SlideShare uma empresa Scribd logo
1 de 27
WhatsApp Forensics
Presented By
Animesh Shaw (Psycho_Coder)
Digital Evidence Analyst,
@ data64 Cyber Solutions Pvt. Ltd.
psychocoder@outlook.com
Discussion Goals
 What is WhatsApp ?
 WhatsApp Stats
 Security & Privacy: Previous Issues
 Real World Threat Scenario
 Why Indians Should be Concerned ?
 Why WhatsApp Forensics ?
 Terminology & Pre-Requisites
 Where to look for evidence ?
 Investigating WhatsApp Data
 Tools of Trade
 Safe guarding Principles
 References
What is WhatsApp ?
o An Instant Messaging app for smartphones.
o Requires data connection to send text messages,
images, video, user location and audio media
messages.
o In January 2015, WhatsApp was the most globally
popular messaging app.
o In April 2015, WhatsApp reached 800 million active
users.
o Subsidized by Facebook on February 19, 2014.
o Supported by wide range of mobile platform, like
Android, iPhone, iOS, BlackBerry OS, Windows Phone,
Symbian etc.
WhatsApp Stats
o WhatsApp was handling ten billion messages per day
as of August 2012, growing from two billion in April
2012.
o Number of downloads exceeds 100 million on Google
Play.
o In only three years it is among the top 30 free
applications.
o Among the top five free communication
applications on Google Play.
o Facebook Acquired WhatsApp for $19 billion USD.
Security & Privacy: Previous Issues
• In May 2011, a security hole was reported which left
WhatsApp user accounts open for session hijacking.
• In September 2011, it was reported that forged messages
could be sent.
• German Tech site The H demonstrated how to use
WhatsAPI to hijack any WhatsApp account on September
14, 2012.
• On 1st December 2014, Indrajeet Bhuyan and Saurav Kar,
both 17-year old teenagers, demonstrated the WhatsApp
Message Handler Vulnerability, which allows anyone to
remotely crash WhatsApp just by sending a specially
crafted message of 2kb in size.
Security & Privacy: Previous Issues (contd.)
• In February 2015, a Dutch university student named
Maikel Zweerink published an app that set out to
prove that anyone can track a WhatsApp user's status
and also keep an eye of their changing profile
pictures, privacy settings or status messages
regardless of their privacy settings
• WhatsApp message database AES encrypted file uses
the same key for all the installations.
Real World Threat Scenario - 1
Real World Threat Scenario - 2
• MAC address is a unique identifier assigned to your
phone or other device that essentially serves as its
online identity.
• MAC Spoofing is a Threat.
• Gaining Physical access to Victims Phone. Get MAC
Info and Spoof it in your own Smart phone.
• Using Busybox and Terminal Emulator change MAC of
ethernet interface.
• Reinstall WhatsApp on your phone and configure.
• Get confirmation code and erase from victims phone.
• Re-establish your previous MAC Address.
Why Indians Should be Concerned ?
• According to current statistics WhatsApp got
maximum exposure in India. Pic below shows
download stats (Jan. 2015)
• With 65 million active users, about 10% of the total
worldwide users, India is the largest single country in
terms of number of users
Why Indians Should be Concerned ? (contd.)
Why WhatsApp Forensics ?
• Huge active user base (>800 Million)
• Ability to share Video, Image or data
which might contain explicit content.
• Identify various data security issues in
instant messaging applications on the
Android and other Mobile platform which
aid in forensic investigations
Why WhatsApp Forensics ? (contd.)
• With more updates other privacy issues
could be developed.
• Research required to build better tools.
• Runs on multiple platform with different
file system.
• New Exploits/Privacy Hacking issues are
coming every now and then.
Terminology & Pre-Requisites
o ADB (Android Debug Bridge)
o Database (SQLite)
o Imaging/Cloning
o Android Developer Mode
o Encryption
o Symmetric
o Asymmetric
Where to look for evidence ?
• All the WhatsApp data is stored in either “Internal
Phone Storage” or in the SD card.
• Location:- /storage/emulated/0/WhatsApp/
Where to look for evidence ? (contd.)
• Crypt8 files encrypted with AES algorithm with a
256 bit key.
• Key:-
346a23652a46392b4d73257c67317e352e33724
82177652c
• Key in stored in
/data/data/com.whatsapp/files/key
• Retrieving key requires rooted android phone.
• Media folders contain Images, calls, videos etc.
• Rooted Android phone contains unencrypted
database.
• Wa.db contains WhatsApp contacts.
Where to look for evidence? (contd.)
• Android Volatile Memory Acquisition :-
– Need for Live acquisition ?
– Applications including WhatsApp start with boot.
– Background data consumption and chat logs can
be found in system RAM.
– Deleted messages still present in volatile
memory.
– Can be retrieved partially I not fully.
Investigating WhatsApp Data
• Clone Android Storage using AccessData FTK.
• Retrieve WhatsApp related data and many more.
• Using Andriller
Enable Developer Mode on Phone.
Enable Debugger Mode.
Connect to Phone.
Accept RSA Fingerprint on Phone.
Click on check and the device serial
Is detected.
Click Go to acquire a backup of your
Android data.
Investigating WhatsApp Data (contd.)
• Reports Created
• Several forensically important data can be retrieved.
Investigating WhatsApp Data (contd.)
• Decrypting WhatsApp .db.crypt8
Investigating WhatsApp Data (contd.)
• Using WhatsApp Viewer.
• Decrypts all data. Requires .NET Framework
• Need to supply “key” file separately.
• Requires to be compiled.
Investigating WhatsApp Data (contd.)
• Using WhatsApp Key/DB Extractor. Applicable for
Android version 4+.
• Provide a method for WhatsApp users to extract their
cipher key on NON-ROOTED Android devices. Once key
has been extracted we can use Andriller or WhatsApp
Viewer to recover data.
Investigating WhatsApp Data (contd.)
• Check for Steganography
– Images
– Videos
– Audio
– Text
Tools of Trade
• Andriller :- Android Forensic Tools
• WhatsApp Key/DB Extractor :- Extraction of Key
from NON-ROOTED phones.
• WhatsApp-Viewer :- Retrieves encrypted messages.
• Wforenic :- Web based forensic tool to retrieve
whatsapp data.
• SQLite Data Browser
• AccessData FTK Imager or Other cloning software.
• LiME :- Volatile Memory Capture tool for Android.
Safe guarding Principles
• Be cautious about what you share.
• Remember the Internet is permanent.
• Exercise caution when clicking on links.
• Install Anti Virus Apps like CM Security/Dr.
Safety.
• Don’t ignore warnings from Malware Scanners.
• Don’t reveal personal information.
• When in doubt, throw it out.
• Learning about Security and Forensics. Getting
ourselves aware of different threats.
• Become aware of the law that you might be
violating unknowingly.
References
• https://en.wikipedia.org/wiki/WhatsApp
• https://www.magnetforensics.com/mobile-
forensics/recovering-whatsapp-forensic-artifacts
• http://www.securitybydefault.com/2012/05/whatsapp-
forensics.html
• http://www.whatsapp-viewer.com/
• http://www.digitalinternals.com/security/decrypt-
whatsapp-crypt8-database-messages/419/
• http://forum.xda-developers.com/showthread.php?
t=2770982
• http://forum.xda-developers.com/showthread.php?
t=2588979
Any Queries ?
Thank You

Mais conteúdo relacionado

Mais procurados (20)

Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Computer forensics and steganography
Computer forensics and steganographyComputer forensics and steganography
Computer forensics and steganography
 
Module 02 ftk imager
Module 02 ftk imagerModule 02 ftk imager
Module 02 ftk imager
 
Nfs
NfsNfs
Nfs
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
data hiding techniques.ppt
data hiding techniques.pptdata hiding techniques.ppt
data hiding techniques.ppt
 
WhatsApp security
WhatsApp securityWhatsApp security
WhatsApp security
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Linux file system
Linux file systemLinux file system
Linux file system
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
Melissa Virus
Melissa VirusMelissa Virus
Melissa Virus
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
WhatsApp and its security issues
WhatsApp and its security issuesWhatsApp and its security issues
WhatsApp and its security issues
 
Network Access Control (NAC)
Network Access Control (NAC)Network Access Control (NAC)
Network Access Control (NAC)
 

Destaque

Android forensics an Custom Recovery Image
Android forensics an Custom Recovery ImageAndroid forensics an Custom Recovery Image
Android forensics an Custom Recovery ImageMohamed Khaled
 
Android Forensics: Exploring Android Internals and Android Apps
Android Forensics: Exploring Android Internals and Android AppsAndroid Forensics: Exploring Android Internals and Android Apps
Android Forensics: Exploring Android Internals and Android AppsMoe Tanabian
 
Android– forensics and security testing
Android– forensics and security testingAndroid– forensics and security testing
Android– forensics and security testingSanthosh Kumar
 
Windows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsWindows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsMike Spaulding
 
Android Hacking
Android HackingAndroid Hacking
Android Hackingantitree
 
Whatsapp PPT Presentation
Whatsapp PPT PresentationWhatsapp PPT Presentation
Whatsapp PPT PresentationVOCCE ICT
 
Booting Android: bootloaders, fastboot and boot images
Booting Android: bootloaders, fastboot and boot imagesBooting Android: bootloaders, fastboot and boot images
Booting Android: bootloaders, fastboot and boot imagesChris Simmonds
 
мобільні операційні системи [автосохраненный]
мобільні операційні системи [автосохраненный]мобільні операційні системи [автосохраненный]
мобільні операційні системи [автосохраненный]Vlad Onyk
 
Active Https Cookie Stealing
Active Https Cookie StealingActive Https Cookie Stealing
Active Https Cookie StealingSecurityTube.Net
 
How to boot a VM form a Forensic Image
How to boot a VM form a Forensic ImageHow to boot a VM form a Forensic Image
How to boot a VM form a Forensic ImageKrešimir Hausknecht
 
мобільні операційні системи [автосохраненный]
мобільні операційні системи [автосохраненный]мобільні операційні системи [автосохраненный]
мобільні операційні системи [автосохраненный]Vlad Onyk
 
Expert system
Expert systemExpert system
Expert systemkhair20
 
tu ropa deportiva podra ser tu propio entrenador
tu ropa deportiva podra ser tu propio entrenadortu ropa deportiva podra ser tu propio entrenador
tu ropa deportiva podra ser tu propio entrenadorkeylimar25
 
SMW14_FutureSocialCulture.pdf
SMW14_FutureSocialCulture.pdfSMW14_FutureSocialCulture.pdf
SMW14_FutureSocialCulture.pdfStefanie Kuhnhen
 

Destaque (20)

Android forensics an Custom Recovery Image
Android forensics an Custom Recovery ImageAndroid forensics an Custom Recovery Image
Android forensics an Custom Recovery Image
 
Android Forensics: Exploring Android Internals and Android Apps
Android Forensics: Exploring Android Internals and Android AppsAndroid Forensics: Exploring Android Internals and Android Apps
Android Forensics: Exploring Android Internals and Android Apps
 
Stealing sensitive data from android phones the hacker way
Stealing sensitive data from android phones   the hacker wayStealing sensitive data from android phones   the hacker way
Stealing sensitive data from android phones the hacker way
 
Android– forensics and security testing
Android– forensics and security testingAndroid– forensics and security testing
Android– forensics and security testing
 
Whatsapp project work
Whatsapp project workWhatsapp project work
Whatsapp project work
 
Windows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsWindows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti Forensics
 
Android Hacking
Android HackingAndroid Hacking
Android Hacking
 
Whatsapp PPT Presentation
Whatsapp PPT PresentationWhatsapp PPT Presentation
Whatsapp PPT Presentation
 
whatsapp ppt
whatsapp pptwhatsapp ppt
whatsapp ppt
 
Booting Android: bootloaders, fastboot and boot images
Booting Android: bootloaders, fastboot and boot imagesBooting Android: bootloaders, fastboot and boot images
Booting Android: bootloaders, fastboot and boot images
 
мобільні операційні системи [автосохраненный]
мобільні операційні системи [автосохраненный]мобільні операційні системи [автосохраненный]
мобільні операційні системи [автосохраненный]
 
File000150
File000150File000150
File000150
 
Active Https Cookie Stealing
Active Https Cookie StealingActive Https Cookie Stealing
Active Https Cookie Stealing
 
How to boot a VM form a Forensic Image
How to boot a VM form a Forensic ImageHow to boot a VM form a Forensic Image
How to boot a VM form a Forensic Image
 
мобільні операційні системи [автосохраненный]
мобільні операційні системи [автосохраненный]мобільні операційні системи [автосохраненный]
мобільні операційні системи [автосохраненный]
 
Expert system
Expert systemExpert system
Expert system
 
Linux forensics
Linux forensicsLinux forensics
Linux forensics
 
whatsapp
whatsappwhatsapp
whatsapp
 
tu ropa deportiva podra ser tu propio entrenador
tu ropa deportiva podra ser tu propio entrenadortu ropa deportiva podra ser tu propio entrenador
tu ropa deportiva podra ser tu propio entrenador
 
SMW14_FutureSocialCulture.pdf
SMW14_FutureSocialCulture.pdfSMW14_FutureSocialCulture.pdf
SMW14_FutureSocialCulture.pdf
 

Semelhante a WhatsApp Forensic

2014: Mid-Year Threat Review
2014: Mid-Year Threat Review2014: Mid-Year Threat Review
2014: Mid-Year Threat ReviewESET
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Blueinfy Solutions
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maalHarsimran Walia
 
Mobile security services 2012
Mobile security services 2012Mobile security services 2012
Mobile security services 2012Tjylen Veselyj
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacycdunk12
 
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...NCCOMMS
 
CNIT 128 8: Mobile development security
CNIT 128 8: Mobile development securityCNIT 128 8: Mobile development security
CNIT 128 8: Mobile development securitySam Bowne
 
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...Cellebrite
 
Hacking By Nirmal
Hacking By NirmalHacking By Nirmal
Hacking By NirmalNIRMAL RAJ
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationTom Eston
 
It’s time to boost VoIP network security
It’s time to boost VoIP network securityIt’s time to boost VoIP network security
It’s time to boost VoIP network securityBev Robb
 
Android phone identifiers and eavesdropping audio
Android phone identifiers and eavesdropping audioAndroid phone identifiers and eavesdropping audio
Android phone identifiers and eavesdropping audioAndy Lee
 
Android vs iOS encryption systems
Android vs iOS encryption systemsAndroid vs iOS encryption systems
Android vs iOS encryption systemsBirju Tank
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
A Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityA Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityRob Dudley
 
Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1Subhransu Behera
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoTVasco Veloso
 

Semelhante a WhatsApp Forensic (20)

2014: Mid-Year Threat Review
2014: Mid-Year Threat Review2014: Mid-Year Threat Review
2014: Mid-Year Threat Review
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 
Mobile security services 2012
Mobile security services 2012Mobile security services 2012
Mobile security services 2012
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
 
CNIT 128 8: Mobile development security
CNIT 128 8: Mobile development securityCNIT 128 8: Mobile development security
CNIT 128 8: Mobile development security
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
 
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
 
Hacking By Nirmal
Hacking By NirmalHacking By Nirmal
Hacking By Nirmal
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Mobile Defense-in-Dev (Depth)
Mobile Defense-in-Dev (Depth)Mobile Defense-in-Dev (Depth)
Mobile Defense-in-Dev (Depth)
 
It’s time to boost VoIP network security
It’s time to boost VoIP network securityIt’s time to boost VoIP network security
It’s time to boost VoIP network security
 
Android phone identifiers and eavesdropping audio
Android phone identifiers and eavesdropping audioAndroid phone identifiers and eavesdropping audio
Android phone identifiers and eavesdropping audio
 
Android vs iOS encryption systems
Android vs iOS encryption systemsAndroid vs iOS encryption systems
Android vs iOS encryption systems
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
A Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityA Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application Security
 
Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 

Mais de Animesh Shaw

Factoid based natural language question generation system
Factoid based natural language question generation systemFactoid based natural language question generation system
Factoid based natural language question generation systemAnimesh Shaw
 
Investigating server logs
Investigating server logsInvestigating server logs
Investigating server logsAnimesh Shaw
 
Email investigation
Email investigationEmail investigation
Email investigationAnimesh Shaw
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & SteganographyAnimesh Shaw
 

Mais de Animesh Shaw (7)

Factoid based natural language question generation system
Factoid based natural language question generation systemFactoid based natural language question generation system
Factoid based natural language question generation system
 
Investigating server logs
Investigating server logsInvestigating server logs
Investigating server logs
 
Flash drives
Flash drivesFlash drives
Flash drives
 
Financial Crimes
Financial CrimesFinancial Crimes
Financial Crimes
 
Email investigation
Email investigationEmail investigation
Email investigation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 

Último

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Último (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

WhatsApp Forensic

  • 1. WhatsApp Forensics Presented By Animesh Shaw (Psycho_Coder) Digital Evidence Analyst, @ data64 Cyber Solutions Pvt. Ltd. psychocoder@outlook.com
  • 2. Discussion Goals  What is WhatsApp ?  WhatsApp Stats  Security & Privacy: Previous Issues  Real World Threat Scenario  Why Indians Should be Concerned ?  Why WhatsApp Forensics ?  Terminology & Pre-Requisites  Where to look for evidence ?  Investigating WhatsApp Data  Tools of Trade  Safe guarding Principles  References
  • 3. What is WhatsApp ? o An Instant Messaging app for smartphones. o Requires data connection to send text messages, images, video, user location and audio media messages. o In January 2015, WhatsApp was the most globally popular messaging app. o In April 2015, WhatsApp reached 800 million active users. o Subsidized by Facebook on February 19, 2014. o Supported by wide range of mobile platform, like Android, iPhone, iOS, BlackBerry OS, Windows Phone, Symbian etc.
  • 4. WhatsApp Stats o WhatsApp was handling ten billion messages per day as of August 2012, growing from two billion in April 2012. o Number of downloads exceeds 100 million on Google Play. o In only three years it is among the top 30 free applications. o Among the top five free communication applications on Google Play. o Facebook Acquired WhatsApp for $19 billion USD.
  • 5. Security & Privacy: Previous Issues • In May 2011, a security hole was reported which left WhatsApp user accounts open for session hijacking. • In September 2011, it was reported that forged messages could be sent. • German Tech site The H demonstrated how to use WhatsAPI to hijack any WhatsApp account on September 14, 2012. • On 1st December 2014, Indrajeet Bhuyan and Saurav Kar, both 17-year old teenagers, demonstrated the WhatsApp Message Handler Vulnerability, which allows anyone to remotely crash WhatsApp just by sending a specially crafted message of 2kb in size.
  • 6. Security & Privacy: Previous Issues (contd.) • In February 2015, a Dutch university student named Maikel Zweerink published an app that set out to prove that anyone can track a WhatsApp user's status and also keep an eye of their changing profile pictures, privacy settings or status messages regardless of their privacy settings • WhatsApp message database AES encrypted file uses the same key for all the installations.
  • 7. Real World Threat Scenario - 1
  • 8. Real World Threat Scenario - 2 • MAC address is a unique identifier assigned to your phone or other device that essentially serves as its online identity. • MAC Spoofing is a Threat. • Gaining Physical access to Victims Phone. Get MAC Info and Spoof it in your own Smart phone. • Using Busybox and Terminal Emulator change MAC of ethernet interface. • Reinstall WhatsApp on your phone and configure. • Get confirmation code and erase from victims phone. • Re-establish your previous MAC Address.
  • 9. Why Indians Should be Concerned ? • According to current statistics WhatsApp got maximum exposure in India. Pic below shows download stats (Jan. 2015) • With 65 million active users, about 10% of the total worldwide users, India is the largest single country in terms of number of users
  • 10. Why Indians Should be Concerned ? (contd.)
  • 11. Why WhatsApp Forensics ? • Huge active user base (>800 Million) • Ability to share Video, Image or data which might contain explicit content. • Identify various data security issues in instant messaging applications on the Android and other Mobile platform which aid in forensic investigations
  • 12. Why WhatsApp Forensics ? (contd.) • With more updates other privacy issues could be developed. • Research required to build better tools. • Runs on multiple platform with different file system. • New Exploits/Privacy Hacking issues are coming every now and then.
  • 13. Terminology & Pre-Requisites o ADB (Android Debug Bridge) o Database (SQLite) o Imaging/Cloning o Android Developer Mode o Encryption o Symmetric o Asymmetric
  • 14. Where to look for evidence ? • All the WhatsApp data is stored in either “Internal Phone Storage” or in the SD card. • Location:- /storage/emulated/0/WhatsApp/
  • 15. Where to look for evidence ? (contd.) • Crypt8 files encrypted with AES algorithm with a 256 bit key. • Key:- 346a23652a46392b4d73257c67317e352e33724 82177652c • Key in stored in /data/data/com.whatsapp/files/key • Retrieving key requires rooted android phone. • Media folders contain Images, calls, videos etc. • Rooted Android phone contains unencrypted database. • Wa.db contains WhatsApp contacts.
  • 16. Where to look for evidence? (contd.) • Android Volatile Memory Acquisition :- – Need for Live acquisition ? – Applications including WhatsApp start with boot. – Background data consumption and chat logs can be found in system RAM. – Deleted messages still present in volatile memory. – Can be retrieved partially I not fully.
  • 17. Investigating WhatsApp Data • Clone Android Storage using AccessData FTK. • Retrieve WhatsApp related data and many more. • Using Andriller Enable Developer Mode on Phone. Enable Debugger Mode. Connect to Phone. Accept RSA Fingerprint on Phone. Click on check and the device serial Is detected. Click Go to acquire a backup of your Android data.
  • 18. Investigating WhatsApp Data (contd.) • Reports Created • Several forensically important data can be retrieved.
  • 19. Investigating WhatsApp Data (contd.) • Decrypting WhatsApp .db.crypt8
  • 20. Investigating WhatsApp Data (contd.) • Using WhatsApp Viewer. • Decrypts all data. Requires .NET Framework • Need to supply “key” file separately. • Requires to be compiled.
  • 21. Investigating WhatsApp Data (contd.) • Using WhatsApp Key/DB Extractor. Applicable for Android version 4+. • Provide a method for WhatsApp users to extract their cipher key on NON-ROOTED Android devices. Once key has been extracted we can use Andriller or WhatsApp Viewer to recover data.
  • 22. Investigating WhatsApp Data (contd.) • Check for Steganography – Images – Videos – Audio – Text
  • 23. Tools of Trade • Andriller :- Android Forensic Tools • WhatsApp Key/DB Extractor :- Extraction of Key from NON-ROOTED phones. • WhatsApp-Viewer :- Retrieves encrypted messages. • Wforenic :- Web based forensic tool to retrieve whatsapp data. • SQLite Data Browser • AccessData FTK Imager or Other cloning software. • LiME :- Volatile Memory Capture tool for Android.
  • 24. Safe guarding Principles • Be cautious about what you share. • Remember the Internet is permanent. • Exercise caution when clicking on links. • Install Anti Virus Apps like CM Security/Dr. Safety. • Don’t ignore warnings from Malware Scanners. • Don’t reveal personal information. • When in doubt, throw it out. • Learning about Security and Forensics. Getting ourselves aware of different threats. • Become aware of the law that you might be violating unknowingly.
  • 25. References • https://en.wikipedia.org/wiki/WhatsApp • https://www.magnetforensics.com/mobile- forensics/recovering-whatsapp-forensic-artifacts • http://www.securitybydefault.com/2012/05/whatsapp- forensics.html • http://www.whatsapp-viewer.com/ • http://www.digitalinternals.com/security/decrypt- whatsapp-crypt8-database-messages/419/ • http://forum.xda-developers.com/showthread.php? t=2770982 • http://forum.xda-developers.com/showthread.php? t=2588979