![]() |
7 роки тому | |
---|---|---|
tools | 7 роки тому | |
.gitignore | 8 роки тому | |
Readme.md | 7 роки тому | |
package.json | 7 роки тому |
Are you storing unencrypted iPhone backups on your personal computer? With very little effort, we can dump all the saved messages from the backup, as well as notes, photo locations, and other data.
Check out my recently updated post about my work on backups here: Reverse Engineering the iOS Backup
This tool is also still fairly experimental, so use at your own risk! Even though the tool opens the backup files as read-only, you should still make a copy of your backups before using this if they are important.
Currently works on macOS, If someone wants to make the changes nessecary for windows, send a PR.
2.4
3.2
3.2
# Install directly from NPM
npm i -g ibackuptool
# If you prefer, you can do this manually:
# Clone this repo, then run:
# Install Globally on your system.
npm i -g
# Or, If you really want:
# Clone this repo, then run:
npm install
run `node tools/index.js` # use this instead of ibackuptool
# List all the backups on the system
ibackuptool -l
# I'm using "0c1bc52c50016933679b0980ccff3680e5831162" as a placeholder.
# The list of backups contains the different UDIDs in the first column.
UDID="0c1bc52c50016933679b0980ccff3680e5831162"
ibackuptool -b <udid> --report <type>
Current types:
apps
- List all installed applications and container IDs.calls
- List all call records contained in the backup.conversations
- List all SMS and iMessage conversationslist
- List of all backups. alias for -lmanifest
- List all the files contained in the backup (iOS 10+)messages
- List all SMS and iMessage messages in a conversationnotes
- List all iOS notesoldnotes
- List all iOS notes (from older unused database)photolocations
- List all geolocation information for iOS photos (iOS 10+)voicemail-files
- List all or extract voicemail files (iOS 10+)voicemail
- List all or extract voicemails on devicewebhistory
- List all web historywifi
- List associated wifi networks and their usage information
# Using a UDID from the previous step, now you can run:
# List Installed Apps
ibackuptool -b $UDID --report apps
# List Recent Web History
ibackuptool -b $UDID --report webhistory
# List Recent Photos Geolocations (iOS 10+)
ibackuptool -b $UDID --report photolocations
# List iOS Notes
ibackuptool -b $UDID --report notes
# List iOS Notes from old database that may exist
ibackuptool -b $UDID --report oldnotes
# List calls
ibackuptool -b $UDID --report calls
# List voicemails
ibackuptool -b $UDID --report voicemail
# List voicemail files (iOS 10+)
ibackuptool -b $UDID --report voicemail-files
# Export voicemail files (iOS 10+)
ibackuptool -b $UDID --report voicemail-files --export ./ExportedVoicemails
# List wifi networks
ibackuptool -b $UDID --report wifi
# List of all conversations, indexed by ID.
# Each row starts with an ID number, which is needed for the next step.
ibackuptool -b $UDID --conversations
ibackuptool -b $UDID --report conversations
# Now, Fetch the messages with the following command
# Replace $CONVERSATION_ID with a row ID from `ibackuptool -b $UDID --conversations`
ibackuptool -b $UDID --messages $CONVERSATION_ID
ibackuptool -b $UDID --report messages --messages $CONVERSATION_ID
--dump
flag to the program.I'd recommend piping this output to a file.
You should make a backup of the backups you look at using this tool, even though they are opened as read-only, you should still do that do you don't accidentally do something to lose data.