Skip to content

Extracting tokens from encrypted backup #412

@Esgariot

Description

@Esgariot

Hi,

I'm trying to extract token secrets from encrypted backup.

I've managed to extract authenticator.plist, which contains multiple entries that resemble base64, but do not decode into valid utf-8.

Here's the steps that got me there:

  1. Create local encrypted backup of your device, as specified in https://support.apple.com/en-us/HT205220
  2. use https://github.com/jsharkey13/iphone_backup_decrypt (you will find backups in ~/Library/Application Support/MobileSync/Backup/
  3. Specify the passphrase
  4. extract Library/Preferences/me.mattrubin.authenticator.plist using extract_file
  5. Convert the plist from binary to xml using plutil -convert xml1 <plist file>

I've noticed that all the secret entries fit the Z2VucXXXXXXXXXXXXXXXXXXXXXX= pattern.
Is it possible to decode it further? I suppose it would represent the Token object, serialized

Metadata

Metadata

Assignees

No one assigned

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions