-
Notifications
You must be signed in to change notification settings - Fork 119
Open
Labels
Description
Hi,
I'm trying to extract token secrets from encrypted backup.
I've managed to extract authenticator.plist, which contains multiple entries that resemble base64, but do not decode into valid utf-8.
Here's the steps that got me there:
- Create local encrypted backup of your device, as specified in https://support.apple.com/en-us/HT205220
- use https://github.com/jsharkey13/iphone_backup_decrypt (you will find backups in
~/Library/Application Support/MobileSync/Backup/ - Specify the passphrase
- extract
Library/Preferences/me.mattrubin.authenticator.plistusingextract_file - Convert the plist from binary to xml using
plutil -convert xml1 <plist file>
I've noticed that all the secret entries fit the Z2VucXXXXXXXXXXXXXXXXXXXXXX= pattern.
Is it possible to decode it further? I suppose it would represent the Token object, serialized
Reactions are currently unavailable