An Analysis of WhatsApp Forensics in Android Smart
An Analysis of WhatsApp Forensics in Android Smart
Abstract — WhatsApp is mobile application which allows With the starting version of WhatsApp 2.9 the messages
exchanged was stored in 'msgstore.db' which is SQLite
exchange of messages, videos, audio’s and images via
databases. But in early versions security researchers found that
Smartphone. The increased use of IM on Android phones
the chat records which was handled by WhatsApp was
has turned to be goldmine for mobile and computer forensic
vulnerable, because the database file which saves the chat
investigators. This paper focuses on conducting forensic
conversations was not encrypted and can easily accessible
data analysis by extracting useful information from
through many ways to get the whole conversation chat details
WhatsApp and from similar applications installed on
Android platform. including images, videos, contacts and so on. As this news hits
the internet, security researchers started researching with
Keywords — WhatsApp, Android Forensics, WhatsApp WhatsApp database (msgstore.db) to retrieve the conversation
Security, Data Security. even the deleted ones from the chat option. But WhatsApp
reacted soon and came up with an encryption mechanism to
I. Introduction protect its database.
Whatsapp allows to text messaging, send images, video, and
audio media messages. The application is available for Android, Now
Blackberry, iOS, Symbian (s60), and Windows phone. Whatsapp Now, according to officials of WhatsApp they are taking the
Inc. was founded in 2009 by Brian Acton and Jan Koum, both conversation database security in a very serious manner, now
veterans of Yahoo! WhatsApp database encryption having custom AES encryption
algorithm with above 192-bit encryption key mainly used for
People are exchanging information like images, videos, activities WhatsApp Android Platform. So now the previous file
and events. But despite of getting connected with friends for msgstore.db is converted to msgstore.db.crypt.
more and more time, their privacy is also getting more
vulnerable to threats by hackers and cyber criminals. II. Material and Methodology
The major problem after having the file msgstore.db.crypt is its
There is no restriction on the length and number of messages one decryption. Thanks to contribution of Francesco Picasso who
can exchange and no carrier IM fees apply. One does not need to made a tool to decrypt and organize SQLite database files in an
install a sim-card to use WhatsApp; the only requirements are a organized HTML form. The tool works for both encrypted and
supported phone, internet connection and storage space on the decrypted database files. The WhatsApp Database Encryption
phone to download the application. Project has made known a vulnerability in the Android
WhatsApp uses a customized version of the open standard implementation of the AES Cipher: the 192-bit key can be
Extensible Messaging and Presence Protocol (XMPP). After detected performing both static or active analysis on the
WhatsApp is installed in any mobile, it creates a user account software package.
using the phone number as the username (ID: [phone A python script uses this same key to decrypt the encrypted db
number]@s.whatsapp.net). WhatsApp automatically file and presents the result in a well organised HTML page. The
synchronizes all the phone numbers from user’s phonebook with paper implies that the same encryption key is used for all
its centralized database of WhatsApp users to add contacts to the WhatsApp installations on Android. In this methodology, we
user's WhatsApp contact list. have used this Python tool to decrypt and read our encrypted
Previously, WhatsApp messages were not encrypted, that means database and it was done successfully with the latest version of
data which was sent and received was in plaintext, meaning WhatsApp 2.11.186. We can alternately read the database files
messages could easily be read easily if packet traces were through the 'SQLite browser' but the timestamps and
available. representation of data is not straightforward. Another advantage
of WhatsApp Xtract tool is that all the media contents that are
WhatsApp NOW AND BEFORE exchanged are displayed on the HTML page itself, one does not
WhatsApp data is stored in the Internal Memory of the mobile have to look into the media folder separately. The tool can be
phone. After it is installed, it automatically synchronizes with the useful in comparing the data we analyze.
phone's contacts showing users who are already using
WhatsApp. Finding the information:
When a mobile with WhatsApp installed is turned on, WhatsApp stores all its chats on a SQLite database: The path of
“com.whatsapp” process receives a signal to start the database file is different from platform to platform.
'ExternalMediaManage' and 'MessageService' services which
runs in the phone’s background till the phone is turned on. Android:
Before (/sdcard/WhatsApp/Databases/msgstore.db.crypt)
iOS:
(Application/net.whatsapp.WhatsApp/Documents/ChatStorage.s
qlite) As soon as the execution of the bat file or command is
Main Features: completed, all your WhatsApp backup data will be decrypted
and will be displayed in the default browser on your computer.
WhatsApp database can be inspected for both iOS
(ChatStorage.sqlite) and Android (msgstore.db &
wa.db) devices;
Emoticons and attachments (images / video / audio /
gps / contacts) are shown in the message content.
How to use: