This tool was created during our research at Checkpoint Software Technologies on Whatsapp Protocol.
Here is the link to our blog post: https://research.checkpoint.com/fakesapp-a-vulnerability-in-whatsapp/
The Extension:
Read my book to learn more about web hacking https://www.amazon.com/dp/1096435497
Dikla Barda
Linkedin - https://www.linkedin.com/in/diklabarda/
Roman Zaikin
Linkedin - https://www.linkedin.com/in/romanzaikin/
Twitter - https://twitter.com/R0m4nZ41k1n
* Windows Only(step 3 and 4)
stdint.h
to C:\Users\Administrator\AppData\Local\Programs\Common\Microsoft\Visual C++ for Python\9.0\VC\include
pip install -r requirements.txt
python2 -m pip install -r requirements.txt
This extension allow you to view and manipulate the actual data that sent via whatsapp.
parser.py
(in helper dir).burpWhatsapp.py
to your burp suite extensions.ctrl+b
ctrl+shift+b
AesCbcEncrypt
function in list format.you can use the following helper function to do that:
function str2unit8(str) {
var buf = new ArrayBuffer(str.length);
var bufView = new Uint8Array(buf);
for (var i=0, strLen=str.length; i < strLen; i++) {
bufView[i] = str[i];
}
return buf;
}
The extension currently can decrypt and encrypt only the message related functionality, in order to add more function you have to map the protobuf and add it to our protobuf file.