We've written a new article "Extracting WhatsApp database and the cipher key from a non-rooted Android device". Hope you enjoy it
http//
Again, feedback is highly appreciated!
This is very OLD stuff, there are some new methods that even you dont need to connect the PC.
We could extract it without enabling usb debbuging directly in the sdcard unencrypted.
Just by removing the protection.
But your method is ok for basic forensics users.
What methods are you talking about?
It the device is rooted, of course, you can extract such data to SD-card, but what if it's not? In the article we are talking about non-rooted Android devices.
yes, i mean that, on NON ROOTED devices you could extract it easily.
No cable, no usb debugging.
Your method is prehistoric (4 years old method) but works.
New approach is better for goverment forensics
This is very OLD stuff, there are some new methods that even you dont need to connect the PC.
We could extract it without enabling usb debbuging directly in the sdcard unencrypted.
Just by removing the protection.
How would you do that?
We have a special APK, that you install, and it move the database to the sdcard unencrypted directly. It is a custom apk for goverment use.
NO root required, NO cable, NO usb debugging.
We have a special APK, that you install, and it move the database to the sdcard unencrypted directly. It is a custom apk for goverment use.
NO root required, NO cable, NO usb debugging.
droopy, unless you intend to share your "special APK" with everyone it isn't clear why you parallel your solution with Skulkin's article. At least Skulkin has acted positively by outlining and providing a working solution whereas you are only offering the vague suggestion that something is out there but not willing to share it.
We have a special APK, that you install, and it move the database to the sdcard unencrypted directly. It is a custom apk for goverment use.
NO root required, NO cable, NO usb debugging.
LOL
How many people use the application? 1? 2? 3?
LOL
How many people use the application? 1? 2? 3?
Independently from the current user base size, it is unlikely it will increase thanks to droopy's contribution. ?
Non government won't have access to that tool.
Government entities that may be eligible to have it cannot because it is not even named/referenced.
jaclaz
The tool is for goverment use only, if you are a goverment forensic, just PM me with your goverment email for more information.
We do goverment forensics
a) Jailbreak any iphone (any model actual or future) in 10 seconds
b) Whatsapp forensics for goverment (do call recording on android, remove all encryptions in realtime, etc.
c) Advance supercomputer password cracking (any RSA, PGP, etc.)
etc.
If you need any of them, just PM me (only goverment, verify)