmed working like a charm today in a non rooted stock HTC ONE X from ATT running android 4.1.1 with whatsapp version 2.11.432
just plug and play, but I had to copy the java path to "my pc", advance system settings, etc.
thank you
powerfull tool indeed.
 
  • Like
Reactions: TripCode

ltGuillaume

Senior Member
Jun 17, 2010
889
1,100
Since Tri-Crypt v1.4 (which supports crypt8) isn't available in the Play Store just yet, could you please attach the apk here, as you mentioned in a PM? Much appreciated, thanks TripCode! :)
 

Moshuro

New member
Dec 6, 2010
1
0
Hi,

I've followed all the steps in the description. Installed Latest java version, APB and USB debbuging
when i connect the androit phone to the PC, after I run the bat file i get this message:



When I check the "extracted" folder there is nothing in it.

Could anyone please help?

Note: the phone is not rooted and i've searched the internet for all key extractors but all fail to work :(
 

Attachments

  • whatsapp.jpg
    whatsapp.jpg
    165.9 KB · Views: 1,933

thezyzz

New member
Feb 5, 2015
1
0
It runs the script, deletes my whatsapp app from my phone, then t it just opens the backup window on my phone, the "back up my data" buttom is blocked, and the whatsapp app is deleted and no whatsapp at all on my phone.
i'm using galaxy s3
android version: 4.1.2
latest whatsapp version.
 

Attachments

  • image.jpg
    image.jpg
    279.4 KB · Views: 906

Top Liked Posts

  • There are no posts matching your filters.
  • 1
    Sorry for waking up an old thread.

    Adb fails to install an older WhatsApp (even with -d) citing the version downgrade error... Was there a specific way to get around this?

    It seems that only debugable apps can be installed this way :/
    you need to restart your device before installing the old version
    1
    But how can it be 17gigs then just messages really
    IDK msgstore.db.crypt14 is only an encrypted backup of the msgstore.db stored in /data/data/com.whatsapp/databases

    media is stored in internal/Android/media/com.whatsapp
  • 49
    ** Version 4.7 Updated October 2016 - Supports Android 4.0-7.0 **

    SUMMARY:
    Allows WhatsApp users to extract their cipher key and databases on non-rooted Android devices.
    UPDATE: This tool was last updated on October 12th 2016. and confirmed working on Android 4.0-7.0 using WhatsApp version v2.16.304 (latest available).
    IMPORTANT: If you wish to extract media files or WhatsApp databases from Google Drive backups then you need: WhatsApp Google Drive Extractor instead.

    TUTORIAL:

    BRANCH UPDATES:
    v4.0 - Fixed issues with Android API 14-17 (4.0-4.2 Jelly Bean).
    v4.1 - Added support for Android API 23 (6.0-6.0.1 Marshmallow).
    v4.2 - Added support for specifying adb backup passwords.
    v4.3 - Added PowerShell version as optional alternative to bat version.
    v4.4 - Changed primary mirror for legacy apk.
    v4.5 - Fixed issue pushing cipher key to emulated storage.
    v4.6 - Updated primary mirror for legacy apk (again).
    v4.7 - Added new sanity checks and support for Android API 24 (7.0 Nougat).

    PREREQUISITES:

    1. O/S: Windows Vista, Windows 7, Windows 8, Windows 10, Mac OS X or Linux
    2. Java - If not installed: Download Java
    3. ADB (Android Debug Bridge) Drivers
    4. USB Debugging* must be enabled on the target device. Settings -> Developer Options -> (Debugging) USB debugging
    5. Android device with Android 4.0 or higher. I.E. Ice Cream Sandwich, Jelly Bean, KitKat, Lollipop, Marshmallow or Nougat.
    *= If you cannot find Developer Options then please go to: Settings -> About phone/device and tap the Build number multiple times.

    INSTRUCTIONS:

    1. Extract WhatsApp-Key-DB-Extractor-master.zip maintaining the directory structure.
    2. Click on WhatsAppKeyDBExtract.bat (Windows) or WhatsAppKeyDBExtract.sh (Mac OS X / Linux).
    3. Connect your device via USB, unlock your screen and wait for Full backup to appear.
    4. Enter your backup password or leave blank (if none set) and tap on Back up my data.
    5. Confirm backup password in your command console and then check the "extracted" folder.

    TROUBLESHOOTING:

    1. If you have never used USB Debugging before, you may also need to verify the fingerprint.
    2. If you have set a default backup password in your Android settings, then this MUST be the
      backup password that you provide when prompted to backup your data. Else it WILL fail!
    3. Linux and Mac OS X users may need to set the script permissions as executable. Depending on the
      adb permissions, you may also need to sudo ./WhatsAppKeyDBExtract.sh from your command console.
    4. If you're having issues with WhatsAppKeyDBExtract.bat then right click WhatsAppKeyDBExtract.ps1
      and select Run with PowerShell. You may have to enter "y" at first run for script execution policy.
    5. If you get an error saying "AES encryption not allowed" then you need to update your Oracle Java
      Cryptography Extension (JCE) to Unlimited Strength Jurisdiction Policy Files.

    DOWNLOAD: WhatsApp-Key-DB-Extractor-master.zip


    AUTHOR: TripCode
    THANKS: dragomerlin for Android Backup Extractor and Abinash Bishoyi for being cool.
    4
    just extracted whatsapp data from:
    - lenovo p2 under android 7.0
    - galaxy s8 under android 9.0

    i spent 4 hours on the script to apply fixes and improve it.
    I will "publish" it soon.

    Few tips before publishing (they will be in the script):
    - if you get an error during the downgrade, reboot your phone before installing the downgrade
    - i kept the "adb backup" command but before executing it, you have to launch the downgraded application! (tested multiple times, without this launch, the backup was empty or corrupted)
    - update "adb.exe" (and libs) and "abe.jar" (thanks @progman321 for the tips)


    which url?

    http://whatcrypt.com/WhatsApp-2.11.431.apk is still available!?

    Yes http://www.cdn.whatsapp.net/android/2.11.431/whatsapp.apk is not anymore, but the script proceeds to download the link above then.

    thanks to everybody in this post, i finally made it in life, well, i mean... I managed to de-crypt the wa database as of today (29/02/2020, so it still works yey!!) after just a few hours of "playing" (not a funny game tho).
    Because i'm quite bored this morning, i feel the need to give a thorough list of instructions for the newcomers (a kind summary because many have already been given in this post):


    first, the "foreplay" steps, if you know what i mean ;) :
    1. enable "usb debugging" in your phone
    2. verify you have the latest version of java and the android debug bridge drivers in your pc
    3. download the .zip from this post
    4. extract it without changing the overall structure of the folder
    5. download wa 2.11.431 (like from android-apk.org)
    6. put it in the tmp folder replacing legacywhatsapp.apk

    second, the feel like a hacker from mr. Robot steps:
    1. launch whatsappkeydbextract.bat file
    2. input y to reboot the device
    3. once rebooted, unlock it (you should not find your wa app anymore) and press any key in cw
    4. wait until the streamed install is done
    5. unlock again your phone
    6. prompted "wa has been updated" should be prompted in your phone, press continue
    7. search for wa in your phone and open it
    8. (a new prompt in your phone will say it's an outdated version of wa press ok, if it doesnt appear don't worry)
    9. press the adjust date and you will be sent to a date & time page, keep it open
    10. press any key in cw
    11. select the option you prefer at the command window
    12. select fullback up in your phone (without entering any password)
    13. restore wa press any key
    14. you made it as well :highfive:

    finally you should download the whatsapp viewer and use it to open the msgstor.db file
    i hope it helps and sorry for the bad jokes :p

    n.b.: For the steve jobs lovers i'm sorry i have a win pc altough i'm not against a fundraise to buy me one, i would love to replace my potato with an apple :d
    wa = whatsapp
    cw = command window

    FINALLY!!!! THIS UP HERE IS ALL YOU NEED TO HAVE/FOLLOW SO TO BACKUP WhatsApp FILES WITH LAST 2020 ANDROID ON A WINDOWS BASED SYSTEM!!!!!!

    1. Download WhatsApp Key/DB Extractor posted by p4r4d0x86
    2. Download whatsapp-2.11.431.apk file from link posted by lopra (if it doesn't work, just googe that exact version)
    3. Strictly follow instructions written by fabiml

    EVERYTHING DID WORK AT FIRST TRY!!!!!

    Thank you guys. I really love ya!!! :D
    3
    I will try this evening/night (ADT - Atlantic Daylight Time / ADST Atlantic Daylight Saving Time ... or currently UTC-3) :p

    Here it is:
    https://github.com/p4r4d0x86/WhatsApp-Key-DB-Extractor/archive/v4.7-E1.0.zip

    And the new UNTESTED merjapp.jar is here:
    https://github.com/p4r4d0x86/merjapp/releases/download/v190508/merjapp.jar
    3
    Detailed Instructions

    Thanks to everybody in this post, I finally made it in life, well, I mean... I managed to de-crypt the WA database as of today (29/02/2020, so it still works yey!!) after just a few hours of "playing" (not a funny game tho).
    Because I'm quite bored this morning, I feel the need to give a thorough list of instructions for the newcomers (a kind summary because many have already been given in this post):


    First, the "foreplay" steps, if you know what I mean ;) :
    1. Enable "USB Debugging" in your phone
    2. Verify you have the latest version of Java and the Android Debug Bridge Drivers in your PC
    3. Download the .zip from this post
    4. Extract it without changing the overall structure of the folder
    5. Download WA 2.11.431 (like from android-apk.org)
    6. Put it in the tmp folder replacing LegacyWhatsApp.apk

    Second, the feel like a hacker from Mr. Robot steps:
    1. Launch WhatsAppKeyDBExtract.bat file
    2. Input Y to reboot the device
    3. Once rebooted, unlock it (you should not find your WA app anymore) and press any key in CW
    4. Wait until the streamed install is done
    5. Unlock again your phone
    6. Prompted "WA has been updated" should be prompted in your phone, press continue
    7. Search for WA in your phone and open it
    8. (A new prompt in your phone will say it's an outdated version of WA press ok, if it doesnt appear don't worry)
    9. Press the adjust date and you will be sent to a Date & Time page, keep it open
    10. Press any key in CW
    11. Select the option you prefer at the command window
    12. Select fullback up in your phone (without entering any password)
    13. Restore WA press any key
    14. You MADE IT as well :highfive:

    Finally you should download the Whatsapp Viewer and use it to open the msgstor.db file
    I hope it helps and sorry for the bad jokes :p

    N.B.: For the Steve Jobs lovers I'm sorry I have a Win PC altough I'm not against a fundraise to buy me one, I would love to replace my potato with an apple :D
    WA = Whatsapp
    CW = Command Window

    This method still works for Oneplus 9pro Android 13, but it has some new twists.

    Latest whatsapp viewer can't decrypt backups or open the conversations as-is due to slight changes to the encryption plus messages format in the sql database.

    Hope you find this helpful.

    To decrypt .14 files, use this instead:

    To open the new database file format after obtaining the files with the extractor, here are the instructions on how to create the needed tables in the SQL database so the viewer can process them:
    2
    Yes, this is a normal backup method. There are automatic tools that do the same without using PC, just on device side.

    Apart from normal ADB method, you could use ECLIPSE for that, using the memory module, you could transfer files from and in.

    If you have physical access to the device, there are many solutions.

    regards.

    The only way to access private application files (such as a WhatsApp's cipher key) without root is the ADB method. You can backup some files on the device without a PC (APK's etc...), but there is currently no way to access private files and folders. All the "My Big Fat Backup" style apps and tools will either require root or ADB. Eclipse also utilizes ADB. Basically, device side backups of application data require root. There are no other alternatives to this. If there was, then Android would be too infeasible and insecure as a viable operating system. Physical access translates into only two solutions. 1.) The ability to root and 2.) The ability to utilize ADB (Eclipse, Bats, Exe's doing nothing more than calling a simple command line). Of course if you are aware of a 3rd method (disregarding the user interface) and is not based on root or ADB then please feel free to share. :)