ppwwyyxx / wechat-dump

Cracking encrypted wechat message history from android
GNU General Public License v3.0
1.65k stars 309 forks source link

Database Decryption Improvements : master issue #64

Open ppwwyyxx opened 4 years ago

ppwwyyxx commented 4 years ago

Different phones / users may experience different failures of decryption. Three directions can improve the decryption success rate:

  1. Implement better ways to obtain UIN.

  2. Implement better ways to obtain IMEI:

    • Currently using "CompatibleInfo" file from wechat. It should probably be the accurate IMEI that wechat uses. If not, please let us know.
  3. Implement/integrate password cracker from https://github.com/chg-hou/EnMicroMsg.db-Password-Cracker

Please comment on this issue only if you have ideas for improvements. Please DO NOT comment in this issue about decryption failures. People who don't have your phone will not know why decryption fails on your phone.

rom1504 commented 11 months ago

So one additional idea here is to use Frida, eg #97 , it directly gets the key by hooking into WeChat A bit more involved but it has the benefit of not depending on the uin nor the IMEI nor the password computation method

Also password cracker python version works fine but is quite slow (ten of hours)