YuvrajRaghuvanshiS / WhatsApp-Key-Database-Extractor

The most advanced and complete solution for extracting WhatsApp key/DB from package directory (/data/data/com.whatsapp) without root access.
MIT License
447 stars 57 forks source link

Fork MasterDevX Termux-Java to include policy #43

Closed roberts011 closed 3 years ago

roberts011 commented 3 years ago

Have to fork the mentioned project: https://github.com/MasterDevX/Termux-Java to include the policy below: https://www.oracle.com/java/technologies/javase-jce8-downloads.html Also reduces dependencies, as this is a working java-termux version.

YuvrajRaghuvanshiS commented 3 years ago

You really created an issue for this.

roberts011 commented 3 years ago

Of couse I did😉

YuvrajRaghuvanshiS commented 3 years ago

This is not worth investing time and efforts into. Creating whatsapp.ab file on termux without password and later creating a entrypted 7z file (already implemented) for safekeeping of database and key file is enough since whatsapp.ab is temporary and gets deleted eventually and there is no reason for anyone to keep whatsapp.ab with them and even if there is they can keep it safe on their own.

If in future if there is a corner case where nopass.ab is not getting unpacked into nopass.tar they can simply download those files from URl and get it working.

roberts011 commented 3 years ago

I don't follow...

roberts011 commented 3 years ago

What do you mean, can you explain please?

YuvrajRaghuvanshiS commented 3 years ago

Yes I was out for the day so couldn't reply. Which part are you not gettign?

roberts011 commented 3 years ago

How will we get the msgstore.db if we don't decompress the .ab file with the java tool?

YuvrajRaghuvanshiS commented 3 years ago

How will we get the msgstore.db if we don't decompress the .ab file with the java tool?

We can unpack .ab file to .tar but currently can't unpack those ab file which are encrypted (user entered some password on backup screen)

YuvrajRaghuvanshiS commented 3 years ago

We can simply ask user to leave that empty or I can make this script in such a way that user does not have to even click his phone. I can send touch input.

roberts011 commented 3 years ago

Oh thats great!

roberts011 commented 3 years ago

https://forum.xda-developers.com/t/guide-how-to-extract-create-or-edit-android-adb-backups.2011811/ here is written where the policy has to be put https://infosecwriteups.com/extract-an-android-backup-file-96172efd4d86

roberts011 commented 3 years ago

Well I think backups are encrypted by default, but no idea...

roberts011 commented 3 years ago

How will we get the msgstore.db if we don't decompress the .ab file with the java tool?

We can unpack .ab file to .tar but currently can't unpack those ab file which are encrypted (user entered some password on backup screen)

How do you plan to do that?

YuvrajRaghuvanshiS commented 3 years ago

Well I think backups are encrypted by default, but no idea...

Yes sometimes, if desktop backup is already set.

YuvrajRaghuvanshiS commented 3 years ago

How do you plan to do that?

Telling user not to enter password.

roberts011 commented 3 years ago

I mean the decompression part XD

YuvrajRaghuvanshiS commented 3 years ago

With recent abe.jar release which Nelekov released. That is working with termux

roberts011 commented 3 years ago

I thought you wanted to scrap the whole JAVA part. Okay so we only need the policy if the backup's encrypted right?

YuvrajRaghuvanshiS commented 3 years ago

Okay so we only need the policy if the backup's encrypted right?

Exactly

roberts011 commented 3 years ago

Cool, so no passwords

YuvrajRaghuvanshiS commented 3 years ago

No passwords.

YuvrajRaghuvanshiS commented 3 years ago

I will work on it after 10 days, I'm busy with exams.

roberts011 commented 3 years ago

forked the Termux-Java to include the unlimited policy

wget https://raw.githubusercontent.com/roberts01/Termux-Java/master/installjava && bash installjava

https://github.com/roberts01/Termux-Java