Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Hi,
Looking for an update from the Author or creditable answers.
Whatsapp Web Client changed JS several times since I looked in to it.
Getting Pub, Priv key is quite hard, but possible. It seems it changes (QR code) and the Priv, Pub key every ca. 10 secs.
I am pretty sure I managed to get the right key (Priv and Pub) as well as secret (Ref Object)
Than I paste base64 encoded message I sent to one of my contacts (websocket -> to server endpoint /ws). It has a format of:
ID,<binary>
In the parser.py This goes through:
BurpExtension-WhatsApp-Decryption-CheckPoint/helper/parser.py
Line 91 in 90247f2
However, got a mismatch here:
Line 109 in 90247f2
As I said I am quite confident I had 32 ints each good Priv and Pub key and secret (Ref Obj).
Is this still working?
Thanks,
The text was updated successfully, but these errors were encountered:
I got Priv and Pub key from JS. As I said they seem to be correct since the assert goes through:
Line 80 in 90247f2
Line 82 in 90247f2
Hmac on secret string is also valid
So aes_key and mac_key should be correct.
aes_key
mac_key
Line 96 in 90247f2
But the encrypted message hmac fails:
So does the decryption ....
I verified WhatsApp Web Client and "core" JS parts seem to be the same and matching your Python code.
As asked in original issue, anybody has ideas what is happening here?
Hi,
Looking for an update from the Author or creditable answers.
Whatsapp Web Client changed JS several times since I looked in to it.
Getting Pub, Priv key is quite hard, but possible. It seems it changes (QR code) and the Priv, Pub key every ca. 10 secs.
I am pretty sure I managed to get the right key (Priv and Pub) as well as secret (Ref Object)
Than I paste base64 encoded message I sent to one of my contacts (websocket -> to server endpoint /ws). It has a format of:
ID,<binary>
In the parser.py
This goes through:
BurpExtension-WhatsApp-Decryption-CheckPoint/helper/parser.py
Line 91 in 90247f2
However, got a mismatch here:
BurpExtension-WhatsApp-Decryption-CheckPoint/helper/parser.py
Line 109 in 90247f2
As I said I am quite confident I had 32 ints each good Priv and Pub key and secret (Ref Obj).
Is this still working?
Thanks,
The text was updated successfully, but these errors were encountered: