whatsapp-web-reveng icon indicating copy to clipboard operation
whatsapp-web-reveng copied to clipboard

Decrypt / Deduce messages sent to web socket

Open oriolbcn opened this issue 5 years ago • 1 comments

Kudos for the great work on this repo! It has been really useful to me to understand how Whatsapp Web works internally.

There is one missing piece that I think is key to be able to extend the functionality of a potential Whatsapp Web clone: decrypting or deducing messages sent to the WebSocket in order to execute functionality such as fetching new messages.

In the documentation I see the format to send a message and on this issue: https://github.com/sigalor/whatsapp-web-reveng/issues/36 @sigalor wrote the format to query messages. I am wondering how these have been obtained, because those calls to the WS are encrypted.

Any pointers on how to replicate that for other calls would be really helpful! I could work from that, otherwise I am not sure how to approach it.

I see 2 possible approaches:

  1. Decrypt the sent messages. I have not managed to do that.
  2. Deduce it from the JS code, but being it minified I can't make sense of where this is called.

oriolbcn avatar Jan 09 '20 16:01 oriolbcn

Hello,

It would be very interesting to list all the requests made by the web version of WA. I started on my side by "unminifying" the app2.XX.js file with unminify npm : npx unminify app2.js

It looks very complete and is far from unreadable. And can't post a gist on it because the file is so big.

J4YF7O avatar Feb 14 '20 14:02 J4YF7O