Commonly used by Whatsapp (android/iphone), the conversation database file called msgstore.db.crypt8 can be decrypted with a key file (android : /data/data/com.whatsapp/files/key) which contains an initialization vector and an AES-256-CBC key.
From my research I did not find any tool to bruteforce this file - without the key, of course.
Any toughs on this ?
Could hashcat able to do it in future versions ?
Thanks.
From my research I did not find any tool to bruteforce this file - without the key, of course.
Any toughs on this ?
Could hashcat able to do it in future versions ?
Thanks.