deepakdaswani / whatsapp_discover

"Whatsapp Discover" is a tool for getting phone numbers of devices using Whatsapp by real time sniffing from an interface (disabled in this first version) or from a list of pcap files, which can be processed in batch
GNU General Public License v3.0
168 stars 95 forks source link

is it possible to make this in java ? #1

Open yazeed44 opened 10 years ago

yazeed44 commented 10 years ago

hi

i'm java programmer , and i need this tool so i try to read the code , i couldn't understand it

so could you explain the code ? so i can make it in java

arthurbarros commented 9 years ago

First you need to save a .pcap file from wireshark for example listening to a interface you desire, for example the wireless interface. Make sure you have whatsapp traffic over this interface.

Your Java code should decode the pcap file you captured with jNetPcap for example (there are others open source pcap modules for java as well but this one is the popular one.

And then you just need do parse the decode pcap with the regex that @deepakdaswani used in his perl: /^WA.?([a-zA-Z-.0-9]+).?([0-9]{6,})/

That's it, this is what he made. But since whatsapp changed theirs API, I don't think you can do this anymore.

deepakdaswani commented 9 years ago

This is still working mate... You can try it sniffing packets in any public network and you'll see lots of Whatsapp packets with all this information. And of course, you can code your parser in Java. Best Regards

2014-10-14 18:42 GMT+02:00 Arthur Barros notifications@github.com:

First you need to save a .pcap file from wireshark for example listening to a interface you desire, for example the wireless interface. Make sure you have whatsapp traffic over this interface.

Your Java code should decode the pcap file you captured with jNetPcap for example (there are others open source pcap modules for java as well but this one is the popular one.

And then you just need do parse the decode pcap with the regex that @deepakdaswani https://github.com/deepakdaswani used in his perl: /^WA.?([a-zA-Z-.0-9]+).?([0-9]{6,})/

That's it, this is what he made. But since whatsapp changed theirs API, I don't think you can do this anymore.

— Reply to this email directly or view it on GitHub https://github.com/deepakdaswani/whatsapp_discover/issues/1#issuecomment-59076480 .

Deepak Daswani http://deepakdaswani.es http://twitter.com/dipudaswani

br0k3ngl255 commented 9 years ago

Hi, I tried testing the script - ran tcpdump and then sent testing messages to my other phone. saved the pcap file and then ran the script = nothing was found - am i doing something wrong?

deepakdaswani commented 9 years ago

I suppose you are sniffing the traffic from a wireless interface in monitor mode in an open network. Because if not remember you have to decrypt the pcap File with the pass phrase depending on the cipher. Is this right ?

Enviado desde mi dispositivo móvil

El 19/10/2014, a las 10:11, TUX notifications@github.com escribió:

Hi, I tried testing the script - ran tcpdump and then sent testing messages to my other phone. saved the pcap file and then ran the script = nothing was found - am i doing something wrong?

— Reply to this email directly or view it on GitHub https://github.com/deepakdaswani/whatsapp_discover/issues/1#issuecomment-59643984 .

br0k3ngl255 commented 9 years ago

i am running script on wireless, not in monitor mode and i didn't know about cipher. - what am i not running correctly?