WhatsApp network forensics - http//
'WhatsApp network forensics Decrypting and understanding the WhatsApp call signaling messages'
"…decrypt the network traffic and obtain forensic artifacts that relate to this new calling feature which included the a) WhatsApp phone numbers, b) WhatsApp server IPs, c) WhatsApp audio codec (Opus), d) WhatsApp call duration, and e) WhatsApp's call termination."
Access to the trace information…
Thank you, great post and link!
Paste the following link into https://sci-hub.io/
http//
(direct link fails)
Unfortunately this work predates the adoption of Open Whisper System's Signal Protocol end-to-end encryption by Whatsapp, so is of limited use today….
Unfortunately this work predates….
Yeah, fair point. I did include the provision in my comments
From a network investigators point of view essential information producing evidential artifacts of identifying network activity. Taking this further, PenTesters might even find this information useful, also. Even where security flaws get updated, doesn't stop modified attacks occurring creating further vulnerabilities; so learning is the name of the
game.....http//trewmte.blogspot.co.uk/2017/06/whatsapp-network-forensics.html
I think this work can be put to good use for historical matters, training and as part of a forward learning curve; presumably Curve25519 ) idea ?
adoption of Open Whisper System's Signal Protocol end-to-end encryption by WhatsApp…
Already under attack. Interesting work on capturing the “ratcheting” key update structure. Although the "last resort key" made me smile. An the internal messaging attacks look promising and have produced some results. But a lot more work is need though.
Analysis of Signal Messaging Protocol
http//
Analysis of Signal Messaging Protocol
http//
eprint.iacr.org/2016/1013.pdf
Yes, got that research, good paper.
Try this
HUNTING FOR VULNERABILITIES IN SIGNAL - HITBSECCONF2017
April 10-14, 2017
https://