What this tool does
Explains common mobile backup formats and helps identify the type of backup artifact you have.
This page focuses on practical, step‑by‑step usage for **Mobile Backup Forensic Analyzer**, with clear examples and common pitfalls.
When you should use it
Use it when you’re restoring devices, migrating data, or analyzing backup metadata for troubleshooting.
How to use
- Paste metadata or manifest excerpts.
- The tool highlights platform-specific markers (iOS/Android).
- Use the hints to choose the correct restore/import path.
Quick example
Example: Recognize iOS backup manifest patterns versus Android backup archives.
Notes
Backups often include private data; work on copies and in a secure environment.
Mobile Backup Forensic Analyzer
Extract messages, photos, contacts, and app data from iOS, Android, and app backups
What Can Be Extracted From Mobile Backups:
Text messages, iMessage, SMS, MMS from backups
Media files, thumbnails, deleted photos metadata
Phone contacts with names, numbers, emails
WhatsApp messages, media, databases, crypto keys
Encrypted messaging app data and backups
Call logs, durations, timestamps, contact info
GPS locations, frequent places, location history
Saved app credentials, authentication tokens
Upload Mobile Backup Files
Select Backup Type:
Drop iOS backup folder or file here or click to browse
Supports: iOS backups, Android backups, app databases, encrypted backups
iOS Backup Files:
- Manifest.plist - Backup manifest file
- Info.plist - Device information
- *.mddata / *.mdinfo - App data files
- *.mdbackup - iTunes backup files
For encrypted backups, provide the backup password if available
Uploaded Files:
Mobile Crypto Analysis
Analyze mobile encryption keys, database files, or crypto material:
Privacy & Security
Backup files are processed in memory and immediately deleted. No data is stored.
All file transfers use HTTPS encryption. Passwords are not stored.
Only analyze backups from devices you own or have permission to examine.
Important Considerations
Mobile backups contain highly personal and private information.
Always use secure connections when uploading sensitive backup files.
For maximum privacy, use offline tools like iBackup Viewer, DB Browser.
Mobile Backup Reference
FAQ
Is Mobile Backup Forensic Analyzer encryption?
No. It is primarily an analysis/encoding utility. If you need confidentiality, use a real encryption scheme and manage keys properly.
What should I do if the input fails to decode/parse?
Start by checking for missing padding, wrong alphabet/variant, or extra whitespace. If the data looks multi-layered, try decoding step-by-step (e.g., URL decode → Base64 decode).
Is it safe to paste sensitive data here?
For best security, avoid pasting real secrets (private keys, live tokens, seed phrases). Use test data or work offline, especially for anything that could grant access or move funds.