

If your phone is not rooted, refer to instructions from WhatCrypt and Omni-Crypt for details on extracting the key file. I will not go through the steps again, as it’s already mentioned in the crypt8 decryption article.

If your phone is rooted, extracting this file is easy. WhatsApp stores the key file in a secure location: /data/data/com.whatsapp/files/key. The key file stores the encryption key, K. To decrypt the crypt12 files, you will first need the key file.

I would like to highlight that IGLogger proved to be a very useful tool when it came to smali code debugging. From crypt9, they seem to be using a modified version of Spongy Castle – a cryptography API library for Android.Īll the findings below are based on reverse engineering work done on WhatCrypt and Omni-Crypt. Advanced searching and filtering allow locating contacts or messages by entering a key word, and locating conversations that occurred within a certain date range.WhatsApp backup conversation files are now saved with the. The built-in WhatsApp viewer enables viewing the content of multiple WhatsApp databases. Viewing, searching and filtering of extracted WhatsApp databases is available. In order for the decryption to work, the correct password is required. Should you encounter an encrypted backup, Elcomsoft Explorer for WhatsApp can automatically decrypt WhatsApp information. The ability to extract standalone WhatsApp backups from iCloud Drive is unique to Elcomsoft Explorer for WhatsApp. These backups are not device-specific however, multiple WhatsApp backups may be available if several WhatsApp accounts (with different phone numbers) are registered within a certain Apple account. When acquiring iOS cloud backups, Elcomsoft Explorer for WhatsApp can automatically extract WhatsApp databases from multiple devices registered to the same Apple ID.Įlcomsoft Explorer for WhatsApp comes with the ability to download proprietary WhatsApp backups maintained in iCloud Drive. WhatsApp proprietary cloud backups stored in iCloud Drive iOS cloud backups from Apple iCloud (if you have the original Apple ID and password of that account) Plain and encrypted iTunes backups (providing that you know the password) Android smartphones with and without root access WhatsApp conversations can be extracted from various sources: The product can use all available sources for extracting WhatsApp history. The tool automatically acquires a WhatsApp database from physical devices, local and cloud backups, decrypts information and displays contacts, messages, call history and pictures sent and received.Įlcomsoft Explorer for WhatsApp comes with a host of acquisition options. Elcomsoft Explorer for WhatsApp is a tool to download, display and decrypt WhatsApp communication histories from iPhones and Android devices.
