Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Malware

WhatsApp Xtract v2.0 – iPhone & Android Forensics

Paul Anderson by Paul Anderson
May 6, 2012
in Malware, Malware Analysis
0
75
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

You might also like

Syslogk Linux Rootkit triggers with magic packets

BlackCat Ransomware aka “ALPHV” infections on the rise

State-sponsored Iranian Hackers utilize .NET DNS Backdoor in new Attack

CHANGELOG V2.0 :
– (updated by Fabio Sangiacomo and Martina Weidner – Apr 28, 2012)
– supports WhatsApp DBs coming from both Android and iPhone platforms
– (Android Version) wa.db is optional
– (Android Version) now also crypted msgstore.db.crypt from the SD card can be imported
– chat list is sorted by the last sent message
– fixed some bugs (e.g. that the script didn’t work with python 3)
Some Additional Information :

SQLITE Editor

You also can open the “msgstore.db” and “wa.db” using SQLite Database Browser ( http://sqlitebrowser.sourceforge.net/ ).
However it is much more confusing and the messages are ordered by date, not by conversations. Also you won’t see the smileys and media files…

MEDIA FILES

If you want to watch the videos, audios and images, you can click on the thumbnails and media links. Popups should open displaying the media.
However, online media files are available only for the last ~ 3 weeks.
But you still can open the offline media files, they are linked as well.
For this it is necessary to copy the folder “Media” from /sdcard/Whatsapp (Android) or net.whatsapp.WhatsApp (Iphone) to the certain folder of your computer where this tool is installed.

ROOT ACCESS TO UNENCRYPTED WHATSAPP DATABASE (Android version only)

If you want to have the contact names displayed and not only phone numbers, then (Android version only) you need the file wa.db from the internal storage.

For that you need to get access to the folder
/data/data/com.whatsapp/databases
For that you need root access.
For rooting, the tool Superoneclick Root might be useful:
http://forum.xda-developers.com/showthread.php?t=803682

Then you can copy the files “msgstore.db” and “wa.db” to your computer by

– using the App RootExplorer (first copy to SD, then mount phone to computer)
– or using adb: open cmd and type “adb pull /data/data/com.whatsapp/databases/msgstore.db C:\Whatsapp” (replace C:\Whatsapp by the location of the certain folder of your computer)
– or using the app Titanium Backup. Use Titanium Backup to backup the full whatsapp application together with its data, copy the backup from the folder “TitaniumBackup” on the SD card to your PC, then extract the files “wa.db” and “msgstore.db” that you will find inside the Titanium Backup archive “com.whatsapp-[Date]-[some digits].tar.gz” to the certain folder.
– or using some app like AirDroid or Webkey to access files over wifi using the PC webbrowser

HOW TO USE:

(see also the thread at xda-dev: http://forum.xda-developers.com/showthread.php?p=24603294 )

1. You need to copy the whatsapp database.

On Android, either get this file:

/sdcard/WhatsApp/Databases/msgstore.db.crypt
(crypted database on SD card, can be created by starting backup from whatsapp advanced settings)

or these files:
/data/data/com.whatsapp/databases/msgstore.db and wa.db
(for this you need root access. detailed instructions in the bottom of this file. the advantage is that the corresponding contact names of phone numbers will be displayed.)

On IPhone, get this file:

net.whatsapp.WhatsApp/Documents/ChatStorage.sqlite
(You can use an Iphone Backup Tool to get the file, e.g. I-Twin or Iphone Backup Extractor. Make sure to create an unencrypted backup with Itunes, as these tools can’t handle encrypted backups. Another possibility are forensic tools like UFED Physical Analyzer.)

2. Copy the database(s) to a certain folder on your computer.

3. Extract this archive (with whatsapp_xtract.py, whatsapp_xtract.bat, …) to the certain folder

4. You need Python and (for Android msgstore.db.crypt decryption) the PyCrypto library

The easiest way is to install ActivePython (on Windows choose 32bit version even if you have 64bit windows):
http://www.activestate.com/activepython/downloads

and then (for PyCrypto) run install pyCrypto.bat (contained in this archive)
(pyCrypto.bat will execute: pypm install pycrypto)

5. Now run whatsapp_xtract_android.bat or whatsapp_xtract_android_crypted.bat or whatsapp_xtract_iphone.bat

OR whatsapp_xtract_console.bat and then manually specify the input file with one of these commands:

COMMAND LINE OPTIONS:

For Android DB:
python whatsapp_xtract.py -i msgstore.db -w wa.db
OR (if wa.db is unavailable)
python whatsapp_xtract.py -i msgstore.db
OR (for crypted db)
python whatsapp_xtract.py -i msgstore.db.crypt

For iPhone DB:
(-w option is ignored)
python whatsapp_xtract.py -i ChatStorage.sqlite

Once finished, your browser will open and show the chats.

The resulting file size of the .html file will be slightly bigger than the size of the .db database.

Download : Whatsapp_Xtract_V2.0_2012-05-02.zip (575 KB) 
find other version |
Read more in here : http://blog.digital-forensics.it/

Tags: androidmalwareMalware Analysisphone
Share30Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

Syslogk Linux Rootkit triggers with magic packets

by Christi Rogalski
June 19, 2022 - Updated on June 20, 2022
0
Syslogk Linux Rootkit triggers with magic packets

Avast researchers have spotted a Linux rootkit that has the ability to hide malicious processes. The new Linux rootkit, called Syslogk, works by using magic packets to activate...

Read more

BlackCat Ransomware aka “ALPHV” infections on the rise

by Kyle
June 16, 2022
0
BlackCat Ransomware aka “ALPHV” infections on the rise

As the ransomware-as-a-service (RaaS) industry grows, more ransomware players come into the mix. BlackCat, also known as ALPHV, is a growing ransomware threat with the ability to target...

Read more

State-sponsored Iranian Hackers utilize .NET DNS Backdoor in new Attack

by Kyle
June 12, 2022
0
Lycaeum APT DNS hijacking backdoor

An Advanced Persistent Threat (APT) hacking group based out of Iran going by the name Lycaeum has been seen using a .NET-based DNS backdoor to target organizations within...

Read more

Emotet Banking Trojan Re-Emerges After Take Down by Law Enforcement

by Paul Anderson
June 10, 2022
0
Emotet Banking Trojan 2022

Botnet Emotet has re-emerged after being taken down by a multinational joint task force operation in January 2021. The developers behind Emotet have been given credit as one...

Read more

LuoYu Hacker Collective using New Techniques to Deploy WinDealer Backdoor

by Kyle
June 8, 2022
0
LuoYu Windealer advanced persistent threat actor

Researchers at Kaspersky Labs have discovered a new attack by Advanced persistent threat (APT) actor LuoYu utilizing the known malware WinDealer. WinDealer has the unique ability to perform...

Read more
Next Post
55k Twitter accounts leaked

55k Twitter accounts leaked

Related News

Google Chrome Extension fingerprinting source

Google Chrome exposes user extensions to fingerprinting

July 1, 2022
Downthem DDoS Service owner sentenced

Downthem DDoS service owner gets a 2-year prison sentence

June 30, 2022
Cloudflare record breaking DDoS

Cloudflare Stops Record-Breaking DDoS

June 29, 2022
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
    • Tools
  • Data Breaches
  • Malware
  • Privacy
  • Contact Us

© 2022 ZeroSecurity, All Rights Reserved.