diff --git a/index.html b/index.html index 73ede96..74c6b50 100644 --- a/index.html +++ b/index.html @@ -424,6 +424,7 @@ cd working_wts

Extract the WhatsApp database with whatever means, one possible means is to use the WhatsApp-Key-DB-Extractor. Note that the extractor only works on Android 4.0 to 13.

After you obtain your WhatsApp database, copy the WhatsApp database and media folder to the working directory. The database is called msgstore.db. If you also want the name of your contacts, get the contact database, which is called wa.db. And copy the WhatsApp (Media) directory from your phone directly.

And now, you should have something like this in the working directory.

+

Android folder structure

Extracting

Simply invoke the following command from shell.

wtsexporter -a
@@ -446,6 +447,7 @@ pip install whatsapp-chat-exporter["android_backup"] # install along w
 

You will need the decryption key file from your phone. If you have root access, you can find it as /data/data/com.whatsapp/files/key. Otherwise, if you used WhatsApp-Key-DB-Extractor before, it will appear in the WhatsApp backup directory as WhatsApp/Databases/.nomedia.

Place the decryption key file (key) and the encrypted WhatsApp Backup (msgstore.db.crypt14) in the working directory. If you also want the name of your contacts, get the contact database, which is called wa.db. And copy the WhatsApp (Media) directory from your phone directly.

And now, you should have something like this in the working directory.

+

Android folder structure with WhatsApp Backup

Extracting

Simply invoke the following command from shell.

wtsexporter -a -k key -b msgstore.db.crypt14
@@ -459,6 +461,7 @@ pip install whatsapp-chat-exporter["crypt15"] # install along with thi
 

Once you have copied the backup files to your computer, place the encrypted WhatsApp backup file (msgstore.db.crypt15) into the working directory. If you also wish to include your contacts' names, obtain the contact database file, named wa.db. Additionally, copy the WhatsApp Media folder directly from your phone.

If you do not have the 32 bytes hex key (64 hexdigits), place the decryption key file (encrypted_backup.key) extracted from Android. If you gave the 32 bytes hex key, simply put the key in the shell.

Now, you should have something like this in the working directory (if you do not have 32 bytes hex key).

+

Android folder structure with WhatsApp Crypt15 Backup

Extracting

If you do not have 32 bytes hex key but have the key file available, simply invoke the following command from shell.

wtsexporter -a -k encrypted_backup.key -b msgstore.db.crypt15
@@ -500,7 +503,9 @@ wtsexporter -i -b "C:\Users\[Username]\Apple\MobileSync\Backup\[device id]&
 

Results

After extracting, you will get these:

Private Message

+

Private Message

Group Message

+

Group Message

More options

Invoke the wtsexporter with --help option will show you all options available.

> wtsexporter --help