whatsapp-web-reveng
whatsapp-web-reveng copied to clipboard
Decrypt / Deduce messages sent to web socket
Kudos for the great work on this repo! It has been really useful to me to understand how Whatsapp Web works internally.
There is one missing piece that I think is key to be able to extend the functionality of a potential Whatsapp Web clone: decrypting or deducing messages sent to the WebSocket in order to execute functionality such as fetching new messages.
In the documentation I see the format to send a message and on this issue: https://github.com/sigalor/whatsapp-web-reveng/issues/36 @sigalor wrote the format to query messages. I am wondering how these have been obtained, because those calls to the WS are encrypted.
Any pointers on how to replicate that for other calls would be really helpful! I could work from that, otherwise I am not sure how to approach it.
I see 2 possible approaches:
- Decrypt the sent messages. I have not managed to do that.
- Deduce it from the JS code, but being it minified I can't make sense of where this is called.
Hello,
It would be very interesting to list all the requests made by the web version of WA.
I started on my side by "unminifying" the app2.XX.js file with unminify npm : npx unminify app2.js
It looks very complete and is far from unreadable. And can't post a gist on it because the file is so big.