Extracting WhatsApp...
 
Notifications
Clear all

Extracting WhatsApp database from a non-rooted device

18 Posts
7 Users
0 Reactions
2,208 Views
(@skulkin)
Eminent Member
Joined: 12 years ago
Posts: 38
Topic starter  

We've written a new article "Extracting WhatsApp database and the cipher key from a non-rooted Android device". Hope you enjoy it

http//www.weare4n6.com/extracting-whatsapp-database-and-the-cipher-key-from-a-non-rooted-android-device/

Again, feedback is highly appreciated!


   
Quote
(@droopy)
Estimable Member
Joined: 11 years ago
Posts: 136
 

This is very OLD stuff, there are some new methods that even you dont need to connect the PC.

We could extract it without enabling usb debbuging directly in the sdcard unencrypted.
Just by removing the protection.

But your method is ok for basic forensics users.


   
ReplyQuote
(@skulkin)
Eminent Member
Joined: 12 years ago
Posts: 38
Topic starter  

What methods are you talking about?
It the device is rooted, of course, you can extract such data to SD-card, but what if it's not? In the article we are talking about non-rooted Android devices.


   
ReplyQuote
(@droopy)
Estimable Member
Joined: 11 years ago
Posts: 136
 

yes, i mean that, on NON ROOTED devices you could extract it easily.
No cable, no usb debugging.

Your method is prehistoric (4 years old method) but works.
New approach is better for goverment forensics


   
ReplyQuote
SamBrown
(@sambrown)
Trusted Member
Joined: 11 years ago
Posts: 97
 

This is very OLD stuff, there are some new methods that even you dont need to connect the PC.

We could extract it without enabling usb debbuging directly in the sdcard unencrypted.
Just by removing the protection.

How would you do that?


   
ReplyQuote
(@droopy)
Estimable Member
Joined: 11 years ago
Posts: 136
 

We have a special APK, that you install, and it move the database to the sdcard unencrypted directly. It is a custom apk for goverment use.
NO root required, NO cable, NO usb debugging.


   
ReplyQuote
(@trewmte)
Noble Member
Joined: 19 years ago
Posts: 1877
 

We have a special APK, that you install, and it move the database to the sdcard unencrypted directly. It is a custom apk for goverment use.
NO root required, NO cable, NO usb debugging.

droopy, unless you intend to share your "special APK" with everyone it isn't clear why you parallel your solution with Skulkin's article. At least Skulkin has acted positively by outlining and providing a working solution whereas you are only offering the vague suggestion that something is out there but not willing to share it.


   
ReplyQuote
Igor_Michailov
(@igor_michailov)
Honorable Member
Joined: 20 years ago
Posts: 529
 

We have a special APK, that you install, and it move the database to the sdcard unencrypted directly. It is a custom apk for goverment use.
NO root required, NO cable, NO usb debugging.

LOL

How many people use the application? 1? 2? 3?


   
ReplyQuote
jaclaz
(@jaclaz)
Illustrious Member
Joined: 18 years ago
Posts: 5133
 

LOL

How many people use the application? 1? 2? 3?

Independently from the current user base size, it is unlikely it will increase thanks to droopy's contribution. ?
Non government won't have access to that tool.
Government entities that may be eligible to have it cannot because it is not even named/referenced.

jaclaz


   
ReplyQuote
(@droopy)
Estimable Member
Joined: 11 years ago
Posts: 136
 

The tool is for goverment use only, if you are a goverment forensic, just PM me with your goverment email for more information.

We do goverment forensics
a) Jailbreak any iphone (any model actual or future) in 10 seconds
b) Whatsapp forensics for goverment (do call recording on android, remove all encryptions in realtime, etc.
c) Advance supercomputer password cracking (any RSA, PGP, etc.)
etc.

If you need any of them, just PM me (only goverment, verify)


   
ReplyQuote
Page 1 / 2
Share: