Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature request: msg3.0.db的读取 #6

Open
nooooocato opened this issue Mar 28, 2023 · 19 comments
Open

Feature request: msg3.0.db的读取 #6

nooooocato opened this issue Mar 28, 2023 · 19 comments
Assignees

Comments

@nooooocato
Copy link

nooooocato commented Mar 28, 2023

有笨比基友被封号了,想拿Windows下PC版的聊天记录(msg3.0.db)找回QQ好友…………

我有在吾爱和看雪看到方法和讨论,但我太菜了不会操作TT

https://bbs.kanxue.com/thread-266370.htm
https://bbs.kanxue.com/thread-250509.htm
https://www.52pojie.cn/thread-1370802-1-1.html
https://www.52pojie.cn/thread-1386731-1-1.html

来求佬们考虑一下…………?

@Young-Lord
Copy link
Member

Young-Lord commented Mar 28, 2023

我在这方面不是很懂…多半很难
而且这个db文件密码貌似是登录后才能获取到得吧?

@nooooocato
Copy link
Author

看按照佬们的博客操作,好像图中只要登陆中就可以拿到key。(不知道封号的账号发不发key)

有人造获key轮:https://github.com/Mrs4s/qq-db-key-injector
不知道能不能和贵项目的dumper结合?

实在不行……等一个能人智士?

不想做也留不住的话close也罢🥺 感谢

@Young-Lord
Copy link
Member

看了下你说的这个repo,貌似有可行性,稍后试一试

@Young-Lord
Copy link
Member

Young-Lord commented Apr 8, 2023 via email

@Young-Lord
Copy link
Member

x64dbg已经提取到了 key,但是由于sqlite3_key函数调用的原因目前还没有成功解密
由于提取 key 并解密这个过程太麻烦且无法跨平台(并且我也没有 MacOS 用于测试),所以这部分我应该会单独写一篇博文(而不是在这个项目里实现),然后这个项目只负责处理解密后的文件

@nooooocato
Copy link
Author

好耶,虽然看得有点晚。很高兴大佬有新进展!

@Young-Lord
Copy link
Member

话说这个提取key的项目你能跑起来吗
刚也看到了一个dumper https://github.com/Akegarasu/qmsg-unpacker

@Young-Lord
Copy link
Member

解密成功。教程之类的之后发。

@nooooocato
Copy link
Author

话说这个提取key的项目你能跑起来吗 刚也看到了一个dumper https://github.com/Akegarasu/qmsg-unpacker

不好意思没怎么看邮件,欸嘿~

@nooooocato
Copy link
Author

解密成功。教程之类的之后发。

谢谢大佬!!!🥳🥳🥳🥳

@Young-Lord
Copy link
Member

Young-Lord commented May 3, 2023

https://github.com/Young-Lord/qq-win-db-key

之后会优化下教程,不会的话可以等一等

@Young-Lord
Copy link
Member

Young-Lord commented May 7, 2023

现在这个有风险的教程应该是相当的易懂了。
(虽然还是建议先用第一种方法备份一份可用的 Msg3.0.db 和 对应 key)
解密后的数据库直接用那个 https://github.com/Akegarasu/qmsg-unpacker 就行,我短时间内应该也不会写

@ygjsz
Copy link

ygjsz commented May 7, 2023

TIM 3.3.5测试通过 能正常解密数据库
可惜的是我数据库太大了导致qmsg-unpacker没办法解出明文聊天数据

@Young-Lord
Copy link
Member

TIM 3.3.5测试通过 能正常解密数据库 可惜的是我数据库太大了导致qmsg-unpacker没办法解出明文聊天数据

用的是DANGER.py还是分步的?想实验下danger会不会搞爆数据库(

@ygjsz
Copy link

ygjsz commented May 7, 2023

TIM 3.3.5测试通过 能正常解密数据库 可惜的是我数据库太大了导致qmsg-unpacker没办法解出明文聊天数据

用的是DANGER.py还是分步的?想实验下danger会不会搞爆数据库(

分步 有空我用danger试试看(
*我那个Msg3.0库5G多一点

@Young-Lord
Copy link
Member

分步 有空我用danger试试看( *我那个Msg3.0库5G多一点

大意了
腾讯的 rekey 貌似是内置密钥轮换一类机制的,即使 rekey 回去下一次用同一个 key 也解锁不了

@ygjsz
Copy link

ygjsz commented May 8, 2023

寄 那看来以后提取好key之后还得备份一份目前的Msg3.0库

@Young-Lord
Copy link
Member

其实把DANGER改成那个C的算法应该就可以

@Young-Lord
Copy link
Member

其实把DANGER改成那个C的算法应该就可以

fin.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants