Select and Upload your Manifest.plist:
Output:
Notes
- Uploaded files will be deleted immediately. We do NOT store your files.
- This site is using itunes_backup2hashcat from Hashcat for extracting iTunes Backup hashes.
- The goal of this page is to make it very easy to convert iTunes backup files to "hashes" which hashcat can crack with mode: -m 14700 or -m 14800
- Max size: 200 Mb
How to use?
More than easy, just select and upload your Manifest.plist. The hash will be computed in the "Output" part.
Manifest.plist location in Windows and Mac
The iPhone Backup location is slightly different depending on your Windows version:
- For Windows XP: C:\Documents and Settings\{user_name}\Application Data\Apple Computer\MobileSync\Backup\
- For Windows 10/8/7/Vista: C:\Users\{user_name}\AppData\Roaming\Apple Computer\MobileSync\Backup\
- To browse to see the iPhone backup files, you have to enable Windows Explorer to show hidden files.
~/Library/Application Support/MobileSync/Backup/
Explanation of the hash format
If the backup was generated by iOS version less than 10, the hash will look like:
$itunes_backup$*9*b8e3f3a970239b22ac199b622293fe4237b9d16e74bad2c3c3568cd1bd3c471615a6c4f867265642*10000*4542263740587424862267232255853830404566**If the backup was generated by iOS version 10.x, the hash will look like:
$itunes_backup$*10*8b715f516ff8e64442c478c2d9abb046fc6979ab079007d3dbcef3ddd84217f4c3db01362d88fa68*10000*2353363784073608264337337723324886300850*10000000*425b4bb4e200b5fd4c66979c9caca31716052063
Backup system of iTunes
Complete description available at: https://www.theiphonewiki.com/wiki/ITunes_Backup
Credits
Credits go to philsmd, hashcat project ; https://github.com/philsmd/itunes_backup2hashcat/
Manifest.plist content
Binary plist with the following content (dict):
- Applications (dict):
- com.apple.iBooks (dict)
- CFBundleIdentifier (string): com.apple.iBooks
- CFBundleVersion (string): 804
- Path (string): /private/var/mobile/Applications/[GUID]/iBooks.app
- etc. for other apps
- com.apple.iBooks (dict)
- BackupKeyBag (data): (base-64 encoded blob, see below)
- Date (date): yyyy-mm-ddThh:mm:ssZ
- IsEncrypted (bool): false
- Lockdown (dict):
- BuildVersion (string): 9A406
- DeviceName (string)
- ProductType (string): iPhone4,1
- ProductVersion (string): 5.0.1
- SerialNumber (string)
- UniqueDeviceID (string): 20-byte hex
- com.apple.Accessibility (dict):
- InvertDisplayEnabledByiTunes (bool): false
- MonoAudioEnabledByiTunes (bool): false
- VoiceOverTouchEnabledByiTunes (bool): false
- ZoomTouchEnabledByiTunes (bool): false
- com.apple.MobileDeviceCrashCopy (dict):
- ShouldPrompt (bool): false
- ShouldSubmit (bool): false
- com.apple.TerminalFlashr (dict): (empty)
- com.apple.iTunes.backup (dict):
- LastBackupComputerName (string)
- LastBackupComputerType (string): PC
- com.apple.itunesstored (dict):
- AccountAvailableServiceTypes (integer): 0
- AccountKind (integer): 0
- AccountServiceTypes (integer): 0
- AccountSocialEnabled (bool): false
- AccountStoreFront (string): (unknown text string)
- AccountURLBagType (string): production
- AppleID (string)
- CreditDisplayString (string): (empty string)
- DSPersonID (integer)
- TempStorefront (string): (unknown text string)
- com.apple.mobile.data_sync (dict):
- Bookmarks (dict):
- AccountNames (array of string, 1 element): iCloud
- Sources (array of string, 1 element): iCloud
- Calendars (dict):
- AccountNames (array of string, 1 element): iCloud
- Sources (array of string, 1 element): iCloud
- Contacts (dict):
- AccountNames (array of string, 1 element): iCloud
- Sources (array of string, 1 element): iCloud
- Bookmarks (dict):
- com.apple.mobile.iTunes.accessories (dict): (empty)
- com.apple.mobile.wireless_lockdown (dict): (empty)
- SystemDomainsVersion (string): 12.0
- Version (string): 9.0
- WasPasscodeSet (bool): false
Disclaimer
It's essential to note that tools like John the Ripper or hashcat are powerful and can be misused. We strongly advise using these tools responsibly and ethically. Always ensure that you have permission before attempting to crack passwords, and familiarize yourself with local laws and organizational security policies. Misuse of these tools can lead to severe legal repercussions and breach of ethical standards.
Further reading
- http://blogs.oreilly.com/iphone/2008/05/iphone-backups-part-1.html
- http://blogs.oreilly.com/iphone/2008/05/iphone-backups-part-2.html
- http://blogs.oreilly.com/digitalmedia/2008/05/iphone-backups-part-3.html
- http://blogs.oreilly.com/iphone/2008/06/recovering-data-from-mdbackup.html
- http://blogs.oreilly.com/iphone/2008/06/iphone-backups-part-4.html
- http://blogs.oreilly.com/iphone/2008/07/iphone-backups-part-5-even-mor.html
- http://www.tuaw.com/2008/08/21/mission-tuawpossible-back-up-your-iphone-with-time-machine/