Reporter Account  Create New Account  Login!
Search :
QUICK LINKS : Art & Entertainment Automotive Blogging & Social Media Business Computer Design Education Environment Events / Trade Shows  
Go to Assignmentgeek.com and get your homework done.
Promote Your Events with Us!
forpressrelease.com
There is no better press release writing company as 123 term papers.
Post Your Story for FREE!
forpressrelease.com
Online assignment help by Copycrafter will free you from any academic issues
Left Ad
forpressrelease.com
Professional press release writing services for smart people.
BuyEssaysCheap.com - affordable writing help
For Press Release Writing
forpressrelease.com
 
 
 
Press Release Details    
Add to Favorites  Mail to a Friend Print Page   Share This News Rate
Save This Listing     Stumble It          
202

Elcomsoft Explorer for WhatsApp Use Jailbreak to Decrypts WhatsApp Cloud Backups

ElcomSoft Co. Ltd. updates Elcomsoft Explorer for WhatsApp, an all-in-one tool for easy acquisition and analysis of WhatsApp communication histories. Version 2.60 gains the ability to decrypt backups from Cloud Drive using device keychain. In addition, Elcomsoft Explorer for WhatsApp now supports HEIC (HEIF) images.

Elcomsoft Explorer for WhatsApp 2.60 adds the ability to decrypt WhatsApp conversations from stand-alone WhatsApp backups made on iPhone devices and retrieved from iCloud Drive. The new decryption method does not require a WhatsApp activation code.

Elcomsoft Explorer for WhatsApp 2.60 is an incremental update, adding the ability to decrypt stand-alone WhatsApp backups downloaded from iCloud Drive without receiving an activation code from WhatsApp. In previous versions, EXWA required access to the user's verified phone number (SIM card) to obtain the encryption key and decrypt the backup. The new release offers the ability to decrypt downloaded backups by using a copy of the iPhone keychain extracted from a jailbroken device.

The new decryption methods makes use of the encryption key stored on the iPhone in the keychain. While most keychain items are accessible via logical acquisition, WhatsApp targets a higher security class and can be only obtained with iOS Forensic Toolkit 4.0 via physical keychain extraction. A jailbreak is required in order to access the keychain. This key can be used to decrypt the backup in place of the code received from WhatsApp servers.

The new decryption method is optional, and offers tangible benefits over the previously used (and still available) decryption method. The expert will no longer require to obtain the security code from WhatsApp by SMS or phone call, and WhatsApp will remain active on the user's iPhone. If one does not have access to the user's SIM card and cannot receive the activation SMS, this could be the only extraction method available. The decryption key extracted from the user's keychain will work for all past and future WhatsApp backups made on that device.

Release notes:

- Added the ability to decrypt backups from Cloud Drive using device keychain
- Added support for HEIC (HEIF) images
- Added support for system messages
- Improved support for deleted messages
- Bug fixes and performance improvements

Elcomsoft Explorer for WhatsApp 2.60 is immediately available at https://www.elcomsoft.com/exwa.html   
 
 

Contact Information

  • Name: Vladimir Katalov

    Company: ElcomSoft Co. Ltd.

    Telphone: 749-597-411 , -

    Address: Russian Federation, Moscow, Zvezdnyi blvd. 21, office 615

    Email: pad@elcomsoft.com