I'm trying to get to the original data stored on a Micros POS. Under the DB folder, I found over a 100 files, arranged in pairs: x.bin, x.key; y.bin, y.key etc. The file names look like table names, and each has a .key and a .bin.
After searching a lot, I got hints and rumors that the DB used by the POS is SQLite and that the files are encrypted, each with it's own key.
My question: is there a programmatic way to get at the data in those .bin files? Bonus: is there a way to create one unencrypted SQLite file containing all tables and all data?
Thanks for your time!
Just staring at the encrypted files will not likely to do much good (unless you have experience with crypto analysis). However, if you have the whole firmware from the device, there's a simpler (IMO) way: