Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/romanzaikin/BurpExtension-WhatsApp-Decryption-CheckPoint
This tool was created during our research at Checkpoint Software Technologies on Whatsapp Protocol (This repository will be updated after BlackHat 2019)
https://github.com/romanzaikin/BurpExtension-WhatsApp-Decryption-CheckPoint
burpsuite-extender hacking-tool protocol-buffers whatsapp
Last synced: about 1 month ago
JSON representation
This tool was created during our research at Checkpoint Software Technologies on Whatsapp Protocol (This repository will be updated after BlackHat 2019)
- Host: GitHub
- URL: https://github.com/romanzaikin/BurpExtension-WhatsApp-Decryption-CheckPoint
- Owner: romanzaikin
- Created: 2018-08-03T10:48:39.000Z (over 6 years ago)
- Default Branch: master
- Last Pushed: 2019-10-21T08:22:46.000Z (about 5 years ago)
- Last Synced: 2024-11-05T07:24:20.690Z (about 1 month ago)
- Topics: burpsuite-extender, hacking-tool, protocol-buffers, whatsapp
- Language: Python
- Homepage:
- Size: 417 KB
- Stars: 637
- Watchers: 53
- Forks: 173
- Open Issues: 11
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-burp-extensions - WhatsApp Protocol Decryption Burp Tool - This tool was created during our research on Whatsapp Protocol. (Cryptography / SSRF)
README
# WhatsApp Protocol Decryption Burp Tool
This tool was created during our research at Checkpoint Software Technologies on Whatsapp Protocol.
Here is the link to our blog post: https://research.checkpoint.com/fakesapp-a-vulnerability-in-whatsapp/
The Extension:
![alt tag](https://raw.githubusercontent.com/romanzaikin/BurpExtension-WhatsApp-Decryption-CheckPoint/master/tool.png)
Read my book to learn more about web hacking https://www.amazon.com/dp/1096435497
Made By:
---------------__Dikla Barda__
Linkedin - https://www.linkedin.com/in/diklabarda/
__Roman Zaikin__
Linkedin - https://www.linkedin.com/in/romanzaikin/
Twitter - https://twitter.com/R0m4nZ41k1n
Dependencies:
---------------
* Windows Only(step 3 and 4)
1) Download Python 2.7 at https://www.python.org/downloads/release/python-2715/
2) Download pip at https://pip.pypa.io/en/stable/installing/
3) Download Microsoft Visual C++ Compiler for Python 2.7 at https://www.microsoft.com/en-us/download/confirmation.aspx?id=44266
2) Copy `stdint.h` to `C:\Users\Administrator\AppData\Local\Programs\Common\Microsoft\Visual C++ for Python\9.0\VC\include`
5) Execute the command `pip install -r requirements.txt`
* On Linux/Mac use `python2 -m pip install -r requirements.txt`About the extension
---------------This extension allow you to view and manipulate the actual data that sent via whatsapp.
1) Open chrome developer tool and break on keyPair: t, (line 3311) and wait until the keys will appear (5 minutes or so).
2) Run the decoder server which is `parser.py` (in helper dir).
3) Install `burpWhatsapp.py` to your burp suite extensions.
4) Break get the keys from step 1.
5) get the secret parameter from the websocket in burp websocket history.Functionality
---------------1) Decrypt incoming data, you have to paste the data as base64 to the extension `ctrl+b`
2) Encrypt incoming data, after you decrypt the data you can encrypt and put it back to burp by copy pase the base64 and `ctrl+shift+b`
3) Decrypt outgoing data, to decrypt outgoing data you have to take it from `AesCbcEncrypt` function in list format.
4) Encrypt outgoing data, after the extension encrypt the data back you have to put it back via the console.you can use the following helper function to do that:
```js
function str2unit8(str) {
var buf = new ArrayBuffer(str.length);
var bufView = new Uint8Array(buf);
for (var i=0, strLen=str.length; i < strLen; i++) {
bufView[i] = str[i];
}
return buf;
}
```TO-DO
---------------The extension currently can decrypt and encrypt only the message related functionality, in order to add more function you have to map the protobuf
and add it to our protobuf file.