WhatsApp network fo...
 
Notifications
Clear all

WhatsApp network forensics

6 Posts
4 Users
0 Reactions
1,585 Views
(@trewmte)
Noble Member
Joined: 19 years ago
Posts: 1877
Topic starter  

WhatsApp network forensics - http//trewmte.blogspot.co.uk/2017/06/whatsapp-network-forensics.html

'WhatsApp network forensics Decrypting and understanding the WhatsApp call signaling messages'

"…decrypt the network traffic and obtain forensic artifacts that relate to this new calling feature which included the a) WhatsApp phone numbers, b) WhatsApp server IPs, c) WhatsApp audio codec (Opus), d) WhatsApp call duration, and e) WhatsApp's call termination."

Access to the trace information…


   
Quote
RolfGutmann
(@rolfgutmann)
Noble Member
Joined: 10 years ago
Posts: 1185
 

Thank you, great post and link!

Paste the following link into https://sci-hub.io/

http//www.sciencedirect.com/science/article/pii/S1742287615000985?via%3Dihub

(direct link fails)


   
ReplyQuote
AmNe5iA
(@amne5ia)
Estimable Member
Joined: 9 years ago
Posts: 175
 

Unfortunately this work predates the adoption of Open Whisper System's Signal Protocol end-to-end encryption by Whatsapp, so is of limited use today….


   
ReplyQuote
(@trewmte)
Noble Member
Joined: 19 years ago
Posts: 1877
Topic starter  

Unfortunately this work predates….

Yeah, fair point. I did include the provision in my comments

From a network investigators point of view essential information producing evidential artifacts of identifying network activity. Taking this further, PenTesters might even find this information useful, also. Even where security flaws get updated, doesn't stop modified attacks occurring creating further vulnerabilities; so learning is the name of the game.....http//trewmte.blogspot.co.uk/2017/06/whatsapp-network-forensics.html

I think this work can be put to good use for historical matters, training and as part of a forward learning curve; presumably Curve25519 ) idea ?

adoption of Open Whisper System's Signal Protocol end-to-end encryption by WhatsApp…

Already under attack. Interesting work on capturing the “ratcheting” key update structure. Although the "last resort key" made me smile. An the internal messaging attacks look promising and have produced some results. But a lot more work is need though.


   
ReplyQuote
(@tinybrain)
Reputable Member
Joined: 9 years ago
Posts: 354
 

Analysis of Signal Messaging Protocol

http//eprint.iacr.org/2016/1013.pdf


   
ReplyQuote
(@trewmte)
Noble Member
Joined: 19 years ago
Posts: 1877
Topic starter  

Analysis of Signal Messaging Protocol

http//eprint.iacr.org/2016/1013.pdf

Yes, got that research, good paper.

Try this

HUNTING FOR VULNERABILITIES IN SIGNAL - HITBSECCONF2017
April 10-14, 2017

https://conference.hitb.org/hitbsecconf2017ams/materials/D2T1%20-%20Markus%20Vervier%20-%20Hunting%20for%20Vulnerabilities%20in%20Signal.pdf


   
ReplyQuote
Share: