[Tool] WhatsApp Key/DB Extractor | CRYPT6-12 | NON-ROOT | UPDATED OCTOBER 2016

Search This thread

B3A5TSAURABH

New member
Sep 11, 2020
1
0
LegacyWhatsApp Not Installing as it says Problem Parsing Error.

Device - Redmi Note 5 Pro
Google Play Protect Off
stock MIUI11
Android 9
Tool Downloaded From official whatscrypt site
Problem Facing-Error: Failed to parse APK file: /data/local/tmp/LegacyWhatsApp.apk

Please connect your Android device with USB Debugging enabled:

* daemon not running. starting it now on port 5037 *
* daemon started successfully *

WhatsApp 2.20.198.15 installed

Downloading legacy WhatsApp 2.11.431 to local folder
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
100 251 100 251 0 0 309 0 --:--:-- --:--:-- --:--:-- 309

Backing up WhatsApp 2.20.198.15
5790 KB/s (30830868 bytes in 5.199s)
Backup complete

Removing WhatsApp 2.20.198.15 skipping data
Success
Removal complete

Installing legacy WhatsApp 2.11.431
81 KB/s (251 bytes in 0.003s)
Error: Failed to parse APK file: /data/local/tmp/LegacyWhatsApp.apk

Exception occurred while executing:
java.lang.IllegalArgumentException: Error: Failed to parse APK file: /data/local
/tmp/LegacyWhatsApp.apk
at com.android.server.pm.PackageManagerShellCommand.setParamsSize(Packag
eManagerShellCommand.java:471)
at com.android.server.pm.PackageManagerShellCommand.runInstall(PackageMa
nagerShellCommand.java:1060)
at com.android.server.pm.PackageManagerShellCommand.onCommand(PackageMan
agerShellCommand.java:169)
at android.os.ShellCommand.exec(ShellCommand.java:104)
at com.android.server.pm.PackageManagerService.onShellCommand(PackageMan
agerService.java:21909)
at android.os.Binder.shellCommand(Binder.java:881)
at android.os.Binder.onTransact(Binder.java:765)
at android.content.pm.IPackageManager$Stub.onTransact(IPackageManager.ja
va:4876)
at com.android.server.pm.PackageManagerService.onTransact(PackageManager
Service.java:4096)
at android.os.Binder.execTransactInternal(Binder.java:1021)
at android.os.Binder.execTransact(Binder.java:994)
Caused by: android.content.pm.PackageParser$PackageParserException: Failed to pa
rse /data/local/tmp/LegacyWhatsApp.apk
at android.content.pm.PackageParser.parseApkLiteInner(PackageParser.java
:1597)
at android.content.pm.PackageParser.parseApkLite(PackageParser.java:1582
)
at com.android.server.pm.PackageManagerShellCommand.setParamsSize(Packag
eManagerShellCommand.java:464)
... 10 more
Install complete

Now unlock your device and confirm the backup operation.

Please enter your backup password (leave blank for none) and press Enter:

Exception in thread "main" java.lang.reflect.InvocationTargetException
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
at java.lang.reflect.Method.invoke(Unknown Source)
at org.eclipse.jdt.internal.jarinjarloader.JarRsrcLoader.main(JarRsrcLoa
der.java:58)
Caused by: java.lang.RuntimeException: java.lang.IllegalArgumentException: Don't
know how to process version 5
at org.nick.abe.AndroidBackup.extractAsTar(AndroidBackup.java:420)
at org.nick.abe.Main.main(Main.java:128)
... 5 more
Caused by: java.lang.IllegalArgumentException: Don't know how to process version
5
at org.nick.abe.AndroidBackup.extractAsTar(AndroidBackup.java:282)
... 6 more
bin\tar.exe: Cannot open tmp\whatsapp.tar: No such file or directory
bin\tar.exe: Error is not recoverable: exiting now
bin\tar.exe: Cannot open tmp\whatsapp.tar: No such file or directory
bin\tar.exe: Error is not recoverable: exiting now
bin\tar.exe: Cannot open tmp\whatsapp.tar: No such file or directory
bin\tar.exe: Error is not recoverable: exiting now
bin\tar.exe: Cannot open tmp\whatsapp.tar: No such file or directory
bin\tar.exe: Error is not recoverable: exiting now
bin\tar.exe: Cannot open tmp\whatsapp.tar: No such file or directory
bin\tar.exe: Error is not recoverable: exiting now

Cleaning up temporary files ...

Deleted file - C:\WhatsApp-Key-DB-Extractor-master\tmp\whatsapp.ab
Deleted file - C:\WhatsApp-Key-DB-Extractor-master\tmp\waplen.txt
Deleted file - C:\WhatsApp-Key-DB-Extractor-master\tmp\sdpath.txt
Deleted file - C:\WhatsApp-Key-DB-Extractor-master\tmp\wapath.txt
Deleted file - C:\WhatsApp-Key-DB-Extractor-master\tmp\wapver.txt
Deleted file - C:\WhatsApp-Key-DB-Extractor-master\tmp\sdkver.txt

Done

Restoring WhatsApp 2.20.198.15
4348 KB/s (30830868 bytes in 6.923s)
Success

Restore complete

Removing WhatsApp 2.20.198.15 temporary apk
Deleted file - C:\WhatsApp-Key-DB-Extractor-master\tmp\base.apk

Operation complete

Press any key to continue . . .
I noticed that I'm not the only one who's having the tar errors "tar: apps/com.whatsapp/f/key: Not found in archive", the problem is with the backup file given by adb that is empty. I found on stackexchange (android.stackexchange .com /a/143481/207500) that it has to do with a backup command bug and a simple solution. You just need to use the phone shell instead of letting abd take care of it.
On unix open the ssh file and change this:
Code:
if [ $sdkver -ge 23 ]; then
adb backup -f tmp/whatsapp.ab com.whatsapp
else
adb backup -f tmp/whatsapp.ab -noapk com.whatsapp
fi
to this:
Code:
if [ $sdkver -ge 23 ]; then
adb shell "bu 1 backup com.whatsapp" > tmp/whatsapp.ab
else
adb shell "bu 1 backup -noapk com.whatsapp" > tmp/whatsapp.ab
fi
Also, it kept giving me empy backup files until I didn't put a "desktop backup password" and wrote it in BOTH the boxes (even if it says that leaving the second blank will make it use the default password).
Hope this helps and that the developers put this change in the script so that no one else has this problem.
 

huiyooh

New member
Sep 15, 2020
1
0
This works at Windows for my Note 20 ultra device.

What you need to do is replace below 2 files, the batch script works without any modification
bin\abe.jar -> download latest version of android-backup-extrator
tmp\LegacyWhatsApp.apk -> download whatsapp 2.11.431 apk from android-apk
 

shxjjbr

New member
Oct 2, 2020
1
0
Error

aa558cf17680d5ee7d1057a43500e42d.png

Hello, I'm having this error on my screen and no backup is created, any clue what could be happening? Im using a Mi Note 7 phone

Any advice is welcome
 

PIRATA!

Senior Member
Dec 6, 2010
2,714
173
just extracted whatsapp data from:
- lenovo p2 under android 7.0
- galaxy s8 under android 9.0

i spent 4 hours on the script to apply fixes and improve it.
I will "publish" it soon.

Few tips before publishing (they will be in the script):
- if you get an error during the downgrade, reboot your phone before installing the downgrade
- i kept the "adb backup" command but before executing it, you have to launch the downgraded application! (tested multiple times, without this launch, the backup was empty or corrupted)
- update "adb.exe" (and libs) and "abe.jar" (thanks @progman321 for the tips)


which url?

http://whatcrypt.com/WhatsApp-2.11.431.apk is still available!?

Yes http://www.cdn.whatsapp.net/android/2.11.431/whatsapp.apk is not anymore, but the script proceeds to download the link above then.

thanks to everybody in this post, i finally made it in life, well, i mean... I managed to de-crypt the wa database as of today (29/02/2020, so it still works yey!!) after just a few hours of "playing" (not a funny game tho).
Because i'm quite bored this morning, i feel the need to give a thorough list of instructions for the newcomers (a kind summary because many have already been given in this post):


first, the "foreplay" steps, if you know what i mean ;) :
  1. enable "usb debugging" in your phone
  2. verify you have the latest version of java and the android debug bridge drivers in your pc
  3. download the .zip from this post
  4. extract it without changing the overall structure of the folder
  5. download wa 2.11.431 (like from android-apk.org)
  6. put it in the tmp folder replacing legacywhatsapp.apk

second, the feel like a hacker from mr. Robot steps:
  1. launch whatsappkeydbextract.bat file
  2. input y to reboot the device
  3. once rebooted, unlock it (you should not find your wa app anymore) and press any key in cw
  4. wait until the streamed install is done
  5. unlock again your phone
  6. prompted "wa has been updated" should be prompted in your phone, press continue
  7. search for wa in your phone and open it
  8. (a new prompt in your phone will say it's an outdated version of wa press ok, if it doesnt appear don't worry)
  9. press the adjust date and you will be sent to a date & time page, keep it open
  10. press any key in cw
  11. select the option you prefer at the command window
  12. select fullback up in your phone (without entering any password)
  13. restore wa press any key
  14. you made it as well :highfive:

finally you should download the whatsapp viewer and use it to open the msgstor.db file
i hope it helps and sorry for the bad jokes :p

n.b.: For the steve jobs lovers i'm sorry i have a win pc altough i'm not against a fundraise to buy me one, i would love to replace my potato with an apple :d
wa = whatsapp
cw = command window

FINALLY!!!! THIS UP HERE IS ALL YOU NEED TO HAVE/FOLLOW SO TO BACKUP WhatsApp FILES WITH LAST 2020 ANDROID ON A WINDOWS BASED SYSTEM!!!!!!

  1. Download WhatsApp Key/DB Extractor posted by p4r4d0x86
  2. Download whatsapp-2.11.431.apk file from link posted by lopra (if it doesn't work, just googe that exact version)
  3. Strictly follow instructions written by fabiml

EVERYTHING DID WORK AT FIRST TRY!!!!!

Thank you guys. I really love ya!!! :D
 
Last edited:
  • Like
Reactions: Zotho

solemgar

Member
Jan 15, 2016
11
1
FINALLY!!!! THIS UP HERE IS ALL YOU NEED TO HAVE/FOLLOW SO TO BACKUP WhatsApp FILES WITH LAST 2020 ANDROID ON A WINDOWS BASED SYSTEM!!!!!!

  1. Download WhatsApp Key/DB Extractor posted by p4r4d0x86
  2. Download whatsapp-2.11.431.apk file from link posted by lopra (if it doesn't work, just googe that exact version)
  3. Strictly follow instructions written by fabiml

EVERYTHING DID WORK AT FIRST TRY!!!!!

Thank you guys. I really love ya!!! :D
I subscribe this. It works with Android 7,9 and 10. Remember that you need to have a "extracted" named folder so you can copy the files out or the script will bail out. Also,and very important,mind that the private key is also copied to a filed named WhatsApp/Databases/.nomedia in your local phone. Remember to copy away the file or to delete it!!
 

PIRATA!

Senior Member
Dec 6, 2010
2,714
173
I subscribe this. It works with Android 7,9 and 10. Remember that you need to have a "extracted" named folder so you can copy the files out or the script will bail out. Also,and very important,mind that the private key is also copied to a filed named WhatsApp/Databases/.nomedia in your local phone. Remember to copy away the file or to delete it!!
Wait a minute... I didn't know about the key being copied into that .nomedia fine there where you say!!!

This means that that key can be used to decompile databases without the need to extract it using this method here explained in this thread??

Sent from my SM-G970F using Tapatalk
 

solemgar

Member
Jan 15, 2016
11
1
Wait a minute... I didn't know about the key being copied into that .nomedia fine there where you say!!!

This means that that key can be used to decompile databases without the need to extract it using this method here explained in this thread??

Sent from my SM-G970F using Tapatalk

The key is pushed right before the files are extracted via adb . Tested the key and definitely works for decompress. In case the adb pull doesn't work but the .nomedia file is generated then indeed could be used to decrypt the chat backups.
 

PIRATA!

Senior Member
Dec 6, 2010
2,714
173
The key is pushed right before the files are extracted via adb . Tested the key and definitely works for decompress. In case the adb pull doesn't work but the .nomedia file is generated then indeed could be used to decrypt the chat backups.
Woowww!!! That is mindblowing!!!!
So even the original extractor that has adb pull issues might work, as the .nomedia with the key might be generated and found in the Whatsapp/Database folder, without the need of doing everything perfectly right...

Hope all this will help others after us, or even us with some future versions of Whatsapp or new smartphones ;)

Sent from my SM-G970F using Tapatalk
 

juan_andres

New member
Oct 20, 2020
2
0
Hi there, hope you all are doing it fine these days.

I have been struggling with getting WhatsApp Decrypt Key for almost all day. I have tried many things, working with iOS, Windows, Linux, terminals, commands, editing scripts (even though I have no experience with it, may be there was my problem), reading forums from 1995, black magic, etc. Every single step I made, bum, a new problem to solve. Unfortunately, what I found in this nice post did not work for me. I really do appreciate all the time and effort of all users, so I decided to register just to comment how I solved this and it may help other people:

I ended up using Titanium Backup and everything worked smoothly. No need for running scripts or things that would be sort of "advance" for average people out of xda. Previously, I rooted with KingRoot and in the end, everything was decrypted with WhatsApp Viewer. It all worked in an old Motorola XT915, Android 4.1.2 (Jelly Bean) and WhatsApp 2.18.105.

I tried to share link, but as it is my first post, I am not allowed to (spam defence). You may want to google pixxytorials and you will fine the guide.

Really hope it saves some time to someone out there in this world.

Juan Andrés.
 

PIRATA!

Senior Member
Dec 6, 2010
2,714
173
Hi there, hope you all are doing it fine these days.



I have been struggling with getting WhatsApp Decrypt Key for almost all day. I have tried many things, working with iOS, Windows, Linux, terminals, commands, editing scripts (even though I have no experience with it, may be there was my problem), reading forums from 1995, black magic, etc. Every single step I made, bum, a new problem to solve. Unfortunately, what I found in this nice post did not work for me. I really do appreciate all the time and effort of all users, so I decided to register just to comment how I solved this and it may help other people:



I ended up using Titanium Backup and everything worked smoothly. No need for running scripts or things that would be sort of "advance" for average people out of xda. Previously, I rooted with KingRoot and in the end, everything was decrypted with WhatsApp Viewer. It all worked in an old Motorola XT915, Android 4.1.2 (Jelly Bean) and WhatsApp 2.18.105.



I tried to share link, but as it is my first post, I am not allowed to (spam defence). You may want to google pixxytorials and you will fine the guide.



Really hope it saves some time to someone out there in this world.



Juan Andrés.
Yeah, rooting makes all things easier.
I am not rooted and i was able to extract everything like I explained up here.

But as it has been mentioned, it is possible to decrepit Whatsapp messages using the db folder in the sd (that stores a backup of the db as well) and the Whatsapp encryption key that is backup in the .nomedia file of the Database folder using also the original Whatsapp Decrypt Key that does not indeed extract nothing (at least in my case).

Sent from my SM-G970F using Tapatalk
 

juan_andres

New member
Oct 20, 2020
2
0
Yeah, rooting makes all things easier.
I am not rooted and i was able to extract everything like I explained up here.

But as it has been mentioned, it is possible to decrepit Whatsapp messages using the db folder in the sd (that stores a backup of the db as well) and the Whatsapp encryption key that is backup in the .nomedia file of the Database folder using also the original Whatsapp Decrypt Key that does not indeed extract nothing (at least in my case).

Sent from my SM-G970F using Tapatalk

Oh, yes! I was too happy that I just forgot this was a non-rooted post.

Didn't read that, but just tried and I couldn't find what you said. Maybe Jelly Bean is too old. Thanks anyway!
 

charsi

Member
Aug 15, 2010
43
19
Vancouver
This is what worked for me. Only needs adb installed.

Code:
#!/bin/bash

# inspied by https://github.com/EliteAndroidApps/WhatsApp-Key-DB-Extractor

# uninstall installed version of whatsapp
adb shell pm uninstall -k com.whatsapp

# install old version of whatsapp that allows backing upwith adb
adb install -r -d WhatsApp-2.11.431.apk

# create an app backup with adb
sdkver=$(adb shell getprop ro.build.version.sdk | tr -d '[[:space:]]')
if [ $sdkver -ge 23 ]; then
    adb backup -f whatsappData.ab com.whatsapp
else
    adb backup -f whatsappData.ab -noapk com.whatsapp
fi

# Conervert backed up data to .tar
if [ -f whatsappData.ab ]; then
    if [ -f abe-all.jar ]; then
        ## Get abe-all.jar from https://github.com/nelenkov/android-backup-extractor
        java -jar abe-all.jar unpack whatsapp.ab whatsapp.tar ""
        tar -xvf whatsapp.tar
    else
        ( printf "\x1f\x8b\x08\x00\x00\x00\x00\x00" ; tail -c +25 whatsappData.ab ) > whatsappData.tar
        tar -xvf whatsapp.tar
    fi
fi

# install latest whatsapp version again
adb install -r -d WhatsApp_2.20.202.16.apk

In whatsapp.tar file I found msgstore.db that was unencrypted. I opened it with sqlite browser
To install sqlite browser -
Code:
sudo apt-get install sqlite3 sqlitebrowser
 
Last edited:

PIRATA!

Senior Member
Dec 6, 2010
2,714
173
This is what worked for me. Only needs adb installed.



Code:
#!/bin/bash

adb install -r -d WhatsApp-2.11.431.apk

sdkver=$(adb shell getprop ro.build.version.sdk | tr -d '[[:space:]]')

if [ $sdkver -ge 23 ]; then

  adb backup -f whatsapp.ab com.whatsapp

else

  adb backup -f whatsapp.ab -noapk com.whatsapp

fi

if [ -f whatsapp.ab ]; then

  ( printf "\x1f\x8b\x08\x00\x00\x00\x00\x00" ; tail -c +25 whatsapp.ab ) > whatsapp.tar

fi



In whatsapp.tar file I found msgstore.db that was unencrypted. I opened it with sqlite browser

To install sqlite browser -

Code:
sudo apt-get install sqlite3 sqlitebrowser
How unencrypted?!

The db extracted should then be decrypted with the key to be read.

Are you rooted?

Sent from my SM-G970F using Tapatalk
 

charsi

Member
Aug 15, 2010
43
19
Vancouver
I am not rooted.
With backup made with adb the db files are obtained in their unencrypted version already.
The key is only needed to decrypt the backups within whatsapp. But if you still want the key it is also in the tar file.
Tar can be extracted with the command `tar -xvf whatsappData.tar`
 
Last edited:

felisco

Member
Feb 26, 2014
6
0
Hi everybody,

I've been thinking about extracting the Whatsapp key and reached this post. And I would like to let you know what I've tried. Sorry if this thread is not the correct place.

- Created an avd using android studio.
- Added my google account in the avd.
- Intalled Whatsapp last version on it and validated with the number received by sms on my phone.
- Opened Android studio Device File Explorer in root mode.
- Then I haven't found the key where it is supposed to be (/data/data/com.whatsapp/files/key), but in /mnt/expand/4355a340-91a2-4e1e-b2ba-89d56d224923/user/0/com.whatsapp/files/key.
- I've tried to use the key to decrypt msgstore.db.crypt12 but it didn't work.

I don't know if this method would work doing something I'm missing. I'm not very used to work with avd's and android. Does anybody have any idea?

Thank you.
 

dannymx

Member
Jul 15, 2016
29
12
This works at Windows for my Note 20 ultra device.

What you need to do is replace below 2 files, the batch script works without any modification
bin\abe.jar -> download latest version of android-backup-extrator
tmp\LegacyWhatsApp.apk -> download whatsapp 2.11.431 apk from android-apk

Listen to this guy! Specially on the abe.jar thing, that file is OUTDATED and can't unpack the backup made by the script, what you need to do is to grab a new version of that file from this repo https://github.com/nelenkov/android...s/download/20181012025725-d750899/abe-all.jar
Just rename it abe.jar and replace the old file.

I forked the original project to save you all those steps: https://github.com/Dannymx/WhatsApp-Key-DB-Extractor/archive/v4.8.zip

Just download and unzip and try it. I haven't tested it but it should work.

Before I was getting the following message:
Code:
java -jar bin/abe.jar unpack tmp/whatsapp.ab tmp/whatsapp.tar
Exception in thread "main" java.lang.reflect.InvocationTargetException
        at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
        at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
        at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
        at java.base/java.lang.reflect.Method.invoke(Method.java:566)
        at org.eclipse.jdt.internal.jarinjarloader.JarRsrcLoader.main(JarRsrcLoader.java:58)
Caused by: java.lang.RuntimeException: java.lang.IllegalArgumentException: Don't know how to process version 5
        at org.nick.abe.AndroidBackup.extractAsTar(AndroidBackup.java:420)
        at org.nick.abe.Main.main(Main.java:128)
        ... 5 more
Caused by: java.lang.IllegalArgumentException: Don't know how to process version 5
        at org.nick.abe.AndroidBackup.extractAsTar(AndroidBackup.java:282)
        ... 6 more

But now successfully I get:
Code:
java -jar bin/abe.jar unpack tmp/whatsapp.ab tmp/whatsapp.tar
0% 1% 2% 3% 4% 5% 6% 7% 8% 9% 10% 11% 12% 13% 14% 15% 16% 17% 18% 19% 20% 21% 22% 23% 24% 25% 26% 27% 28% 29% 30% 31% 32% 33% 34% 35% 36% 37% 38% 39% 40% 41% 42% 43% 44% 45% 46% 47% 48% 49% 50% 51% 52% 53% 54% 55% 56% 57% 58% 59% 60% 61% 62% 63% 64% 65% 66% 67% 68% 69% 70% 71% 72% 73% 74% 75% 76% 77% 78% 79% 80% 81% 82% 83% 84% 85% 86% 87% 88% 89% 90% 91% 92% 93% 94% 95% 96% 97% 98% 99% 100%
198443012 bytes written to tmp/whatsapp.tar.

That .tar includes everything you need to open your encrypted databases with Whatsapp Viewer.

I tested this on Galaxy S10 Plus on the latest Android version (November 2020) on Windows 10.
Hope that helps.
 
Last edited:

Top Liked Posts

  • There are no posts matching your filters.
  • 2
    The key extractor works well if you put 2 "pause" commands into "WhatsAppKeyDBExtract.bat":
    1) After "Removal complete". At this pause you need to reboot your smartphone to avoid Android error about downgrade during an old WhatsApp version installation.
    2) After "Install complete". At this pause you need to run WhatsApp on your smartphone. The run will fail but this makes possible WhatsApp backup creation on further steps of "WhatsAppKeyDBExtract.bat".
  • 47
    ** Version 4.7 Updated October 2016 - Supports Android 4.0-7.0 **

    SUMMARY:
    Allows WhatsApp users to extract their cipher key and databases on non-rooted Android devices.
    UPDATE: This tool was last updated on October 12th 2016. and confirmed working on Android 4.0-7.0 using WhatsApp version v2.16.304 (latest available).
    IMPORTANT: If you wish to extract media files or WhatsApp databases from Google Drive backups then you need: WhatsApp Google Drive Extractor instead.

    TUTORIAL:

    BRANCH UPDATES:
    v4.0 - Fixed issues with Android API 14-17 (4.0-4.2 Jelly Bean).
    v4.1 - Added support for Android API 23 (6.0-6.0.1 Marshmallow).
    v4.2 - Added support for specifying adb backup passwords.
    v4.3 - Added PowerShell version as optional alternative to bat version.
    v4.4 - Changed primary mirror for legacy apk.
    v4.5 - Fixed issue pushing cipher key to emulated storage.
    v4.6 - Updated primary mirror for legacy apk (again).
    v4.7 - Added new sanity checks and support for Android API 24 (7.0 Nougat).

    PREREQUISITES:

    1. O/S: Windows Vista, Windows 7, Windows 8, Windows 10, Mac OS X or Linux
    2. Java - If not installed: Download Java
    3. ADB (Android Debug Bridge) Drivers
    4. USB Debugging* must be enabled on the target device. Settings -> Developer Options -> (Debugging) USB debugging
    5. Android device with Android 4.0 or higher. I.E. Ice Cream Sandwich, Jelly Bean, KitKat, Lollipop, Marshmallow or Nougat.
    *= If you cannot find Developer Options then please go to: Settings -> About phone/device and tap the Build number multiple times.

    INSTRUCTIONS:

    1. Extract WhatsApp-Key-DB-Extractor-master.zip maintaining the directory structure.
    2. Click on WhatsAppKeyDBExtract.bat (Windows) or WhatsAppKeyDBExtract.sh (Mac OS X / Linux).
    3. Connect your device via USB, unlock your screen and wait for Full backup to appear.
    4. Enter your backup password or leave blank (if none set) and tap on Back up my data.
    5. Confirm backup password in your command console and then check the "extracted" folder.

    TROUBLESHOOTING:

    1. If you have never used USB Debugging before, you may also need to verify the fingerprint.
    2. If you have set a default backup password in your Android settings, then this MUST be the
      backup password that you provide when prompted to backup your data. Else it WILL fail!
    3. Linux and Mac OS X users may need to set the script permissions as executable. Depending on the
      adb permissions, you may also need to sudo ./WhatsAppKeyDBExtract.sh from your command console.
    4. If you're having issues with WhatsAppKeyDBExtract.bat then right click WhatsAppKeyDBExtract.ps1
      and select Run with PowerShell. You may have to enter "y" at first run for script execution policy.
    5. If you get an error saying "AES encryption not allowed" then you need to update your Oracle Java
      Cryptography Extension (JCE) to Unlimited Strength Jurisdiction Policy Files.

    DOWNLOAD: WhatsApp-Key-DB-Extractor-master.zip


    AUTHOR: TripCode
    THANKS: dragomerlin for Android Backup Extractor and Abinash Bishoyi for being cool.
    3
    I will try this evening/night (ADT - Atlantic Daylight Time / ADST Atlantic Daylight Saving Time ... or currently UTC-3) :p

    Here it is:
    https://github.com/p4r4d0x86/WhatsApp-Key-DB-Extractor/archive/v4.7-E1.0.zip

    And the new UNTESTED merjapp.jar is here:
    https://github.com/p4r4d0x86/merjapp/releases/download/v190508/merjapp.jar
    2
    Yes, this is a normal backup method. There are automatic tools that do the same without using PC, just on device side.

    Apart from normal ADB method, you could use ECLIPSE for that, using the memory module, you could transfer files from and in.

    If you have physical access to the device, there are many solutions.

    regards.

    The only way to access private application files (such as a WhatsApp's cipher key) without root is the ADB method. You can backup some files on the device without a PC (APK's etc...), but there is currently no way to access private files and folders. All the "My Big Fat Backup" style apps and tools will either require root or ADB. Eclipse also utilizes ADB. Basically, device side backups of application data require root. There are no other alternatives to this. If there was, then Android would be too infeasible and insecure as a viable operating system. Physical access translates into only two solutions. 1.) The ability to root and 2.) The ability to utilize ADB (Eclipse, Bats, Exe's doing nothing more than calling a simple command line). Of course if you are aware of a 3rd method (disregarding the user interface) and is not based on root or ADB then please feel free to share. :)
    2
    Just extracted WhatsApp data from:
    - Lenovo P2 under Android 7.0
    - Galaxy S8 under Android 9.0

    I spent 4 hours on the script to apply fixes and improve it.
    I will "publish" it soon.

    Few tips before publishing (they will be in the script):
    - If you get an error during the downgrade, reboot your phone before installing the downgrade
    - I kept the "adb backup" command but before executing it, you have to LAUNCH the downgraded application! (Tested multiple times, without this launch, the backup was empty or corrupted)
    - Update "adb.exe" (and libs) and "abe.jar" (thanks @progman321 for the tips)
    2
    The key extractor works well if you put 2 "pause" commands into "WhatsAppKeyDBExtract.bat":
    1) After "Removal complete". At this pause you need to reboot your smartphone to avoid Android error about downgrade during an old WhatsApp version installation.
    2) After "Install complete". At this pause you need to run WhatsApp on your smartphone. The run will fail but this makes possible WhatsApp backup creation on further steps of "WhatsAppKeyDBExtract.bat".