Mobile Revelator 2.2.5 Manual

User Manual:

Open the PDF directly: View PDF PDF.
Page Count: 200

DownloadMobile Revelator 2.2.5 Manual
Open PDF In BrowserView PDF
Mobile Revelator 2.2.5

Mobile Revelator 2.2.5

Inhaltsverzeichnis
Mobile Revelator .......................................................................................................................... 6
Dump ....................................................................................................................................... 7
Android Dumper ..................................................................................................................... 8
Physical ............................................................................................................................... 9
Filesystem .......................................................................................................................... 11
Packageinfo ....................................................................................................................... 12
Physical Dumper ................................................................................................................... 13
iTunes Browser .................................................................................................................... 14
Dump via Bootloader ............................................................................................................ 15
QC Firehose ....................................................................................................................... 16
MTK ................................................................................................................................... 17
LG ...................................................................................................................................... 18
Port Utils ............................................................................................................................... 19
AT Command Terminal ...................................................................................................... 20
Commands ...................................................................................................................... 21
Port Config ...................................................................................................................... 22
Tools ............................................................................................................................... 23
QC / Bootloader Tool ......................................................................................................... 24
Port Config ...................................................................................................................... 25
Port Switch ...................................................................................................................... 26
Codes .............................................................................................................................. 27
Tools ............................................................................................................................... 28
USB Tool ............................................................................................................................ 29
Send Commands ............................................................................................................. 30
Send SCSI Command ...................................................................................................... 31
Tools ............................................................................................................................... 32
M-Obex Tool ...................................................................................................................... 33
TCP/IP Tool ........................................................................................................................ 34
Command ........................................................................................................................ 35
Tools ............................................................................................................................... 36
Open ....................................................................................................................................... 37
Open raw flash ..................................................................................................................... 38
Partitions .............................................................................................................................. 39
EMMC Partition (MBR/GPT/BCT/WMPART) ......................................................................... 40
QC Partition ....................................................................................................................... 41
Filesystems .......................................................................................................................... 42
Generic .............................................................................................................................. 43
Specific .............................................................................................................................. 44
EXT2/3/4 ......................................................................................................................... 45
Locosto FFS ..................................................................................................................... 46
FAT12/FAT16/FAT32/RFS/TxFat/xFat/NTFS .................................................................... 47
F2FS ................................................................................................................................ 48
Yaffs2 .............................................................................................................................. 49
CRAMFS .......................................................................................................................... 50
Infineon FS (GB102/A100/...) .......................................................................................... 51
QC EFS / SuperEFS ......................................................................................................... 52
HFS+/HFSX ..................................................................................................................... 53
TargetFFS / TFS4 (Samsung E1080i / Philips Dual Band) ................................................ 54
2 / 200

Mobile Revelator 2.2.5

TFFS (AVM FritzBox) ....................................................................................................... 55
Backup Files ......................................................................................................................... 55
Apple Backup ..................................................................................................................... 57
Android Backup / Tar ......................................................................................................... 58
Huawei Backup .................................................................................................................. 58
Reconstruct .......................................................................................................................... 59
Spare Repair ...................................................................................................................... 60
Nokia ................................................................................................................................. 61
Nokia Rap3G NOR Image to FAT ..................................................................................... 62
Nokia Asha 200/201 NOR Image to FAT .......................................................................... 63
Nokia 108 NAND Image to FAT ....................................................................................... 64
Samsung ........................................................................................................................... 65
FSR Partition .................................................................................................................... 66
STL to Raw ................................................................................................................... 68
BML to STL ................................................................................................................... 70
XSR Partition ................................................................................................................... 71
Infineon/LG ....................................................................................................................... 72
LG GS290N NOR .............................................................................................................. 72
MTK ................................................................................................................................... 73
MTK NOR Image to FAT .................................................................................................. 74
Apple ................................................................................................................................. 75
iPhone 3G Nand .............................................................................................................. 76
Sony Ericsson .................................................................................................................... 77
A1/DB2020 Reconstruct ................................................................................................... 78
Alcatel ................................................................................................................................ 79
Spreadtrum (SFR118/OT2060) ........................................................................................ 80
Analysis .................................................................................................................................. 81
Database Utils ...................................................................................................................... 82
SQLite Database Tool ......................................................................................................... 83
View ................................................................................................................................ 84
Right-Click-Menu ........................................................................................................... 86
Python-Plugins ............................................................................................................ 87
Timestamps ................................................................................................................ 88
Blob ............................................................................................................................ 89
Decoder ...................................................................................................................... 90
Text ............................................................................................................................ 91
Combine ..................................................................................................................... 92
Export ............................................................................................................................. 93
Combine .......................................................................................................................... 94
Bada DB2 Database Tool ................................................................................................... 95
View ................................................................................................................................ 96
Right-Click-Menu ........................................................................................................... 98
Timestamps ................................................................................................................ 99
Text .......................................................................................................................... 100
Export ............................................................................................................................ 101
WP7 EDB Database Tool .................................................................................................. 101
View .............................................................................................................................. 102
Export ............................................................................................................................ 103
IPD/BBB Database Tool ................................................................................................... 104
View .............................................................................................................................. 105
3 / 200

Mobile Revelator 2.2.5

Export ............................................................................................................................
Apple Binary PList ...............................................................................................................
Android Binary XML ............................................................................................................
HTTP/S data carver ............................................................................................................
Samsung RIL carver ...........................................................................................................
Android Password carver ....................................................................................................
File Ripper ..........................................................................................................................
Apple iThmb Extract ...........................................................................................................
Report ...................................................................................................................................
Timeline report ...................................................................................................................
Location/GPS data report ....................................................................................................
Carve 7-Bit SMS .................................................................................................................
Android ...............................................................................................................................
Cache.cell/.wifi to GPX .....................................................................................................
Nokia ..................................................................................................................................
Nokia PM ..........................................................................................................................
Motorola .............................................................................................................................
ODM Inbox SMS ...............................................................................................................
ODM Outbox SMS ............................................................................................................
Utilities ..................................................................................................................................
Firmware Utils ....................................................................................................................
Samsung ..........................................................................................................................
Convert .img to .tar.md5 ...............................................................................................
HTC .................................................................................................................................
Decrypt HTC RUU ..........................................................................................................
LG ....................................................................................................................................
Decrypt KDZ ..................................................................................................................
Unpack DZ .....................................................................................................................
Android ............................................................................................................................
Android 4.x : Convert .img to raw .bin ...........................................................................
Android 5.x : Convert .new.dat to raw .bin ....................................................................
Number Decoder ................................................................................................................
Number To Country .........................................................................................................
IMSI Decode ....................................................................................................................
ICCID Decode ..................................................................................................................
MAC Lookup .....................................................................................................................
SDCard CID Decoder ........................................................................................................
Time Stamp Decoder ..........................................................................................................
Compression Util .................................................................................................................
Hex Editor ..........................................................................................................................
Cryptanalysis .........................................................................................................................
Crypto Tools .......................................................................................................................
RSA ..................................................................................................................................
DES ..................................................................................................................................
AES ..................................................................................................................................
Twofish ............................................................................................................................
ARC4/RC4 ........................................................................................................................
Blowfish ...........................................................................................................................
TEA ..................................................................................................................................
SEED ................................................................................................................................
4 / 200

106
107
108
109
110
111
112
114
115
116
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158

Mobile Revelator 2.2.5

XOR .................................................................................................................................
Base64 .............................................................................................................................
Padding ............................................................................................................................
Bruteforce ..........................................................................................................................
Android Encryption GPU Bruteforcer .................................................................................
Android Password / PIN GPU Bruteforcer .........................................................................
WP7.x/WP8.x PIN GPU Bruteforcer ...................................................................................
SQLCipher Bruteforcer .....................................................................................................
BB Keystore Bruteforcer ...................................................................................................
Android Patternlock CPU Bruteforcer ................................................................................
Bleichenbacher RSA Attack (Exponent 3) .........................................................................
Decrypt ...............................................................................................................................
Android ............................................................................................................................
Decrypt Android Application (.asec) ...............................................................................
Decrypt Android Partition / SDCard Files ........................................................................
Decrypt Whatsapp Databases (.crypt/.crypt5-12) ..........................................................
Decrypt Threema database ...........................................................................................
Decrypt SQLCipher (AES-256) Database ........................................................................
Decrypt McAfee Suite WSAndroidAppConfig.xml ............................................................
Decrypt KeepSafe files ...................................................................................................
Convert Android 4.x/5.x Backup File to TAR ...................................................................
Decrypt Cleanmaster Security Patternlock .....................................................................
Decrypt SnapChat Received Story Files ..........................................................................
Decrypt Telekom Mail Database ....................................................................................
Decrypt Wickr Database ................................................................................................
Blackberry ........................................................................................................................
Decrypt Blackberry REMF SQLite Database ....................................................................
Retrieve Blackberry PGP Private Key ..............................................................................
MTK .................................................................................................................................
MTK Decrypt Files ..........................................................................................................
Binary Search Tool .............................................................................................................
Settings .................................................................................................................................
Configure ............................................................................................................................
Templates Documentation .......................................................................................................
Timeline XML Documentation ................................................................................................
Template XML Documentation ..............................................................................................
Python API Documentation ......................................................................................................

5 / 200

159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
193
194
196
197

Mobile Revelator 2.2.5

Mobile Revelator
Version 2.2.5
Mobile Revelator is a tool mainly developed by Bjoern Kerler. Its main aim
is to support forensic mobile researchers in conducting better forensic examinations
and in verification of existing commercial forensic solutions.

6 / 200

Mobile Revelator 2.2.5

Dump

The "Dump" Menu offers several tools to Dump Android, Physical and iTunes compatible devices.

7 / 200

Mobile Revelator 2.2.5

Android Dumper

The android dumper tool enables you to raw dump partitions and whole flash chips using adb connection if the
device has been rooted or if it is being used with a custom recovery such as TWRP or CWM. For some devices
lower android 4.4, it is also able to temproot the device.
Furthermore it enables you to do a logical backup using android backup functionality as well.

8 / 200

Mobile Revelator 2.2.5

Physical

The Android Dumper provides physical dumping capabilities for unrooted Android < 6.0 stock devices and unlocked
devices with custom recovery.
In order to physically dump, press "Connect to ADB" and make sure that USB Debugging is enabled on the device. If
everything works fine, you will see that it's going to print which android version and manufacturer has been detected.
If the device isn't already rooted, it's going to ask if you want to temproot the device. Temproot does currently only work for
devices with Android < 6.0.
If the device is rooted, you will then be presented the detected partition available for dumping :

MR will automatically select the full flash if available (/dev/block/mmcblk0 or /dev/block/sda).

9 / 200

Mobile Revelator 2.2.5

You may then choose several options for dumping. For emmc and sdcards, dd is the most appropriate option
for saving. However if Nand Flash is being used, choose nanddump for MTD or bmldump for samsung devices with
xsr/stl/bml wearleveling or filesystem dump methods such as mkyaffs2img and tar.
"Use realtime compression" does make sense, if you encounter a large flash (128/256 GB) with large areas of empty
space.
Otherwise, selecting this option will slow down the dumping process.
Pressing "Dump to file" will save the flash as raw image. If available, "Mount as drive" will force the usb setting of the
device to enable partition access by usb driver.

10 / 200

Mobile Revelator 2.2.5

Filesystem

Once you connected to ADB, you may use these Filesystem options :
- Android 4.x/5.x Backup will enable you to dump via the Android internal backup functionality. After you press "Run", you
may choose what to backup :

- Patternlock bruteforce will read the gesture.key file from /data/system, bruteforce the pattern using CPU and then
present the pattern.
- Get password/pin files will extract the most common files used for password/pin/gesture storage from the device
- Remove all passwords and codes will remove passwords and codes from both files and sqlite databases and should thus
be choosen only if it is really needed to be done.

11 / 200

Mobile Revelator 2.2.5

Packageinfo

Packageinfo will read all installed and removed packages from the Android Package Manager.
Clicking with the left mouse button on the entries will show specific application rights and properties.
Clicking with the right mouse on the package, it will allow you to save the application apk, backup the
application data and copy the packagename to the clipboard. If the entry is being highlighted in red,
then the package doesn't allow application data to be backed up.

12 / 200

Mobile Revelator 2.2.5

Physical Dumper

The Physical Dump Tool lets you save full physical devices connected to your PC, like harddrives
or SD-Cards in SD-Cardreaders. Press "Dump" and choose where to save the dump file.
The file will be saved in RAW-Format.

13 / 200

Mobile Revelator 2.2.5

iTunes Browser

Using this tool, you may connect an iPhone/iPod/iPad. First install iTunes, connect to the device, trust on the device and
trust in iTunes, it will then access the AFC-System of the device and lets you save files but also open them in the internal
sqlite tool or any external viewer you wish. Furthermore, it lets you extract .ithmb databases (from PhotoData/Thumbnails)
to jpg files [see more in Analysis\Apple iThmb Extract chapter in this document].

14 / 200

Mobile Revelator 2.2.5

Dump via Bootloader

The "Dump via Bootloader"-Tool allows to dump several devices via bootloader, but does
also show new detected or attached devices.

15 / 200

Mobile Revelator 2.2.5

QC Firehose

Some devices like "Oneplus One, X, 3, 3T" and several other devices with Qualcomm CPU
newer than MSM8974 can be dumped or content written using the "QDLoader 9008" Port.
First press "Firehose: Read fs" or "Firehose: Read flash" button, and then connect a device with 9008 Mode via usb to the
host pc.
The 9008 Mode, also called "Sahara" Mode, can be enabled by either using adb and sending "adb reboot edl"
or fastboot by sending "fastboot reboot edl" or by pressing volume up and volume down while connecting the usb cable
to a powered off device. Also this mode can be enabled by shorting CLK Signal of the emmc on the pcb with Ground while
connecting
a powered off device and pressing power for a few seconds or by shortening d+ and gnd on usb while connecting the
mobile and then
releasing the short.
For firehose, you should the right flashtype, either emmc or ufs before connecting. Be aware that a ufs flash can have
multiple
partitions, so you should choose the partition number first. If unsure, let flashtype on ufs and partition number on 0.
"Firehose: Read fs" will allow you to browse and also write partitions, "Firehose: Read flash" will only dump the full flash.
As a reminder, all devices coming with Android 6 out of the box are encrypted, so one option might be to flash a custom
recovery like twrp or cm to the device via firehose in order to dump the unencrypted data.
You may interrupt any action pressing the "Stop current action" button.

16 / 200

Mobile Revelator 2.2.5

MTK

For devices using MTK chipset, power off the device, install the MTK Preloader Com port driver, press "MTK Read
Flash button" and then just connect the mobile.
You may interrupt any action pressing the "Stop current action" button.

17 / 200

Mobile Revelator 2.2.5

LG

For LG android devices > Android 4.x and < 5.1, you may switch to the download mode by powering the mobile off,
then press and hold volume up button while connecting the usb cable to the mobile. Once you see the download
mode, you may press "LG G2/Nexus 5: Read fs" button to show installed partitions or press "LG G2/Nexus 5: Read
flash" button to get a physical dump of the flash chip.
You may interrupt any action pressing the "Stop current action" button.

18 / 200

Mobile Revelator 2.2.5

Port Utils

The port utilities offer functionality to access mobiles via ports such as usb, tcp/ip and com ports.

19 / 200

Mobile Revelator 2.2.5

AT Command Terminal

The AT Command Terminal is able to send ascii commands to a serial port device such as a modem.

20 / 200

Mobile Revelator 2.2.5

Commands

In order to send any AT commands to modem or serial ports, just select the Port and press "Connect/Disconnect" button.
If the connection has been successfully made, the circle left the the "Connect/Disconnect" button should fill.
After that you may either select a common command from the command list just above the "Send" button or enter any
commands like "ATI" left to the "Send" button and then press "Send". The result will be shown in the text view below.

21 / 200

Mobile Revelator 2.2.5

Port Config

The port config tab allows you to set specific settings, such as baudrate, databits, parity, stopBits and Flow Control.

22 / 200

Mobile Revelator 2.2.5

Tools

After a successful connection has been made, some functions may be available on specific devices in order
to enable ADB or to bypass passwords via com port.

23 / 200

Mobile Revelator 2.2.5

QC / Bootloader Tool

Using the Qualcomm Modem and Bootloader Tool you may send qualcomm specific commands as hex bytes to
ports using qualcomm sahara and diag protocol but also has several tools for bootloaders such as LG and MTK
enabled devices in order to read the flash.

24 / 200

Mobile Revelator 2.2.5

Port Config

The "Port Config" tab shows possible settings for both com ports and tcp/ip connections.

25 / 200

Mobile Revelator 2.2.5

Port Switch

For some modem devices, you first need to switch the modem to a qualcomm interface port. Just select
the type and then press "Send port switch command" button in order to switch the port.

26 / 200

Mobile Revelator 2.2.5

Codes

For some qualcomm devices, reading efs and nvitems is only possible after sending the right security password (SP)
or Security Code (SPC).

27 / 200

Mobile Revelator 2.2.5

Tools

The "Tools" tab has the following functionality :
Once connected to a device with qualcomm chipset, you may read the raw efs or read the nvitems.
You may interrupt any action pressing the "Stop current action" button.

28 / 200

Mobile Revelator 2.2.5

USB Tool

The USB tool enables you to send raw data to connected USB devices.

29 / 200

Mobile Revelator 2.2.5

Send Commands

This tool is able to send raw hex bytes or ascii packets to usb devices.

30 / 200

Mobile Revelator 2.2.5

Send SCSI Command

This tool is able to send SCSI commands to USB devices.

31 / 200

Mobile Revelator 2.2.5

Tools

For enabling ADB for some HTC devices such as "Wildfire", select the HTC device as USB device and Mass Storage
(08) as endpoint and then press "HTC enable ADB" to enable ADB. For older HTC android devices, you may as well boot
the device into bootloader mode, select the HTC devices as USB device and then click "HTC Read FS" to open up the
Partition Tool in order to show/read/save partition contents.

32 / 200

Mobile Revelator 2.2.5

M-Obex Tool

The M-Obex tool offers functionality to access the Samsung Modem Obex interface. Just select the Samsung
Mobile Port and press "Init Mobex". Once it's successfully connected, the circle left of the "Init Mobex" button
will be filled. You may then send any file command by entering into the text field such as "../../../../../data"
and pressing the "Send command" button.

Once Mobex has been successfully connected, you may bruteforce the pattern lock or get password files for Samsung
android mobiles if the firmware version is higher 4.0 and lower than 4.2.2.

33 / 200

Mobile Revelator 2.2.5

TCP/IP Tool

The tcp/ip tools tab offers functions for sending Hex or Ascii messages via tcp/ip such as motorola android mobiles.

34 / 200

Mobile Revelator 2.2.5

Command

Select the right host and then press connect. Once successfully connected, the left circle at the "Connect" button will be
filled. Then you are able to send either raw bytes as hex values or ascii chars being entered at the left side of the "Send"
button by pressing the "Send" button.

35 / 200

Mobile Revelator 2.2.5

Tools

The tcp/ip tools tab offers functions for motorola android mobiles. Select the right host and then press connect.
Once successfully connected, the left circle at the "Connect" button will be filled.

36 / 200

Mobile Revelator 2.2.5

Open

The Open menu offers options to work with partition systems, filesystems, backup files,
flash wearleveling (reconstruct) and options to extract and carve files, including Apple thumbnail databases.
"Open raw image" allows to open full raw dumps of flashchips or jtag images such as emmc dumps.
"Open multi image" combines several dumps or folders into one single filesystem view.
"Open directory" uses a local directory as a filesystem view.

37 / 200

Mobile Revelator 2.2.5

Open raw flash

Using "Open File" you may open any raw flash binary file. If a known Partitiontype is detected, which may be MBR,
GPT, BCT and WM7 it will show all including partitions.
Clicking with the left mouse button on a partition entry will reveal its attributes.
Doubleclicking with the left mouse button will open the partition.
Clicking with the right mouse button on a partition will offer to extract or to open the partition.
The menu button "Extract all partitions" will extract all partitions by their name into separate files.
If no known Partitiontypes have been found, MR will offer an option to carve for FAT and/or EXT partitions.

38 / 200

Mobile Revelator 2.2.5

Partitions

The partitions menu helps you extracting and viewing several flash dumps from modern devices using EMMC
flash chips.

39 / 200

Mobile Revelator 2.2.5

EMMC Partition (MBR/GPT/BCT/WMPART)

Using "Open File" you may open any raw flash binary file. If a known Partitiontype is detected, which may be MBR,
GPT, BCT and WM7 it will show all including partitions.
Clicking with the left mouse button on a partition entry will reveal its attributes.
Doubleclicking with the left mouse button will open the partition.
Clicking with the right mouse button on a partition will offer to extract or to open the partition.
The menu button "Extract all partitions" will extract all partitions by their name into separate files.
If no known Partitiontypes have been found, MR will offer an option to carve for FAT and/or EXT partitions.

40 / 200

Mobile Revelator 2.2.5

QC Partition

Using "Open File" you may open any raw flash binary file or qualcomm mbn file.
Clicking with the left mouse button on a partition entry will reveal its attributes.
The menu button "Extract all partitions" will try to extract all partitions by their name into separate files.

41 / 200

Mobile Revelator 2.2.5

Filesystems

The filesystems menu offers several interpreters for many partition types.

42 / 200

Mobile Revelator 2.2.5

Generic

All filesystem modules have three different tabs :
1. FS Info : Shows the current filesystem information
2. Plugins : Allows to run custom python scripts
3. Log : Logs all user actions within the filesystem tab
4. Bookmark : Press Ctrl-B with selected files to bookmark or select any entry in the bookmark list and press del key to
remove the entry.
5. Image Preview: On enabling Image Preview when clicking any file, pictures will be displayed and can be rotated (alt-r, altl), scaled (ctrl-,ctrl+), etc. using the right-click button on the picture.
You can enable the Hex Viewer by clicking "Enable HexView" and separate/combine the Hex Viewer from main window
by double-clicking the Hex Viewer Titlebar.
Doubleclicking on a file-entry will try to open up the file using associated programs.
Plugins : you may select the main plugin to run all plugins and single plugins as well
to just run one plugin.
Log : you may save the log at any time by pressing the "Save Log" button.

43 / 200

Mobile Revelator 2.2.5

Specific
This topic takes care about all specific filesystem modules MR has.

44 / 200

Mobile Revelator 2.2.5

EXT2/3/4

Using "Open Image" you may open any ext2/3/4 partition file/raw file.
Clicking with the left mouse button on a file will reveal its attributes.
Clicking with the right mouse button on a file will show a menu, which features different options :
- External Tools :
This menu option lets you open you the selected file in a Hex Editor, Text Editor, Image Viewer, Media Player or any
associated
program in the OS. On first run, you must set the application paths in the "Settings"-Main Menu to point to
executables.
- Save :
This menu option will save all selected files. In order to select multiple files, just keep Ctrl-Key on your keyboard
pressed while
selecting files using the left mouse button.
- Save historical version :
This menu option will seek for journal entries for the selected files, and lets you choose to extract a different version
by timestamp.
- Open in sqlite tool :
This menu will open the selected file into the MR internal Sqlite Editor.
The menu button "Extract all files" will extract all files to a given directory, and will also write a log file to its parent directory.
The menu button "Extract unallocated blocks" will extract all blocks that aren't in use of the filesystem.
The menu button "Get Journal History for given Inode/Offset" will show any journal history entry for any inode or physical
data offset.
The menu button "Search" lets you search for any filename and will present a table with all entries found. Clicking using the
left mouse button on the entry will point directly to the entry in the filesystem.
Clicking on "Enable HexView" will show the first data sector of the selected file or directory entry/inode.

45 / 200

Mobile Revelator 2.2.5

Locosto FFS

Using "Open Image" you may open any TI locosto chipset based FFS flash image.
Clicking with the left mouse button on a file will reveal its attributes.
Clicking with the right mouse button on a file will show a menu, which features different options :
- External Tools :
This menu option lets you open you the selected file in a Hex Editor, Text Editor, Image Viewer, Media Player or any
associated
program in the OS. On first run, you must set the application paths in the "Settings"-Main Menu to point to executables
- Save :
This menu option will save all selected files. In order to select multiple files, just keep Ctrl-Key on your keyboard
pressed while
selecting files using the left mouse button.
- Open in sqlite tool :
This menu will open the selected file into the MR internal Sqlite Editor.
The menu button "Extract all files" will extract all files to a given directory, and will also write a log file to its parent directory.
The menu button "Search" lets you search for any filename and will present a table with all entries found. Clicking using the
left mouse button on the entry will point directly to the entry in the filesystem.
Clicking on "Enable HexView" will show the first data sector of the selected file or directory entry/inode.

46 / 200

Mobile Revelator 2.2.5

FAT12/FAT16/FAT32/RFS/TxFat/xFat/NTFS

Using "Open Image" you may open any Fat12/Fat16/Fat32/NTFS/RFS/ExFat/Transactioned ExFat partition file/raw file.
Clicking with the left mouse button on a file will reveal its attributes.
Clicking with the right mouse button on a file will show a menu, which features different options :
- External Tools :
This menu option lets you open you the selected file in a Hex Editor, Text Editor, Image Viewer, Media Player or any
associated
program in the OS. On first run, you must set the application paths in the "Settings"-Main Menu to point to executables
- Save :
This menu option will save all selected files. In order to select multiple files, just keep Ctrl-Key on your keyboard
pressed while
selecting files using the left mouse button.
- Open in sqlite tool :
This menu will open the selected file into the MR internal Sqlite Editor.
- Open in edb tool :
This menu will open the selected file into the MR internal WP7 EDB Database Viewer.
The menu button "Extract all files" will extract all files to a given directory, and will also write a log file to its parent directory.
The menu button "Extract unallocated blocks" will extract all blocks that aren't in use of the filesystem.
The menu button "Search" lets you search for any filename and will present a table with all entries found. Clicking using the
left mouse button on the entry will point directly to the entry in the filesystem.
Clicking on "Enable HexView" will show the first data sector of the selected file or directory entry/inode.

47 / 200

Mobile Revelator 2.2.5

F2FS

Using "Open Image" you may open any f2fs partition file/raw file.
Clicking with the left mouse button on a file will reveal its attributes.
Clicking with the right mouse button on a file will show a menu, which features different options :
- External Tools :
This menu option lets you open you the selected file in a Hex Editor, Text Editor, Image Viewer, Media Player or any
associated
program in the OS. On first run, you must set the application paths in the "Settings"-Main Menu to point to
executables.
- Save :
This menu option will save all selected files. In order to select multiple files, just keep Ctrl-Key on your keyboard
pressed while
selecting files using the left mouse button.
- Open in sqlite tool :
This menu will open the selected file into the MR internal Sqlite Editor.
The menu button "Extract all files" will extract all files to a given directory, and will also write a log file to its parent directory.
The menu button "Extract unallocated blocks" will extract all blocks that aren't in use of the filesystem.
The menu button "Search" lets you search for any filename and will present a table with all entries found. Clicking using the
left mouse button on the entry will point directly to the entry in the filesystem.
Clicking on "Enable HexView" will show the first data sector of the selected file or directory entry/inode.

48 / 200

Mobile Revelator 2.2.5

Yaffs2

Using "Open Image" you may open any Yaffs2 partition file/raw file. In order to extract Yaffs2 partitions, you will need the
according spare bytes from the Flash arranged by page/spare/page/spare/... Select the appropriate spare order by
choosing "Generic/Mk2yaffs" or "Nanddump" and its pagesize, which may be 0x200, 0x400, 0x800 (default) and 0x1000.
Clicking with the left mouse button on a file will reveal its attributes.
Clicking with the right mouse button on a file will show a menu, which features different options :
- External Tools :
This menu option lets you open you the selected file in a Hex Editor, Text Editor, Image Viewer, Media Player or
any associated program in the OS. On first run, you must set the application paths in the "Settings"-Main Menu to
point to executables
- Save :
This menu option will save all selected files. In order to select multiple files, just keep Ctrl-Key on your keyboard
pressed while selecting files using the left mouse button.
- Open in sqlite tool :
This menu will open the selected file into the MR internal Sqlite Editor.
The menu button "Extract all files" will extract all files to a given directory, and will also write a log file to its parent directory.
The menu button "Extract unallocated blocks" will extract all blocks that aren't in use of the filesystem.
The menu button "Get Journal History for given Inode/Offset" will show any journal history entry for any inode or physical
data offset.
The menu button "Search" lets you search for any filename and will present a table with all entries found. Clicking using the
left mouse button on the entry will
point directly to the entry in the filesystem.
Clicking on "Enable HexView" will show the first data sector of the selected file or directory entry/inode.

49 / 200

Mobile Revelator 2.2.5

CRAMFS

Using "Open Image" you may open any Compressed ROM flash image, indicated by "Compressed ROMFS" at the start of
the image.
Clicking with the left mouse button on a file will reveal its attributes.
Clicking with the right mouse button on a file will show a menu, which features different options :
- External Tools :
This menu option lets you open you the selected file in a Hex Editor, Text Editor, Image Viewer, Media Player or
any associated program in the OS. On first run, you must set the application paths in the "Settings"-Main Menu to
point to executables
- Save :
This menu option will save all selected files. In order to select multiple files, just keep Ctrl-Key on your keyboard
pressed while selecting files using the left mouse button.
- Open in sqlite tool :
This menu will open the selected file into the MR internal Sqlite Editor.
The menu button "Extract all files" will extract all files to a given directory, and will also write a log file to its parent directory.
The menu button "Search" lets you search for any filename and will present a table with all entries found. Clicking using the
left mouse button on the entry will point directly to the entry in the filesystem.
Clicking on "Enable HexView" will show the first data sector of the selected file or directory entry/inode.

50 / 200

Mobile Revelator 2.2.5

Infineon FS (GB102/A100/...)

Using "Open Image" you may open any Infineon chipset based flash image.
Clicking with the left mouse button on a file will reveal its attributes.
Clicking with the right mouse button on a file will show a menu, which features different options :
- External Tools :
This menu option lets you open you the selected file in a Hex Editor, Text Editor, Image Viewer, Media Player or any
associated
program in the OS. On first run, you must set the application paths in the "Settings"-Main Menu to point to executables
- Save :
This menu option will save all selected files. In order to select multiple files, just keep Ctrl-Key on your keyboard
pressed while selecting files using the left mouse button.
- Open in sqlite tool :
This menu will open the selected file into the MR internal Sqlite Editor.
The menu button "Extract all files" will extract all files to a given directory, and will also write a log file to its parent directory.
The menu button "Search" lets you search for any filename and will present a table with all entries found. Clicking using the
left mouse button on the entry will point directly to the entry in the filesystem.
Clicking on "Enable HexView" will show the first data sector of the selected file or directory entry/inode.

51 / 200

Mobile Revelator 2.2.5

QC EFS / SuperEFS

Using "Open Image" you may open any Qualcomm chipset based Embedded File System (EFS) image.
If the image contains older versions due to journaling, you may select the version just below the "Extract all files" button
.
Clicking with the left mouse button on a file will reveal its attributes.
Clicking with the right mouse button on a file will show a menu, which features different options :
- External Tools :
This menu option lets you open you the selected file in a Hex Editor, Text Editor, Image Viewer, Media Player or any
associated
program in the OS. On first run, you must set the application paths in the "Settings"-Main Menu to point to executables
- Save :
This menu option will save all selected files. In order to select multiple files, just keep Ctrl-Key on your keyboard
pressed while selecting files using the left mouse button.
The menu button "Extract all files" will extract all files to a given directory, and will also write a log file to its parent directory.

52 / 200

Mobile Revelator 2.2.5

HFS+/HFSX

Using "Open Image" you may open any HFS/HFS+/HFSX image.
Clicking with the left mouse button on a file will reveal its attributes.
Clicking with the right mouse button on a file will show a menu, which features different options :
- External Tools :
This menu option lets you open you the selected file in a Hex Editor, Text Editor, Image Viewer, Media Player or
any associated program in the OS. On first run, you must set the application paths in the "Settings"-Main Menu to
point to executables
- Save :
This menu option will save all selected files. In order to select multiple files, just keep Ctrl-Key on your keyboard
pressed while
selecting files using the left mouse button.
- Open in sqlite tool :
This menu will open the selected file into the MR internal Sqlite Editor.
The menu button "Extract all files" will extract all files to a given directory, and will also write a log file to its parent directory.
The menu button "Search" lets you search for any filename and will present a table with all entries found. Clicking using the
left mouse button on the entry will point directly to the entry in the filesystem.
Clicking on "Enable HexView" will show the first data sector of the selected file or directory entry/inode.

53 / 200

Mobile Revelator 2.2.5

TargetFFS / TFS4 (Samsung E1080i / Philips Dual Band)

Using "Open Image" you may open any TargetFFS/TFS4 image.
Clicking with the left mouse button on a file will reveal its attributes.
Clicking with the right mouse button on a file will show a menu, which features different options :
- External Tools :
This menu option lets you open you the selected file in a Hex Editor, Text Editor, Image Viewer, Media Player or any
associated program in the OS. On first run, you must set the application paths in the "Settings"-Main Menu to point
to executables
- Save :
This menu option will save all selected files. In order to select multiple files, just keep Ctrl-Key on your keyboard
pressed while selecting files using the left mouse button.
- Open in sqlite tool :
This menu will open the selected file into the MR internal Sqlite Editor.
The menu button "Extract all files" will extract all files to a given directory, and will also write a log file to its parent directory.
The menu button "Search" lets you search for any filename and will present a table with all entries found. Clicking using the
left mouse button on the entry will point directly to the entry in the filesystem.
Clicking on "Enable HexView" will show the first data sector of the selected file or directory entry/inode.

54 / 200

Mobile Revelator 2.2.5

TFFS (AVM FritzBox)

Using "Open Image" you may open any TFFS AVM Fritzbox image. You cannot use RAW flash image, you need to extract
the flash partitions from the RAW flash image first, starting with bytes "01 00 04 00 FF FF FE".
Clicking with the left mouse button on a file will reveal its attributes.
Clicking with the right mouse button on a file will show a menu, which features different options :
- External Tools :
This menu option lets you open you the selected file in a Hex Editor, Text Editor, Image Viewer, Media Player or any
associated program in the OS. On first run, you must set the application paths in the "Settings"-Main Menu to point
to executables
- Save :
This menu option will save all selected files. In order to select multiple files, just keep Ctrl-Key on your keyboard
pressed while selecting files using the left mouse button.
- Open in sqlite tool :
This menu will open the selected file into the MR internal Sqlite Editor.
The menu button "Extract all files" will extract all files to a given directory, and will also write a log file to its parent directory.
The menu button "Search" lets you search for any filename and will present a table with all entries found. Clicking using the
left mouse button on the entry will point directly to the entry in the filesystem.
Clicking on "Enable HexView" will show the first data sector of the selected file or directory entry/inode.

Backup Files

55 / 200

Mobile Revelator 2.2.5

The backup files menu offers functionality for viewing and extracting apple and android backup files.

56 / 200

Mobile Revelator 2.2.5

Apple Backup

Using "Open Image" you may open any Apple iTunes backup file whether it may be encrypted or not. If the backup is
encrypted,
it will ask for the password for decryption. On "Open Image", choose the appropriate "Manifest.mbdb" file.
Clicking with the left mouse button on a file will reveal its attributes.
Clicking with the right mouse button on a file will show a menu, which features different options :
- External Tools :
This menu option lets you open you the selected file in a Hex Editor, Text Editor, Image Viewer, Media Player or any
associated program in the OS. On first run, you must set the application paths in the "Settings"-Main Menu to point
to executables.
- Save :
This menu option will save all selected files. In order to select multiple files, just keep Ctrl-Key on your keyboard
pressed while selecting files using the left mouse button.
- Open in sqlite tool :
This menu will open the selected file into the MR internal Sqlite Editor.
- Open in plist tool :
This menu will open the selected file into the MR internal Apple PList Editor.
The menu button "Extract all files" will extract all files to a given directory, and will also write a log file to its parent directory.
The menu button "Search" lets you search for any filename and will present a table with all entries found. Clicking using the
left mouse button on the entry will point directly to the entry in the filesystem.
Clicking on "Enable HexView" will show the first data sector of the selected file or directory entry/inode.

57 / 200

Mobile Revelator 2.2.5

Android Backup / Tar

Using "Open Image" you may open any Android Backup "*.ab", Gzipped Tar or Tar file, whether it may be encrypted or not.
If the backup is encrypted, it will ask for the password for decryption.
Clicking with the left mouse button on a file will reveal its attributes.
Clicking with the right mouse button on a file will show a menu, which features different options :
- External Tools :
This menu option lets you open you the selected file in a Hex Editor, Text Editor, Image Viewer, Media Player or any
associated program in the OS. On first run, you must set the application paths in the "Settings"-Main Menu to point
to executables.
- Save :
This menu option will save all selected files. In order to select multiple files, just keep Ctrl-Key on your keyboard
pressed while selecting files using the left mouse button.
- Open in sqlite tool :
This menu will open the selected file into the MR internal Sqlite Editor.
The menu button "Extract all files" will extract all files to a given directory, and will also write a log file to its parent directory.
The menu button "Search" lets you search for any filename and will present a table with all entries found. Clicking using the
left mouse button on the entry will point directly to the entry in the filesystem.
Clicking on "Enable HexView" will show the first data sector of the selected file or directory entry/inode.

Huawei Backup
The Huawei Backup Tool offers a method to convert the sqlite database files and contents to a filesystem.
In order to do a full backup, in the smartphone go to Tools, Huawei Backup and store all data to an external sdcard or
sdcard connected via otg cable.

58 / 200

Mobile Revelator 2.2.5

Reconstruct

The Reconstruct menu offers functionality for reconstructing filesystems due to usage of wearleveling or
flash transaction layers.

59 / 200

Mobile Revelator 2.2.5

Spare Repair

The Spare Repair Tool will reorder spare areas from other Tools like RiffBox or MedusaBox to make the flash images
being
used by the MR Tool correctly. It will sort the Spares from the end of the flash to the end of each page, where they should
be.

60 / 200

Mobile Revelator 2.2.5

Nokia

The Nokia tools offer specific functions for reconstruction wear-leveling for Nokia devices.

61 / 200

Mobile Revelator 2.2.5

Nokia Rap3G NOR Image to FAT
This tool will extract the FAT partition from any Nokia Rap3G flash image.

62 / 200

Mobile Revelator 2.2.5

Nokia Asha 200/201 NOR Image to FAT
This tool will extract the FAT partition from any Nokia Asha 200/201 flash image.

63 / 200

Mobile Revelator 2.2.5

Nokia 108 NAND Image to FAT
This tool will extract the FAT partition from any Nokia 108 flash image.

64 / 200

Mobile Revelator 2.2.5

Samsung

The Samsung reconstruction tools will extract RAW Partitions, called BML and filesystems, called STL
from Wear-Leveling as well will reconstruct any partitions from XSR1/2/3.

65 / 200

Mobile Revelator 2.2.5

FSR Partition

The FSR partition is the RAW partition with Flash Transaction Layer by Samsung. BML is the main raw flash image
with flash transaction layers consisting of several STL Partitions.

66 / 200

Mobile Revelator 2.2.5

67 / 200

Mobile Revelator 2.2.5

STL to Raw
This tool will extract any partition from wearleveling STL data flash image.

68 / 200

Mobile Revelator 2.2.5

69 / 200

Mobile Revelator 2.2.5

BML to STL
This tool will extract any STL partition from wearleveling BML data flash image.

70 / 200

Mobile Revelator 2.2.5

XSR Partition
This tool will extract any partition from wearleveling XSR1/2/3 data flash image. It will automatically detect
block and pagesize needed for extraction. In order to extract XSR partition data, spare data has to be at the end
of each page.

71 / 200

Mobile Revelator 2.2.5

Infineon/LG

The Infineon tools offer specific functions for reconstruction wear-leveling for infineon devices.

LG GS290N NOR
This tool will extract any partition from wearleveling LG GS290N NOR data flash image.

72 / 200

Mobile Revelator 2.2.5

MTK

The MTK tools offer specific functions for reconstruction wear-leveling for MTK devices.

73 / 200

Mobile Revelator 2.2.5

MTK NOR Image to FAT
This tool will extract any partition from wearleveling MTK NOR flash image.

74 / 200

Mobile Revelator 2.2.5

Apple

The Apple tools offer specific functions for reconstruction wear-leveling for Apple devices.

75 / 200

Mobile Revelator 2.2.5

iPhone 3G Nand
This tool will extract any partition from wearleveling iPhone 3G nand data flash image. Spare data is needed for
reconstruction
and should be at the end of each page.

76 / 200

Mobile Revelator 2.2.5

Sony Ericsson

The Sony Ericsson tools offer specific functions for reconstruction wear-leveling for Sony Ericsson devices.

77 / 200

Mobile Revelator 2.2.5

A1/DB2020 Reconstruct
This tool will extract any partition from wearleveling A1/DB2020 nand data flash image. Spare data is needed for
reconstruction
and should be at the end of each page.

78 / 200

Mobile Revelator 2.2.5

Alcatel

The Alcatel tools offer specific functions for reconstruction wear-leveling for Alcatel devices.

79 / 200

Mobile Revelator 2.2.5

Spreadtrum (SFR118/OT2060)
This tool will extract any partition from wearleveling Alcatel device with Spreadtrum chipset data flash image.

80 / 200

Mobile Revelator 2.2.5

Analysis

The Analyse menu contains several tools for interpretation of various data formats, such as databases, xml files
but also has great tools for carving information from raw images or files.

81 / 200

Mobile Revelator 2.2.5

Database Utils

The SQLite Database Tools is able to open generic SQLite3 databases and enables
to reconstruct wal (Write Ahead Logs), Journals and deleted SQLite entries from free pages.

82 / 200

Mobile Revelator 2.2.5

SQLite Database Tool

The sqlite database tool lets you open sqlite database, recover deleted entries from free pages, journal and write-aheadlogs (WAL) and lets you convert timestamps in a user-friendly way. Moreover, you have the option to export the modified
or current table to a xlsx, csv or xml-file.

83 / 200

Mobile Revelator 2.2.5

View

The windows is split into three different regions :
On the upper left side, you see the current tables from the database.
The lower left side, you see any deleted or active transactions according to free pages, journals or write-ahead log.
Selecting an entry from either the upper or lower left side, its content is being displayed on the right side.
Using Ctrl-F you can search for any string, clicking on an entry in the result tab will show the selected entry in the table.
Using Ctrl-T if an entry is selected will automatically try to convert the integer value to a readable date / timestamp value
for the
whole column. Converted timestamps via Ctrl-T conversion can also be converted to a local time by choosing the location
and by enabling the
"Enable timezone" checkbox.

84 / 200

Mobile Revelator 2.2.5

85 / 200

Mobile Revelator 2.2.5

Right-Click-Menu

86 / 200

Mobile Revelator 2.2.5

Python-Plugins

This menu lets you run custom python plugins.

87 / 200

Mobile Revelator 2.2.5

Timestamps

There are two ways to convert current column integer values to a time stamp :
First one, try the automatic algorithm : select any column to be converted and press CTRL-T. If the conversion fails or
seems to be wrong, choose the second one, by right clicking into the field, in the menu select "Timestamps" and the the
appropriate timestamp. If the conversion doesn't seem to be fine, just reselect the table on the left side and the table will be
reset, allowing you to reselect another timestamp method.

88 / 200

Mobile Revelator 2.2.5

Blob

The blob menu lets you either use your favorite tool for viewing the data or save either the current data field or selected
column or row data field to a file.

89 / 200

Mobile Revelator 2.2.5

Decoder

The decoder menu has functionality to convert garmin integer values to latitude/longitude, but will also allow to decrypt
saved encrypted key4.db mozilla passwords.

90 / 200

Mobile Revelator 2.2.5

Text

The text menu functions will extract all text within current selected column either as a file for each line or as multiple lines in
one file.

91 / 200

Mobile Revelator 2.2.5

Combine

The combine menu lets you combine database entries. Just click into the column to be combined and then select the
master index first, followed by child indices (columns) you want to combine from different tables.

92 / 200

Mobile Revelator 2.2.5

Export

You may export the current table view either as a xlsx, xml or csv file or even the complete database (without changes
being added). If any data columns may exist, the "Export current table to xls (as text only)" function will just export unicode
text but will filter any data bytes.

93 / 200

Mobile Revelator 2.2.5

Combine

Once columns have been selected in the table view as main and child indexes, they will be displayed in the combine tab.
You may delete single indices by selecting and pressing the del-key on the keyboard. Pressing the "Run combine" button
will execute the sql query being displayed in the "Combination sql command" field.

94 / 200

Mobile Revelator 2.2.5

Bada DB2 Database Tool

The bada DB2 database tool is able to open and read Samsung DB2 and EMware databases (mainly to be found on
Samsung Bada based devices at /DB2/phonedb.00).

95 / 200

Mobile Revelator 2.2.5

View

You may select "Include deleted entries" to show deleted entries while clicking at the Index at the left side.

96 / 200

Mobile Revelator 2.2.5

97 / 200

Mobile Revelator 2.2.5

Right-Click-Menu

98 / 200

Mobile Revelator 2.2.5

Timestamps

The timestamp submenu allows you to convert integer fields to timestamps.

99 / 200

Mobile Revelator 2.2.5

Text

The text submenu allows you to save all texts from selected column in the current table to a file.

100 / 200

Mobile Revelator 2.2.5

Export

The export tab will allow you to save the current table to a xlsx file.

WP7 EDB Database Tool

The WP7 EDB Database Tool lets you open WP7 and WM6 EDB databases like "store.vol".

101 / 200

Mobile Revelator 2.2.5

View

Press "Open DB" to open a database and select "Include deleted entries" to show deleted entries when clicking at the left
index.

102 / 200

Mobile Revelator 2.2.5

Export

The export tab will allow you to extract the current table to either xls, csv or sqlite database file.

103 / 200

Mobile Revelator 2.2.5

IPD/BBB Database Tool

The Blackberry IPD Database Tool lets you examine .bbb or .ipd database files.

104 / 200

Mobile Revelator 2.2.5

View

Click "Open DB" to open any Blackberry Messenger .bbb or .ipd Backup File. Values not being interpreted are being shown
as Hex Values.

105 / 200

Mobile Revelator 2.2.5

Export

The export function lets you export the current field to a xls or csv file.

106 / 200

Mobile Revelator 2.2.5

Apple Binary PList

This tool will present all data from both Apple Binary and Raw XML Format and lets you either copy the data to the
clipboard if selected using Ctrl-C or lets you extract all data to a XML-formatted file using the "Extract to XML" button.

107 / 200

Mobile Revelator 2.2.5

Android Binary XML

This tool will present all data from Android Binary XML Format and lets you either copy the data to the clipboard if selected
using Ctrl-C or lets you extract all data to a XML-formatted file using the "Extract to XML" button.

108 / 200

Mobile Revelator 2.2.5

HTTP/S data carver

This tool will search for any HTTP header that might have been cached in the raw flash images or single cache files. Either
choose
"Single file" to search within a single file or "Directory including subdirectories" to search within any folder and its
subfolders being selected.

In order to sort any data, just click on the header. You may export the data to text-formatted CSV-Format, Office XLSXFormat and SQLite database.

109 / 200

Mobile Revelator 2.2.5

Samsung RIL carver

This tool will extract all Cell-Information, SIM-PIN, SIM-Provider-Information and much more from Samsung
Radio Information Layer (RIL) like on the Samsung Galaxy S3 Mini. Either choose "Single file" to search within a single file
or "Directory including subdirectories" to search within any folder and its subfolders being selected.

In order to sort any data, just click on the header. You may export the data to text-formatted CSV-Format, Office XLSXFormat and SQLite database.

110 / 200

Mobile Revelator 2.2.5

Android Password carver

This tool will extract any WLAN or HTTP Plaintext password. In order to sort any data, just click on the header.
You may export the data to text-formatted CSV-Format, Office XLSX-Format and SQLite database.

111 / 200

Mobile Revelator 2.2.5

File Ripper

The File Ripper utility lets you search and rip known filetypes. Before running any option, you should select a directory
where the reports and files should be written to using "1. Set Outputdirectory". Then choose if you want to search in one
single file or in a directory using the "Input selection" field.
You may then choose the following functions :
- "Run search" will rip (search full file content) / search (look at file start) any selected file. You may select multiple file
types
using Ctrl-Key as well.
- "Rip AAC" will rip any AAC MP4-Fragments it may find.
- "JPG-Thumbnail-Preview" extracts and carves jpgs and thumbnails, pressing "Save to html report" will save the found
files
and thumbails to the output-directory. You may doubleclick on the pictures to see the full image size, if available :

112 / 200

Mobile Revelator 2.2.5

113 / 200

Mobile Revelator 2.2.5

Apple iThmb Extract
This tool lets you extract JPG Pictures from .ithmb thumbnail databases being found in Apple devices under
PhotoData/Thumbnails directory. The Filename contains the index which is being used in the /PhotoData/Photos.sqlite
database as well.
For getting information about deleted images, run
"SELECT * FROM ZGENERICASSET as asset, ZADDITIONALASSETATTRIBUTES as attrib WHERE attrib.ZASSET
== asset.Z_PK AND asset.ZTHUMBNAILINDEX == 1234;" as sqlite command
whereas the thumbnail index to be retrieved would be 1234 in this example.

114 / 200

Mobile Revelator 2.2.5

Report

The report menu offers several tools for generating reports.

115 / 200

Mobile Revelator 2.2.5

Timeline report
The Android timeline module will search for time relevant information within raw files and/or extracted database files.
Choosing a huawei backup or android backup
as raw file is also possible. You may add custom databases at any time by creating a new xml file in the "C:
\Users\xxx\Documents\Mobile Revelator\Template\[OS]" path. Please see Templates Documentation on how to create and
use Python and Timeline modues. If the additional cell database has been installed, detected cell information from
herrevad databases will be converted to place names automatically.

116 / 200

Mobile Revelator 2.2.5

Using Ctrl-F you can search for any string, clicking on an entry in the result tab will show the selected entry in the table.
Double-left-clicking a category with the mouse on the tree will only show the current selected entry. Using CTRL-Key on
the keyboard and left-click with the mouse you can select multiple categories, pressing right-click on the mouse will offer
you a menu to only show selected items or to hide selected items from the current table display.
Using Ctrl-B you can bookmark selected lines. on the bookmarks tab, you can select entries to show which also allows you
to bookmark any results and generate reports based on bookmarked items.
Clicking on the table header, you may sort items as required. Enabling timezones will display the selected timezone in both
view and report.
You can also filter between two dates, which will then show only the entries with timestamps in between.
Reports

117 / 200

Mobile Revelator 2.2.5

You may select any report type by clicking on the list right hand of the "Export to:" button. Pressing the "Export to: " button,
you may choose whether the currently displayed table, the current selection (in the tree and/or in the content tab) or all
data will
be extracted to reports.
For PDF and HTML reports, you may sort items and report will be sorted as well. Just click on the header of the table to
sort items.
Right clicking on a content filename, you can select "Jump to filename" in order to open up a filesystem view, pointing to
the selected file in the report.
Using "Split reports by Category", you can automatically generate separate report files for each category.
If "Include extraction of relevant files" has been selected, all files including necessary files will be extracted to the "files"
subdirectory in the report folder
and contents will be clickable in both pdf and html reports.

118 / 200

Mobile Revelator 2.2.5

Location/GPS data report

This tool will carve any gps data from either EXIF-information being using in JPG-Files, from GPS-Ascii-Standard NMEA,
from Google KML-based data structures, from any Garming GPX dataset and from Internet Evidence Finder report files
as well.
If you choose to "Get location info using database", MR will retrieve its town and country information without online
connection.
Selecting "Select directory recursively" will seek within any file that has been selected, recursively for each subdirectory.
Pressing "run" you will either be able to select the directory or file to search for.

In order to sort any data, just click on the header. The data fields "Country Code", "Postal Code", "Town" and "Distance to
town" are generated by MR to get a quicker overview about the coordinates. You may export the data to text-formatted
CSV-Format, Office XLSX-Format and SQLite database.

119 / 200

Mobile Revelator 2.2.5

Carve 7-Bit SMS

This tool will extract any 7-Bit formatted sms that matches the 3GPP standard. Either use the generic method by selecting
"Try generic search instead of having to choose SMS country" or, if more precision and less wrongly carved sms data is
needed, uncheck the option and select the appropriate SMSC Country. Export of the data to the Office XLSX-Format
is possible using the button "Export to xls". In order to sort any data, just click on the header.

120 / 200

Mobile Revelator 2.2.5

Android

This menu will convert cache.cell and cache.wifi files to Google .gpx Files.

121 / 200

Mobile Revelator 2.2.5

Cache.cell/.wifi to GPX
This function allows to convert cache.cell and cache.wifi files to google gpx files.

122 / 200

Mobile Revelator 2.2.5

Nokia

The Nokia PM report tool is able to extract call logs, sms and much more
from Nokia .pm files.

123 / 200

Mobile Revelator 2.2.5

Nokia PM

The Nokia PM report tool allows you to extract numbers, calllogs, SMS, etc. from PM files. In order to ensure proper
decryption of userlock codes, make sure you enter the right IMEI before. The resulting report will be written as an HTML
file.

124 / 200

Mobile Revelator 2.2.5

Motorola

The Motorola ODM Tool converts raw inbox and outbox sms files to a readable format.

125 / 200

Mobile Revelator 2.2.5

ODM Inbox SMS

The Motorola ODM SMS Inbox tool lets you decode the "smsIBMsg" file. Pressing on "Export to xls", the
decoded data in the table will be written into a XLSX file.

126 / 200

Mobile Revelator 2.2.5

ODM Outbox SMS
The Motorola ODM SMS Inbox tool lets you decode the "smsOBInfo" file. Pressing on "Export to xls", the
decoded data in the table will be written into a XLSX file.

127 / 200

Mobile Revelator 2.2.5

Utilities

The utilities menu contains several tools which are hardware based or offer additional information.

128 / 200

Mobile Revelator 2.2.5

Firmware Utils

The firmware utils offer many tools for conversion between proprietary firmware formats and regular file formats.

129 / 200

Mobile Revelator 2.2.5

Samsung

This util offers functionality to convert Samsung firmware.

130 / 200

Mobile Revelator 2.2.5

Convert .img to .tar.md5
This tool is able to convert Samsung raw image files to .tar.md5 files for usage in Samsung's Odin tool.

131 / 200

Mobile Revelator 2.2.5

HTC

This util offers functionality to convert HTC firmware.

132 / 200

Mobile Revelator 2.2.5

Decrypt HTC RUU
This tool is able to decrypt encrypted HTC RUU .ZIP firmware containers.

133 / 200

Mobile Revelator 2.2.5

LG

This util offers functionality to convert LG firmware.

134 / 200

Mobile Revelator 2.2.5

Decrypt KDZ
This tool is able to convert encrypted LG KDZ containers to LG .DZ containers.

135 / 200

Mobile Revelator 2.2.5

Unpack DZ
This tool is able to convert encrypted LG DZ containers to .cab files.

136 / 200

Mobile Revelator 2.2.5

Android

This util offers functionality to convert Android generic firmware.

137 / 200

Mobile Revelator 2.2.5

Android 4.x : Convert .img to raw .bin
This tool is able to convert android 4.x firmware in ".img" format to raw .bin files.

138 / 200

Mobile Revelator 2.2.5

Android 5.x : Convert .new.dat to raw .bin
This tool is able to convert android 5.x firmware in ".new.dat" format to raw .bin files.

139 / 200

Mobile Revelator 2.2.5

Number Decoder

The number decoder tools offer tools for identification and generating more information about unique serial
numbers and standardized items.

140 / 200

Mobile Revelator 2.2.5

Number To Country

The number decoder will convert international telephony codes into country names.

141 / 200

Mobile Revelator 2.2.5

IMSI Decode

The IMSI decoder is able to decode IMSI data to provider information.

142 / 200

Mobile Revelator 2.2.5

ICCID Decode

This tool converts SIM card ICCID numbers to provider Information according to the ITU E.118 standard.

143 / 200

Mobile Revelator 2.2.5

MAC Lookup

The mac lookup is able to show vendor information for mac addresses.

144 / 200

Mobile Revelator 2.2.5

SDCard CID Decoder

The SDCard CID decoder tool is able to convert hex values into the appropriate JEDEC description.

145 / 200

Mobile Revelator 2.2.5

Time Stamp Decoder

The timestamp converter is able to both convert from dates to values as well from values to dates.

146 / 200

Mobile Revelator 2.2.5

Compression Util

The decompression tool is able to uncompress any gzipped or lz4 zipped data, which is likely common in kernels and
router firmwares.If you leave the settings as they are, the tool will try to find and automatically extract each segment as a
different file. If the autodetection fails you may as well check the "Use startoffset" checkbox, which will allow you to enter a
specific offset as a hex value as the startoffset for decompression.

147 / 200

Mobile Revelator 2.2.5

Hex Editor

The hex editor is able to show binary files with different types of interpretation. You may choose a disassembler at the right
for disassembling code patterns in the current hex editor data. On the left side, you may see that ascii bytes are colored
green, 00's and FF's are colored black, and lower bytes in between are colored blue as well as higher bytes in between are
colored yellow. On the left most side, you can see a statistical interpretation of each triple-bytes including entropy, which
may help you identify different file types without having a file header.

148 / 200

Mobile Revelator 2.2.5

Cryptanalysis

The cryptanalysis menu offers several tools for decrypting information from different apps or vendors
and contains "Crypto Tools" for experimentations with several crypto standards and techniques.

149 / 200

Mobile Revelator 2.2.5

Crypto Tools

The crypto tools allows you to play with several cryptographical functions.

150 / 200

Mobile Revelator 2.2.5

RSA

151 / 200

Mobile Revelator 2.2.5

DES

152 / 200

Mobile Revelator 2.2.5

AES

153 / 200

Mobile Revelator 2.2.5

Twofish

154 / 200

Mobile Revelator 2.2.5

ARC4/RC4

155 / 200

Mobile Revelator 2.2.5

Blowfish

156 / 200

Mobile Revelator 2.2.5

TEA

157 / 200

Mobile Revelator 2.2.5

SEED

158 / 200

Mobile Revelator 2.2.5

XOR

159 / 200

Mobile Revelator 2.2.5

Base64

160 / 200

Mobile Revelator 2.2.5

Padding

161 / 200

Mobile Revelator 2.2.5

Bruteforce

The bruteforce menu offers several functionality in order to bruteforce passwords and pin codes either via
GPU or CPU. If no GPU has been installed, it is recommended to install the Intel OpenCL SDK, otherwise
the program may crash when trying to use GPU functions. Also we strongly recommend AMD graphic cards,
as NVIDIA cards are comparable slower and error prone.

162 / 200

Mobile Revelator 2.2.5

Android Encryption GPU Bruteforcer

The android GPU encryption bruteforcer is able to bruteforce the PIN/passwords for android devices without hardware
encryption using keymaster. Choosing "Markov stats" might speed up password guesses but may not find all
passwords and is slower than the "Charset" attack. If you select "Wordlist", you may use a wordlist for bruteforcing
instead.
The charset may be any of the known hashcat charsets, which are :
?a = all chars
?d = digit
?u = uppercase letters
?l = lowercase letters
?1 = digits, lower and uppercase letters and some special chars
?2 = 0-9 and A-Z
?3 = a-z and A-Z
For bruteforcing password/PINs, you will need the footer which is either at the end of the userdata partition (last 16K, hex
bytes starting with "C5B1B5"
and at least 0xA00 bytes long) or within the metadata partition. The header contains the first 0x1000 bytes from the
encrypted userdata partition.

163 / 200

Mobile Revelator 2.2.5

Android Password / PIN GPU Bruteforcer

The android password/PIN GPU bruteforcer is able to bruteforce the PIN/passwords for android devices without hardware
encryption using keymaster. Choosing "Markov stats" might speed up password guesses but may not find all
passwords and is slower than the "Charset" attack. If you select "Wordlist", you may use a wordlist for bruteforcing
instead.
The charset may be any of the known hashcat charsets, which are :
?a = all chars
?d = digit
?u = uppercase letters
?l = lowercase letters
?1 = digits, lower and uppercase letters and some special chars
?2 = 0-9 and A-Z
?3 = a-z and A-Z
For bruteforcing password/PINs, you will need the password.key or sparepassword.key file from /data/system as well
as either /data/com.android.provider.settings/databases/settings.db for android < 4 or /data/system/locksettings.db
including its
-wal and -shm files.

164 / 200

Mobile Revelator 2.2.5

WP7.x/WP8.x PIN GPU Bruteforcer

The WP7.x/WP8.x PIN GPU bruteforcer is able to bruteforce the PIN for Windows Phone 7 and 8 devices. The charset
may be any of the known
hashcat charsets, which are :
?a = all chars
?d = digit
?u = uppercase letters
?l = lowercase letters
?1 = digits, lower and uppercase letters and some special chars
?2 = 0-9 and A-Z
?3 = a-z and A-Z
For bruteforcing WP PINs, you will need the Registry Files, such as "system.hv" or "SOFTWARE" from MainOS/UserFS
partition.
Choosing "Markov stats" might speed up password guesses but may not find all passwords and is slower than the
"Charset" attack.
If you select "Wordlist", you may use a wordlist for bruteforcing instead.

165 / 200

Mobile Revelator 2.2.5

SQLCipher Bruteforcer

The Sqlcipher GPU bruteforcer is able to bruteforce passwords for encrypted sqlite databases using
sqlcipher v2 and v3. The charset may be any of the known hashcat charsets, which are :
?a = all chars
?d = digit
?u = uppercase letters
?l = lowercase letters
?1 = digits, lower and uppercase letters and some special chars
?2 = 0-9 and A-Z
?3 = a-z and A-Z
Choosing "Markov stats" might speed up password guesses but may not find all passwords and is slower than the
"Charset" attack.
If you select "Wordlist", you may use a wordlist for bruteforcing instead.

166 / 200

Mobile Revelator 2.2.5

BB Keystore Bruteforcer

The Blackberry Keystore Password GPU bruteforcer is able to bruteforce keystore passwords for either raw images or
.ipd/.bbb backup files. The charset may be any of the known hashcat charsets, which are :
?a = all chars
?d = digit
?u = uppercase letters
?l = lowercase letters
?1 = digits, lower and uppercase letters and some special chars
?2 = 0-9 and A-Z
?3 = a-z and A-Z

Choosing "Markov stats" might speed up password guesses but may not find all passwords and is slower than the
"Charset" attack.
If you select "Wordlist", you may use a wordlist for bruteforcing instead.

167 / 200

Mobile Revelator 2.2.5

Android Patternlock CPU Bruteforcer

Opening the "gesture.key" file from /data/system directory, this tool will bruteforce and show you the
pattern lock. Just press "Animate" to show an emulation of the pattern.

168 / 200

Mobile Revelator 2.2.5

Bleichenbacher RSA Attack (Exponent 3)

The Bleichenbacher Attack is able to create a fake and valid signature if a rsa certificate with exponent 3 is being used.
Using "Sign image" you are able to sign android images. "Run attack" lets you try fake signatures, just set the correct
modulus (public key) and the hash value to sign for.

169 / 200

Mobile Revelator 2.2.5

Decrypt

The decrypt menu offers several tools to decrypt vendor specific and app specific encryption.

170 / 200

Mobile Revelator 2.2.5

Android

171 / 200

Mobile Revelator 2.2.5

Decrypt Android Application (.asec)
Paid Android Applications may use encrypted Containers with the extension .asec to store the application itself and
application data. Those asec files are normally stored into the directory /data/app-asec. For decryption you will need the
AppsOnSD.sks file from /data/misc/systemkeys.

172 / 200

Mobile Revelator 2.2.5

Decrypt Android Partition / SDCard Files

This menu lets you decrypt any Android partition via "Decrypt Partition (dmcrypt)" or sdcard raw image via "Decrypt
SDCard Directory (eCryptFs)" button. Enter the password before pressing any decrypt button. For SDCard decryption you
will need the edk_p_sd file and for partition decryption, you will need the correct footer, starting with hex bytes "C5B1B5"
with a size of at least 0x1000 bytes.

173 / 200

Mobile Revelator 2.2.5

Decrypt Whatsapp Databases (.crypt/.crypt5-12)
This function will decrypt all encrypted whatsapp databases (.crypt/.crypt5/.crypt6/.crypt7/.crypt8/.crypt9/.crypt10/.crypt11/
.crypt12) in one directory using the "key" file from "/data/data/com.whatsapp/files".

174 / 200

Mobile Revelator 2.2.5

Decrypt Threema database
This function will decrypt any Threema application databases.

175 / 200

Mobile Revelator 2.2.5

Decrypt SQLCipher (AES-256) Database
This function will decrypt any sqlcipher version 2 or 3 encrypted application databases.

176 / 200

Mobile Revelator 2.2.5

Decrypt McAfee Suite WSAndroidAppConfig.xml
This function will decrypt McAfee Suite WSAndroidAppConfig.xml file.

177 / 200

Mobile Revelator 2.2.5

Decrypt KeepSafe files
This function will decrypt any keepsafe files without the need of the PIN.

178 / 200

Mobile Revelator 2.2.5

Convert Android 4.x/5.x Backup File to TAR
This function will decrypt android .ab backup files with the given password to a .tar file.

179 / 200

Mobile Revelator 2.2.5

Decrypt Cleanmaster Security Patternlock
This function will deobfuscate the Patternlock stored in the cleanmaster security config xml
"com.cleanmaster.mguard_preferences.xml".

180 / 200

Mobile Revelator 2.2.5

Decrypt SnapChat Received Story Files
This function will try to decrypt all snapchat received story files with known or available aes keys.

181 / 200

Mobile Revelator 2.2.5

Decrypt Telekom Mail Database
This tool is able to decrypt the Telekom Mail App database.

182 / 200

Mobile Revelator 2.2.5

Decrypt Wickr Database
This tool is able to decrypt wickr databases for both PC (using given password and user SID) and Android (using given
password and android_id).
In order to get the user SID for Windows based wickr databases, just run the following command under windows console :
"whoami /user". For android databases, the android_id is stored in the database
"com.android.providers.settings/databases/settings.db" in the table secure.

183 / 200

Mobile Revelator 2.2.5

Blackberry

The blackberry menu offers tools to bruteforce/extract passwords, but also extract pgp keys from blackberry backups
(*.bbb / *.ipd) or raw images.

184 / 200

Mobile Revelator 2.2.5

Decrypt Blackberry REMF SQLite Database
This function decrypts any Blackberry SQLite Database encrypted by "REMF" Container using a given Backup .ipd or .bbb
file.

185 / 200

Mobile Revelator 2.2.5

Retrieve Blackberry PGP Private Key
This function will extract any PGP Private key given a password from either Backberry Backup file .ipd/.bbb or any raw
flash image after wear leveling has been reconstructed.

186 / 200

Mobile Revelator 2.2.5

MTK

187 / 200

Mobile Revelator 2.2.5

MTK Decrypt Files

You can decrypt MTK files using this menu. Normally, for correct decryption, segment size has to be modified fitting to the
content. If a non-generic MTK key has been used, enter the customkey as ascii, otherwise leave this field empty.
Depending on the age of the device, you may need to select new or old method for proper decryption.

188 / 200

Mobile Revelator 2.2.5

Binary Search Tool

The Binary Search Tool searches for most common file type headers and crypto variables. Using the "Edit config file"
button, you may edit the config file that will be used for searching within files.
The structure within the binarysearch.xml file is :


- "signature" specifies the signature in hex bytes to search for. "??" is a wildcard for one byte being unknown.
- "name" specifies the displayed name in the report table.
Pressing "Open File", you may specify to search in one single file or in a directory including the subdirectories.

Once it's finished, it's going to show you the corresponding filenames, offsets and the identified name.

189 / 200

Mobile Revelator 2.2.5

Settings

The setting menu uses predefined options for the whole MR program.

190 / 200

Mobile Revelator 2.2.5

Configure

On the Report Settings screen, you can set default settings for reports, including
Examiner and Organisation name and Logo to be displayed on the report.

On the Application Paths screen you can set the application paths for the filesystem tools.

191 / 200

Mobile Revelator 2.2.5

On the GPU Settings tab, you can modify GPU Acceleration and own hcstat files
used for GPU Bruteforcing. Higher GPU Accleration can increase speed, but can also
crash your graphic card driver or slow down your pc to be unusable.
Press "Set" in order to choose the application executable that should be used. Once you're
finished setting up the options, just press "Apply" and the settings will be stored.

192 / 200

Mobile Revelator 2.2.5

Templates Documentation
SQLite Template and Timeline xml Files :
Templates help you to automatically interpret known fields using self-written xml-templates. Pressing "Open template/plugin
directory" will open up the directory containing the template directory. Alternatively, you may open up the path "c:
\Users\[Username]\Documents\MobileRevelator\templates\" on windows. Templates are being written as package name
unter its Operating System Directory name such as "Android" or "iOS".

193 / 200

Mobile Revelator 2.2.5

Timeline XML Documentation
Example :




















The timeline module has a fixed amount of table columns and are specified as :
type
:
Title of the extracted content
package :
Package information, such as namespace or application
timestamp
:
Timestamp
foregroundtime
:
Total commulated foreground time or total call time
desc
:
Additional data or description
contact
:
Raw contact id as used by the application
contact_alias :
Alias given for a raw contact id
message :
Message or Email content only
image
:
Images as ByteArray to display
All timeline applications can be defined in separate xml files under the os directory name such as "Android" or "Windows".
Timeline entries always have to start with "


Every timeline item is unique for each database being extracted. You can define the path, which points directly to the
application database. You may use * as a wildcard, if filename changes or path is unknown. The type defines whether it is
an sqlite database as "database" or a raw file with type "raw". For raw files, you need to provide python scripts for
decoding.
2. Analysis of Timeline items

Each item can have different databases being attached using an alias, which can then be used by any sqlite command for

194 / 200

Mobile Revelator 2.2.5

requests. One sqlite request for example with an attached database would be : "select * from profile.table;"


You can either run sql commands or run python plugins. Python plugins use the defined plugin name in the python itself. Sql
Commands can be any valid sqlite command.

Using the arguments field, you can send custom small python scripts to the given python script as initial argument being
run before running the script. Given arguments can then be used within the script.
3. Categories
For each result of the sql or python result table, you can define where the table cell entry should be used for.
Type:

The Type field has the description text of the module, called "text" and a describing category which will be listed when the
report is done, called "category".
Timestamps and Foregroundtime:



In the examples, {%3} and {%6] define the 4th and 7th result entry. The timestamp field additionally contains the function
"int", which can be used for calculations of the returned value and the function "format" in case the result value is a
formatted time string.
Description, Contact, Contact_Alias, Message, Image:







The field addfields function can be used to combine Text together with result entries. Each field addfields line only is able to
hold one result entry. Additionally, you can replace result entries using the "replace" function, whereas each value to be
replaced is separated by semicolon. Furthermore result entries with Base64 content can be regulary decoded using the
function "unbase64" and the value 0, and url decoded using the value 1. The function "unhtml" with the value 1 can be used
to unescape html based text. If a field contains latitude and longitude instead of addfields, it will return a location string
based on the given latitude and longitude.

195 / 200

Mobile Revelator 2.2.5

Template XML Documentation
Example :




















The name-Field is the name being displayed in the Template List. Path should be the name of the database in order to
autodetect the database when opening up.
Each template for each table starts with either the "table", in this case "btopp" or a sql database query which starts with
"database". If you only want to see
the columns being listed in the template, add the option "deletemissingfields="true". Then, for each column, you may start
the following actions :
1. Replace an integer range with text : r from="xxx" to="xxx" with=text"
2. Replace an integer or text with text : r replace="xxx" with="xxx"
3. Run any sqlcmd with the current value in the column [%1] with : r cmd="sqlquery"

196 / 200

Mobile Revelator 2.2.5

Python API Documentation
1. Generic information :
For SQLite or Timeline plugins :
Each python plugin has to have a first line which indicates the name of the plugin, example :
#Pluginname="Telegram Messages (Android)"
For FS plugins :
Each python plugin has to have two first lines which indicate the name and the category of the plugin, example :
#FSPluginname="Telegram Messages (Android)"
#Category="Reports"
Errors on runs can be shown by using the python console display.
The plugin class is ctx.

2. Python functions :
Main functions which interact with MR GUI:
void gui_setMainMessage (int type, QString text, QString title)
Display a messagebox with title and text, type
0 is Information, type 1 is Warning.
void gui_setMainProgressBar (int pos)
Set the main progressbar to a position between 0 and
100
void gui_setMainLabel (QString text)
Set the main label
QString gui_getpythonpath()
Return the path to the installed python executable
QString gui_getpythonscriptpath()
Returns the path where the python scripts reside
QString gui_askSaveDir (QString label)
Asks for a directory to save to and returns the
directory name, otherwise "" if user aborted.
QString gui_askSaveFile (QString label, QString filename="", QString filter="")
Asks for a file name to save and
returns the file name. otherwise "" if user aborted.
QString gui_askFile (QString label, QString filename="", QString filter="")
Asks for a file name to read and returns
the file name. otherwise "" if user aborted.
QString gui_askDir (QString label)
Asks for a directory and returns the directory name,
otherwise "" if user aborted.
bool gui_askYesNo (QString label)
Will display label, asking the user to press yes or no. Result
is true for yes and false for no.
void gui_log_addText (QString text, bool clear=false)
Add a text to the log window. Set clear if log window
shall be cleared first
QString gui_getscriptpath()
Returns the current script path.
QString gui_getDate (unsigned int query)
Convert unix timestamp to time string.
QString gui_add_report_relevant_file (QString filename)
Add report relevant file paths for timeline module
to extract.
QVariantList gui_data_size()
Return the row and column count from the current table
view as List.
QVariant gui_get_data (int row, int col)
Get data from current table view
bool gui_set_data (int row, int col, QVariant entry)
Set any data in current table view
bool gui_set_data_bytearray (int row, int col, QVariant entry)
Set any data as bytearray in current table view
void gui_update()
Refresh gui in order to show table results
void gui_update (int connection)
Refresh gui in order to show table results for
a given sqlite connection index.
bool gui_remove_rows (int row, int col, int count)
Remove rows from the current table view.
bool gui_remove_columns (int row, int col, int count)
Remove columns from the current table view.
bool gui_add_column (QString text)
Add Columns to the current table view.
bool gui_set_data_color (int row, int col, int r, int g, int b, int a=0)
Set the background color of a specific cell of
the current table view.
QStringList gui_get_headers()
Get the headers from the current table view.
bool gui_set_headers (QStringList headers)
Set the headers from the current table view.
void gui_clear_data()
Clear all table data.
QStringList gui_get_currentcell()
Returns current active selected cell (row,column) as an

197 / 200

Mobile Revelator 2.2.5

array.
QStringList pluginfilenames()

Returns filenames to be parsed by the timeline module.

FS Browser specific functions:
int fs_file_extract (QString filetoextract, QString outpath)
Extract file from file tree, return -1 if it fails.
Example:
fs_file_extract("/data/local/tmp/file.db","C:/extracttohere")
void fs_hide (QString filename)
Hide a file from file tree
int fs_isDir (QString filename)
Returns 1 if given filename is a directory
int fs_isFile (QString filename)
Returns 1 if given filename is a file
int fs_dir_extract (QString dirtoextract, QString outdir)
Extract directory from file tree, return -1 if it fails.
Example:
fstree_dir_extract("/data/local/tmp","C:/extracttohere")
QStringList fs_filelist()
Returns a list of all files and directories from the file tree
QStringList fs_getselected()
Returns a list of all currently selected files
QStringList fs_getDir (QString filename)
Returns a list of all files from a given file tree directory
bool fs_sqlcipher_decrypt (QString inputfile, QString outputfile, QString passwd) Decrypt a sqlciphered database using a
given password.
QStringList fs_gettime (QString filename)
Returns created, lastRead and modified timestamp for a
given file as a string list
SQLite functions for accessing databases:
int sqlite_open (QString filename, bool external)
Open a file as sqlite database, set external to true
for external files, false for files from file tree.
Returns -1 if it fails, otherwise db connection index.
If the filename specific is "gui", the current open database in the program
context is being used.
QString sqlite_last_error (int dbconnection)
Return the last Sqlite error using a given connection
index.
bool sqlite_close (int dbconnection)
Close the given db connection index.
int sqlite_run_cmd (int dbconnection, QString query)
Runs a given query string using a given db
connection index, returns -1 if it fails, otherwise connection index.
Example: "sqlite_run_cmd(dbindex,"SELECT * from table;")",
bool sqlite_cmd_close (int connection)
Close the given connection index.
int sqlite_get_deletedrecords (int dbconnection, QString tablename)
Returns all reconstructable deleted records
and stores them into the sqlite table using given database
connection index.
Returns -1 if it fails, otherwise connection index.
QStringList sqlite_get_headers (int connection)
Returns a list with all field names from given
connection index.
bool sqlite_set_headers (int connection, QStringList headers)
Sets all field names from given connection
index and field names as string list.
QVariantList sqlite_get_data_size (int connection)
Returns a list with current rows and column count.
QVariant sqlite_get_data (int connection, int row, int col)
Return sqlite table entry using given row, column
and connection index.
bool sqlite_set_data (int connection, int row, int col, QVariant entry)
Set sqlite table entry using given connection
index.
Example: "sqlite_set_data(cmdindex,0,0,"Hello World")".
bool sqlite_set_data_bytearray (int connection, int row, int col, QVariant entry) Set sqlite table entry as bytearray using
given connection index.
Example: "sqlite_set_data(cmdindex,0,0,"Hello World")".
bool sqlite_remove_rows (int connection, int row, int count)
Remove rows at row index with row count using
given connection index.
bool sqlite_remove_columns (int connection, int col, int count)
Remove columns at column index with
column count using given connection index.
bool sqlite_add_column (int connection, QString text)
Add column to the sqlite table data with given field
name to given connection index.
bool sqlite_set_data_color (int connection, int row, int col, int r, int g, int b, int a) Set sqlite table entry color using given
row and column, connection index, and color (rgb) as well as
alpha(transparency) value.
void sqlite_clear_data (int connection)
Clear the current sqlite table with given connection
index.
bool sqlite_save_as_xlsx (int connection, QString fileName, QString name) Save the current sqlite table as xlsx-file with
given connection index, filename to save to and name.
198 / 200

Mobile Revelator 2.2.5

QString sqlite_get_filename (int connection)
given connection index.
QString sqlite_get_filename()

Return the current sqlite database filename from a
Return the current sqlite database filename.

Generic functions:
QByteArray base64todata (QString text, int type)
Convert Base64 Data to QByteArray.
QString htmltotext (QString html)
Convert HTML to plaintext.
QString getlocationcell (QString mcc, QString mnc, QString lac, QString cid)
Convert cell data to location string.
QString getlocation (double lat, double lon)
Convert latitude and longitude to string.

199 / 200

Mobile Revelator 2.2.5

200 / 200



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : No
Page Count                      : 200
Page Mode                       : UseOutlines
Page Layout                     : SinglePage
Create Date                     : 2019:02:03 20:21:05+01:00
Modify Date                     : 2019:02:03 20:21:05+01:00
Producer                        : eDocEngine VCL 5.0.0.164
Author                          : Bjoern Kerler
Creator                         : HelpNDoc Professional Edition 5.8.0.625
Title                           : Mobile Revelator 2.2.5
EXIF Metadata provided by EXIF.tools

Navigation menu