What about crypt8 ?
#1
Commonly used by Whatsapp (android/iphone), the conversation database file called msgstore.db.crypt8 can be decrypted with a key file (android : /data/data/com.whatsapp/files/key) which contains an initialization vector and an AES-256-CBC key.

From my research I did not find any tool to bruteforce this file - without the key, of course.

Any toughs on this ?
Could hashcat able to do it in future versions ?

Thanks.


Messages In This Thread
What about crypt8 ? - by Mem5 - 11-14-2015, 11:47 AM
RE: What about crypt8 ? - by atom - 11-14-2015, 04:33 PM
RE: What about crypt8 ? - by magnum - 11-18-2015, 03:41 AM
RE: What about crypt8 ? - by atom - 11-19-2015, 12:21 PM