whatsapp_discover icon indicating copy to clipboard operation
whatsapp_discover copied to clipboard

is it possible to make this in java ?

Open yazeed44 opened this issue 10 years ago • 5 comments

hi

i'm java programmer , and i need this tool so i try to read the code , i couldn't understand it

so could you explain the code ? so i can make it in java

yazeed44 avatar Jun 20 '14 09:06 yazeed44

First you need to save a .pcap file from wireshark for example listening to a interface you desire, for example the wireless interface. Make sure you have whatsapp traffic over this interface.

Your Java code should decode the pcap file you captured with jNetPcap for example (there are others open source pcap modules for java as well but this one is the popular one.

And then you just need do parse the decode pcap with the regex that @deepakdaswani used in his perl: /^WA.?([a-zA-Z-.0-9]+).?([0-9]{6,})/

That's it, this is what he made. But since whatsapp changed theirs API, I don't think you can do this anymore.

arthurbarros avatar Oct 14 '14 16:10 arthurbarros

This is still working mate... You can try it sniffing packets in any public network and you'll see lots of Whatsapp packets with all this information. And of course, you can code your parser in Java. Best Regards

2014-10-14 18:42 GMT+02:00 Arthur Barros [email protected]:

First you need to save a .pcap file from wireshark for example listening to a interface you desire, for example the wireless interface. Make sure you have whatsapp traffic over this interface.

Your Java code should decode the pcap file you captured with jNetPcap for example (there are others open source pcap modules for java as well but this one is the popular one.

And then you just need do parse the decode pcap with the regex that @deepakdaswani https://github.com/deepakdaswani used in his perl: /^WA.?([a-zA-Z-.0-9]+).?([0-9]{6,})/

That's it, this is what he made. But since whatsapp changed theirs API, I don't think you can do this anymore.

— Reply to this email directly or view it on GitHub https://github.com/deepakdaswani/whatsapp_discover/issues/1#issuecomment-59076480 .

*Deepak Daswani * http://deepakdaswani.es http://twitter.com/dipudaswani

deepakdaswani avatar Oct 14 '14 16:10 deepakdaswani

Hi, I tried testing the script - ran tcpdump and then sent testing messages to my other phone. saved the pcap file and then ran the script = nothing was found - am i doing something wrong?

br0k3ngl255 avatar Oct 19 '14 09:10 br0k3ngl255

I suppose you are sniffing the traffic from a wireless interface in monitor mode in an open network. Because if not remember you have to decrypt the pcap File with the pass phrase depending on the cipher. Is this right ?

Enviado desde mi dispositivo móvil

El 19/10/2014, a las 10:11, TUX [email protected] escribió:

Hi, I tried testing the script - ran tcpdump and then sent testing messages to my other phone. saved the pcap file and then ran the script = nothing was found - am i doing something wrong?

— Reply to this email directly or view it on GitHub https://github.com/deepakdaswani/whatsapp_discover/issues/1#issuecomment-59643984 .

deepakdaswani avatar Oct 19 '14 09:10 deepakdaswani

i am running script on wireless, not in monitor mode and i didn't know about cipher. - what am i not running correctly?

br0k3ngl255 avatar Oct 19 '14 10:10 br0k3ngl255