5/26/2023 0 Comments Boinc authorization failure![]() This post was made possible by building on the previous work done here: Once you verify everything works fine, you can uninstall the old FreeOTP, and your switch to FreeOTPPlus is complete. Also, you can back it up, or export a new file to be backed up from the FreeOTPPlus app itself.įeel free to test your 2FA TOTP logins. Now you can transfer this file to your android phone, import this file into FreeOTPPlus app. Install FreeOTPPlus app from Google app store. The result is a JSON file located in the same folder where the tokens.xml sits, with a GUID in its filename, for example:įreeotpplus-backup-af8a8416-6e18-a307-bd9c-f2c947bbb3aa.json Test with FreeOTPPlus $ node freeotp-xml-to-json.js /path/to/my/tokens.xml ![]() In the same folder where you have freeotp-xml-to-json.js, run with the full path to the tokens.xml file: This is the way to run it (make sure you have nodejs installed).įirst make sure the dependencies from nodejs are installed – run this in the same folder where you have the conversion freeotp-xml-to-json.js script: The conversion script can be downloaded from here: Use the following nodejs (javascript) file to convert the extracted tokens.xml into a JSON file which can then be imported into FreeOTPPlus: Once the tar file has been decompressed, drill down through the extracted folders until you find a file tokens.xml: this is the file with your secrets. Decompress the tar file with the following command: The resulting tar file contains the usable FreeOTP configuration data, and the added header allows us to decompress its contents properly. The second command appends new header information to the file and saves it as decompressed-data.tar. The first command uses the dd utility to rewrite the new file, saving it as compressed-data and skipping the first 24 bytes of data from the source. $ dd if=freeotp.ab bs=1 skip=24 > compressed-data The following commands will create a tar file, that when uncompressed, will reveal the app data – including your tokens. Now you have a file called freeotp.ab – we need to convert it to something usable. The following command should be issued inside a new, clean folder – it will copy your FreeOTP data from the phone onto the local file system: The prompt should change to something like this (notice a funny string before the colon, then a slash): Once installed, you can confirm that ADB is working by connecting your mobile phone to your computer with a USB cable, opening a command prompt, and typing in the command: ![]() Tap on it and under the Debugging section, turn on the switch for USB Debugging.Īfter you’re all done with this, you can turn off the Developer Options. Go back up through the menus, and you will notice a new option available: Developer Options. Go to phone Settings > Software information and tap 7 times on the Build number. In this step we will extract the secrets from the android phone (no root is needed).ĭISCLAIMER: we are using a computer running a GNU/Linux operating system (Debian).
0 Comments
Leave a Reply. |