
The tool is for testing purposes and should ONLY be used on iPhone backups where the owner's consent has been given. ContributingĭISCLAIMER: This tool enables the extraction of personal information from iPhone backups located on a computer drive. You should make a backup of the backups you look at using this tool, even though they are opened as read-only, you should still do that do you don't accidentally do something to lose data. Ibackuptool -b $UDID -r backup.files -extract ~/Desktop/Photos -filter DCIM -regex-filter '\.(jpg|JPG|jpeg|JPEG)$ ' Running Tests # Export all JPEG photos onto "~/Desktop/Photos" The full report list is available on the wiki Installing (as a module) Some reports, will output an error message if files that are required are not present in the backup. When a report type is not supported, an error message is outputted to the terminal.

IOS Support depends on the individual reporting types and which files are specifically present inside of the backup. Please read the wiki for more up-to-date and in-depth examples, and examples of how to make and use reports. This readme is intended to be an overview of features.

This tool is also still fairly experimental, so use at your own risk! Even though the tool opens the backup files as read-only, you should still make a copy of your backups before using this if they are important.Ĭurrently works on macOS, not tested extensively on windows but should function properly. Are you storing unencrypted iPhone backups on your personal computer? With very little effort, we can dump all the saved messages from the backup, as well as notes, photo locations, and other data.Ĭheck out my recently updated post about my work on backups here: Reverse Engineering the iOS Backup
