From 83785f42d4a57c810060826b914c0bfdb8cf8a86 Mon Sep 17 00:00:00 2001 From: Knugi <24708955+KnugiHK@users.noreply.github.com> Date: Tue, 25 Jul 2023 08:59:03 +0000 Subject: [PATCH] Updated Android Usage (markdown) --- Android-Usage.md | 21 ++++++++++++--------- 1 file changed, 12 insertions(+), 9 deletions(-) diff --git a/Android-Usage.md b/Android-Usage.md index 65188ca..3ffc511 100644 --- a/Android-Usage.md +++ b/Android-Usage.md @@ -6,32 +6,35 @@ After you obtain your WhatsApp database, copy the WhatsApp database and media fo And now, you should have something like this in the working directory. -![Android folder structure](imgs/android_structure.png) -### Extracting +![Android folder structure](https://github.com/KnugiHK/WhatsApp-Chat-Exporter/blob/main/imgs/android_structure.png) +#### Extracting Simply invoke the following command from shell. ```sh wtsexporter -a ``` -### Encrypted Android WhatsApp Backup +## Encrypted Android WhatsApp Backup In order to support the decryption, install pycryptodome if it is not installed ```sh pip install pycryptodome # Or pip install whatsapp-chat-exporter["android_backup"] # install along with this software ``` -#### Crypt12 or Crypt14 +## Crypt15 is now the easiest way to decrypt a backup. If you have the 32 bytes hex key generated when you enable End-to-End encrypted backup, you can use it to decrypt the backup. If you do not have the 32 bytes hex key, you can still use the key file extracted just like extacting key file for Crypt12 and Crypt14 to decrypt the backup. +### Crypt12 or Crypt14 +You will need the decryption key file from your phone. If you have root access, you can find it as `/data/data/com.whatsapp/files/key`. Otherwise, if you used WhatsApp-Key-DB-Extractor before, it will appear in the WhatsApp backup directory as `WhatsApp/Databases/.nomedia`. + Place the decryption key file (key) and the encrypted WhatsApp Backup (msgstore.db.crypt14) in the working directory. If you also want the name of your contacts, get the contact database, which is called wa.db. And copy the WhatsApp (Media) directory from your phone directly. And now, you should have something like this in the working directory. -![Android folder structure with WhatsApp Backup](imgs/android_structure_backup.png) -#### Extracting +![Android folder structure with WhatsApp Backup](https://github.com/KnugiHK/WhatsApp-Chat-Exporter/blob/main/imgs/android_structure_backup.png) +### Extracting Simply invoke the following command from shell. ```sh wtsexporter -a -k key -b msgstore.db.crypt14 ``` -#### Crypt15 (End-to-End Encrypted Backup) +### Crypt15 (End-to-End Encrypted Backup) To support Crypt15 backup, install javaobj-py3 if it is not installed ```sh pip install javaobj-py3 # Or @@ -42,8 +45,8 @@ If you do not have the 32 bytes hex key (64 hexdigits), place the decryption key Now, you should have something like this in the working directory (if you do not have 32 bytes hex key). -![Android folder structure with WhatsApp Crypt15 Backup](imgs/android_structure_backup_crypt15.png) -##### Extracting +![Android folder structure with WhatsApp Crypt15 Backup](https://github.com/KnugiHK/WhatsApp-Chat-Exporter/blob/main/imgs/android_structure_backup_crypt15.png) +#### Extracting If you do not have 32 bytes hex key but have the key file available, simply invoke the following command from shell. ```sh wtsexporter -a -k encrypted_backup.key -b msgstore.db.crypt15