Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

- #67

Closed
cuj opened this issue Apr 25, 2022 · 7 comments
Closed

- #67

cuj opened this issue Apr 25, 2022 · 7 comments

Comments

@cuj
Copy link

cuj commented Apr 25, 2022

@chrisrusso
Copy link

web.whatsapp.com > (index). But the keys are not longer there. https://web.whatsapp.com/libsignal-protocol-c387645.min.js seems to be generating them. But I still can't find where it's stored / how to read them. AES CBC is being used.

@chrisrusso
Copy link

chrisrusso commented May 10, 2022

keypair

;)

@romanzaikin romanzaikin pinned this issue May 25, 2022
@chrisrusso
Copy link

Hey Cuj,

Honestly I got really busy with some stuff here, and at this point I don't which one was what... The keys are somewhere there... set several breakpoints, and play the code line by line, look for "keyPair" in the included Js, you should be able to find the pair in a couple of hours. Check the lenghts to be sure. If you manage the get they pair, then, you'll need an array which is required by the extension... could not locate it. Perhaps intercepting the traffic from the cell phone would reveal something.

I can assist you a bit, https://www.linkedin.com/in/chris-c-russo/ add me there if you want.

@chrisrusso
Copy link

there's another way to play around with whatsapp, the encryption mechanisms, don't let you flood, or manipulate the data as you would do with burp suit. However if you place an API in the middle, lets say localhost, and you proxy it, you can interact with it... I've been able to freeze a cell phone and restart another using multiple SIM cards / accounts connected, and targetting a single account with intruder an heavy processing media.

@chrisrusso
Copy link

node npx @open-wawa-automate
npx @open-wa/wa-automate

@FunniMonke
Copy link

Where can I find the secret key parameter in the BurpSuite Websocket History? It's not showing up at all.

@allelive
Copy link

io non ci ho capito niente e tutto il giorno e la notte che provo a capire ste chiavi e come devo bloccare per poter provare questa estensione ma non ci riesco proprio.. ci riprovo domani.. vado a riposare..

@cuj cuj changed the title Which file in the sources tab in DevTools has "keyPair: t,"? - Jul 1, 2024
@cuj cuj closed this as completed Jul 1, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants