Reverse engineering whatsapp web today #959
Unanswered
csetariq
asked this question in
WhatsApp protocol Q&A
Replies: 2 comments 3 replies
-
|
Is your question related to a very sensitive number in the last 2 days? It hasn't even been an hour since scanning the number and it was immediately banned. If so, it seems we have the same problem. |
Beta Was this translation helpful? Give feedback.
1 reply
-
|
You dont. Just inject js in the web clients to see the incoming and outgoing traffic. For other low level implementations like noise, wire protocol, etc, you need to read the obsucated web code and figure that things out |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I understand this project is mature now. I'm trying to see how it all started
Proxy
Noise Handshake
mitmproxythat speaks noiseThe only way forward is to incrementally write a client like this one?
I also understand ECDH, so eavesdropping is not possible unless I somehow make the whatsapp web to puke the secret
Any pointers on how I should move forward?
Beta Was this translation helpful? Give feedback.
All reactions