Hi, I tried https://github.com/viaforensics/android-encryption/ You need to get /efs/metadata in recovery mode, and then define header_file to this file, and encrypted_partition to the image done as suggested in https://redmine.replicant.us/projects/replicant/wiki/BackupTheDataPartition#Backing-up-the-data-partition However, the second soft seems more complete.
I also tried http://github.com/sogeti-esec-lab/android-fde which allows to launch `./decrypt.py USERDATA.img metadata output/DATA` to put decrypted_data in `output/DATA`. Then I do not succeed to mount it. Do you have any idea how to do this? - Fil Lupin. ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐ On Friday, July 30th, 2021 at 6:32 PM, Denis 'GNUtoo' Carikli via Replicant <replicant@osuosl.org> wrote: > On Fri, 30 Jul 2021 18:55:11 +0200 > > Denis 'GNUtoo' Carikli via Replicant replicant@osuosl.org wrote: > > > It may be referenced on the wiki, but the wiki is currently down for > > > > some reason ("503 Service Unavailable"). We need to contact the OSUOSL > > > > if it stays unavailable. > > It works again. > > I looked on the wiki and bugreports and I didn't find any reference to > > the tool I vaguely remembered. > > While searching again I found that: > > http://github.com/sogeti-esec-lab/android-fde > > https://github.com/viaforensics/android-encryption/ > > You probably need to try some of such tool to find ones that would work > > on Replicant < 9. > > If someone remembers the link for a more generic tool to open > > partitions encrypted by Android, we could add it to the wiki. > > Denis. > > Replicant mailing list > > Replicant@osuosl.org > > https://lists.osuosl.org/mailman/listinfo/replicant _______________________________________________ Replicant mailing list Replicant@osuosl.org https://lists.osuosl.org/mailman/listinfo/replicant