![]() |
What about crypt8 ? - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: General Help (https://hashcat.net/forum/forum-8.html) +--- Thread: What about crypt8 ? (/thread-4815.html) |
What about crypt8 ? - Mem5 - 11-14-2015 Commonly used by Whatsapp (android/iphone), the conversation database file called msgstore.db.crypt8 can be decrypted with a key file (android : /data/data/com.whatsapp/files/key) which contains an initialization vector and an AES-256-CBC key. From my research I did not find any tool to bruteforce this file - without the key, of course. Any toughs on this ? Could hashcat able to do it in future versions ? Thanks. RE: What about crypt8 ? - atom - 11-14-2015 This sounds interessting, but we need all details and some example data RE: What about crypt8 ? - magnum - 11-18-2015 Perhaps this? http://www.digitalinternals.com/security/extract-whatsapp-password-android/374/ Generic PBKDF2-HMAC-SHA1 should do. RE: What about crypt8 ? - atom - 11-19-2015 Looks interessting. Mem5 is it what you're looking for? In that case please open up a trac ticket |