Hack Tutorial #3: Recover, Move or Hack WhatsApp account using WhatsDumpExtractor

General Information

WDE Software (WhatsDumpExtractor) is a set of software modules written in Python, linked to each other to extract the encrypted database WhatsApp from Google Drive, decrypt and provide it to the user. WDE uses android emulator to authorize a user on the WhatsApp server and obtain a key file to decrypt the database. To install android emulator, you must download Android SDK from the official site of Android Studio. At the end of the program, the document generated from the decrypted database will be displayed. To write a UI application with a set of bindings of the graphical framework PyQt5.

Preparation setting

Before starting with WDE Software, you must have python 3 installed. * (version 3.8.8 was used at the time of release). It is necessary to download and install Intel Hardware Accelerated Execution Manager (HAXM). HAXM installation packages for Windows can be found on the page of releases GitHub devoted to Intel Hardware Accelerated Execution Manager. Running android emulator uses x86-based system image. If uses an image of a system on the basis of ARM,it will work incorrectly. Also must be install jdk-1.8. * .The version above or below,WDE will work incorrectly. At the time of release used “jdk 1.8.0_281”.JDK is located on the page GitHub Gist Make sure that the env variables(ANDROID_HOME,ANDROID_SDK_HOME,ANDROID_AVD_HOME) specified correctly.The android-sdk folder should appear after installation in the folder with the project. After creation AVD should appear in the .android folder inside the android-sdk folder. Before dump of WhatsApp,necessary get access of Google account from third-party devices.

To do this needs to login through any browser available Google account and click this link: https://accounts.google.com/b/0/DisplayUnlockCaptcha.

Getting Started

Menu bar: The SDK menu is required to check for Android SDKs installed and for installation SDK/AVD. Click “Install SDK” to start the installation. After that,wait dialog information window about success install of SDK/AVD. The file menu includes:

  1. open .html document
  2. encryption of .crypt12.Decryption requires an encrypted database, key and path to save the decrypted .db file.
  3. converts the .db file to .html for reading of the database WhatsApp

Action “New Dump” starts the key extraction process from the emulator android.First necessary make a presetting. To start the process,enter the phone number (the key of which will be extracted), the Google (Gmail) account on the disk of which the encrypted database and password from this account are stored. After launch, the databases from Google Drive will be downloaded and the android emulator will be launched. Then enter the verifycation code WhatsApp which will be sent via SMS to the specified number. At the end, the decrypted database is displayed for reading.

WDE modules

You can download or learn more about this tool here: 

https://github.com/Vetalb60/WhatsDumpExtractor?fbclid=IwAR1AZuoIbzjOKA1zDj4m4VflDgCJIQgGrBLWHIprIbLYIQWBdO7MUyg6f74

Subscribe to our Newsletters!

Get breaking news, free eBooks and upcoming events delivered to your inbox!

Subscribe and get access to a Free Cyber Security Basics Course!

Don’t Stop Here

More To Explore

Critical Log4J Vulnerability

The Apache Software Foundation has released fixes to contain an actively exploited zero-day vulnerability affecting the widely-used Apache Log4j Java-based logging library that could be weaponized to execute