2022
DOI: 10.25046/aj070212
|View full text |Cite
|
Sign up to set email alerts
|

Forensic Analysis of “WhatsApp” Artifacts in Android without Root

Abstract: WhatsApp application is considered the largest messaging application around the world and an important source of information, they just incorporated a new technique that operates on end-to-end encryption, which presents a significant problem for forensic investigators and analysts. This study describes how to recover the encryption key from WhatsApp to decrypt WhatsApp databases and retrieve important artifacts displayed and saved in the Android system without rooting the device. As a means of presenting and a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 26 publications
0
1
0
Order By: Relevance
“…Fayyad-Kazan et al extracted an unencrypted database and encryption key from WhatsApp SQLite Databases on unrooted Android devices using the APK downgrading method and WhatsApp Key Database Extractor tool, successfully reconstructing message history 26) . Shadeed et al conducted a study to analyze encrypted WhatsApp data on unrooted Android devices 27) . The data was acquired through ADB, utilizing APK downgrading to extract the encryption key, allowing for the decryption of the message.…”
Section: Introductionmentioning
confidence: 99%
“…Fayyad-Kazan et al extracted an unencrypted database and encryption key from WhatsApp SQLite Databases on unrooted Android devices using the APK downgrading method and WhatsApp Key Database Extractor tool, successfully reconstructing message history 26) . Shadeed et al conducted a study to analyze encrypted WhatsApp data on unrooted Android devices 27) . The data was acquired through ADB, utilizing APK downgrading to extract the encryption key, allowing for the decryption of the message.…”
Section: Introductionmentioning
confidence: 99%