±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 35896
New Yesterday: 1 Visitors: 134

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Videos

±Latest Jobs

Main.enc Blackberry messenger

Discussion of forensic issues related to all types of mobile phones and underlying technologies (GSM, GPRS, UMTS/3G, HSDPA, LTE, Bluetooth etc.)
Subforums: Mobile Telephone Case Law
Reply to topicReply to topic Printer Friendly Page
Forum FAQSearchView unanswered posts
 
  

minime2k9
Senior Member
 

Main.enc Blackberry messenger

Post Posted: Jun 15, 15 12:12

I have a physical image of an IPhone 4s and I'm trying to extract the Blackberry Messenger Database to get the messages from it.

All the references I have seen on other websites show the file as main.db, not .enc and looking at the file it appears to whole Sqlite database is encrypted.

The Iphone has a complex passcode on it which means I have not been able to do a logical/filesystem extraction using UFED/XRY.

My questions are:
Is there any way to decrypt the database file as it is currently in its .enc state?
Would a logical/filesystem extraction recover a decrypted version of this file?
If so where would I locate the hash of the complex password to crack (i'm assuming it would be with John the Ripper or similar)?

Thanks for any help in advance!  
 

Page 1 of 1