ElDavoo / wa-crypt-tools

Manage WhatsApp .crypt12, .crypt14 and .crypt15 files.
GNU General Public License v3.0
583 stars 78 forks source link

[E] Unexpected backup type: 81 #57

Closed gekigek99 closed 1 year ago

gekigek99 commented 1 year ago

Hexdump of your key file

> Format-Hex .\encrypted_backup.key

           Percorso: C:\Users\gekigek99\WhatsApp-Crypt14-Crypt15-Decrypter\db\encrypted_backup.key

           00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F

00000000   AC ED 00 05 75 72 00 02 5B 42 AC F3 17 F8 06 08  ¬í..ur..[B¬ó.ø..
00000010   54 E0 02 00 00 78 70 00 00 00 20 4B DF 90 04 BF  Tà...xp... Kß
00000020   42 2F CB 12 0E 4F 1A 4D 62 87 FB 57 C2 B9 44 D5  B/Ë..O.MbûW¹DÕ
00000030   FB BF 94 C4 F6 38 12 D0 EF 1C 1E                 û¿Äö8.Ðï..     

**Hexdump of the encrypted DB

Format-Hex .\msgstore.db.crypt15

           Percorso: C:\Users\gekigek99\WhatsApp-Crypt14-Crypt15-Decrypter\db\msgstore.db.crypt15

           00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F

00000000   53 51 4C 69 74 65 20 66 6F 72 6D 61 74 20 33 00  SQLite format 3.
00000010   10 00 02 02 00 40 20 20 00 04 83 0F 00 01 18 2D  .....@  ......-
00000020   00 00 00 00 00 00 00 00 00 00 50 4A 00 00 00 04  ..........PJ....
00000030   00 00 00 00 00 00 01 13 00 00 00 01 00 00 00 01  ................
00000040   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
00000050   00 00 00 00 00 00 00 00 00 00 00 00 00 04 83 0F  ...............
00000060   00 2E 1C B0 05 0F F6 00 20 0F 41 00 00 01 17 1B  ...°..ö. .A.....
00000070   0F F1 0F EC 0F E7 0F E2 0F DD 0F D7 0F CB 0F C5  .ñ.ì.ç.â.Ý.×.Ë.Å
00000080   0F BF 0F B9 0F B3 0F AD 0F A7 0F 8F 0F 95 0F 89  .¿.¹.³.­.§...
00000090   0F 83 0F 7D 0F 77 0F D1 0F 71 0F 6B 0F 5F 0F 65  ..}.w.Ñ.q.k._.e
000000A0   0F A1 0F 9B 0F FA 0F 59 0F 53 0F 4D 0F 47 0F 41  .¡..Y.S.M.G.A
000000B0   74 5F 6C 69 73 74 63 68 61 74 5F 6C 69 73 74 09  t_listchat_list.
000000C0   43 52 45 41 54 45 20 54 41 42 4C 45 20 63 68 61  CREATE TABLE cha
000000D0   74 5F 6C 69 73 74 20 28 5F 69 64 20 49 4E 54 45  t_list (_id INTE
000000E0   47 45 52 20 50 52 49 4D 41 52 59 20 4B 45 59 20  GER PRIMARY KEY
000000F0   41 55 54 4F 49 4E 43 52 45 4D 45 4E 54 2C 20 6B  AUTOINCREMENT, k
00000100   65 79 5F 72 65 6D 6F 74 65 5F 6A 69 64 20 54 45  ey_remote_jid TE
00000110   58 54 20 55 4E 49 51 55 45 2C 20 6D 65 73 73 61  XT UNIQUE, messa
00000120   67 65 5F 74 61 62 6C 65 5F 69 64 20 49 4E 54 45  ge_table_id INTE
00000130   47 45 52 2C 20 73 75 62 6A 65 63 74 20 54 45 58  GER, subject TEX
.... 250MB

Program output using -v and -f

python .\decrypt14_15.py .\db\encrypted_backup.key .\db\msgstore.db.crypt15 .\db\out.db -v -f  
[V] Reading keyfile...
[I] Crypt15 / Raw key loaded
[V] Key(key: 9680fad65770ead699e9e7c2a0e3c489f9c83814b04e9c61d2e478d527005641)
[V] Not a Crypt12 file, or corrupted
[V] Parsing database header...
[E] Unexpected backup type: 81
Error parsing message
[E] Could not parse the protobuf message. Please report a bug.
[E] The database file is not encrypted.
    Did you swap the input and the output files by mistake?
[I] WhatsApp version not found (Crypt12?)
[F] Could not create a decryption cipher

Additional context

ElDavoo commented 1 year ago

Your backup is already decrypted.

gekigek99 commented 1 year ago

Could you add a notification saying that in the script?

(And also add in the readme that to read that file you need sqlite to read the cript15 file)

(Spent 2h understanding that cause online it's full of paytouse bullshit)

ElDavoo commented 1 year ago

[E] The database file is not encrypted.

It's there...

gekigek99 commented 1 year ago

Yeah right infact that was the line that made me suspect of that.

I just think it's a very important info which is mixed with all the other errors (which i think shouldnt even be there if the file is already decrypted)

Like, the logs are telling me to report a bug ahah :)

...let alone the fact that you have to use the force parameter to see it.