defeating whatsapp’s lack of encryption - bh sao paulo 2013

45
`

Post on 21-Oct-2014

5.066 views

Category:

Technology


0 download

DESCRIPTION

With the PRISM scandal, we began to question whether Microsoft, Google, Apple, and Facebook were the only companies working with governments to spy on the behavior of its citizens. Will WhatsApp be one of these companies? Does WhatsApp store its user conversations? News of the threat by Saudi Arabia to declare applications illegal if the server was not established in that country* does not make us feel calm. These sorts of things make us think that users are defenseless and no current measures to ensure the privacy of content shared on these platforms exists. The main objective of this research is to add a new layer of security and privacy to ensure that in the exchange of information between members of a conversation, both the integrity and confidentiality, cannot be affected by an external attacker. This is achieved through a system to anonymize and encrypt conversations and data sent via WhatsApp, so that when they reach the servers they are not in "plain text" and only readable to the rightful owners. Different layers have been defined inside a new hierarchy of security. The first layer of security involves encryption, using symmetric private keys and data exchanged between two users. In the second layer, we give a certain level of anonymity to the conversation using fake/anonymous accounts. By using intermediate communication nodes, we ensure that there is no direct communication between the mobile phone and the server. Finally, a third layer would be set to modify the inner workings of the application, routing all traffic and conversation messages to its own server (XMPP) to ensure the privacy of communication. This would provide the user with their own WhatsApp server. This technique has been developed to be used in a manner completely transparent to the users. This requires having a rooted Android mobile. If using other platforms like iPhone, we have developed a Raspberry-based platform that will act as an access point to implement these three new layers of security.

TRANSCRIPT

Page 1: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

`

Page 2: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

DEFEATING WHATSAPP’S

Defeating`s

Lack of Privacy

Page 3: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

Black Hat Sao Paulo

WHO  WE  AREJaime Sánchez

- Computer Engineer & Security Researcher - Executive MBA, CISSP, CISA and CISM - Speaker at Rootedcon, Nuit du Hack, BH Arsenal, Defcon, DerbyCon, NoConName, DeepSec etc. - Twitter : @segofensiva - http://www.seguridadofensiva.com

!!Pablo San Emeterio

- Computer Engineer / I+D Optenet - Master of Science in Computer Security by UPM, CISA and CISM - Speaker at NoConName and CiberSeg - Previous experience with WhatsApp :) - Twitter : @psaneme

Page 4: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

CONGRATS  PABLO!  :)

Black Hat Sao Paulo

Page 5: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

- WhatsApp is a cross-platform (no desktop clients) instant messaging subscr iption ser vice for smartphones, that let users send messages and multimedia files to each other. !- Because it uses your internet data plan and there's no additional cost for these messages, it's mostly used young people. !- Was founded in 2009 by American Brian Acton and Ukrainian Jan Koum (also the CEO), both former employees of Yahoo!, and is based in Santa Clara, California. !- WhatsApp might not be as widely known as Twitter, but it is definitely just as popular in terms of users.

¿  WHAT  IS  WHATSAPP  ?

Black Hat Sao Paulo

Page 6: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

USERS  STATS

It’s interesting to compare that stat to Twitter, which has 230 million active monthly users, and to Instagram, which has 150 million on its platform.

Black Hat Sao Paulo

Page 7: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

MESSAGE  STATS

Black Hat Sao Paulo

Page 8: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

Just how much is 10 billion messages?

416,666,670 messages an hour

6,944,440 messages a minute

115,704 messages a second

- WhatsApp has done to SMS on mobile phones what Skype did to international calling on landlines!

Black Hat Sao Paulo

Page 9: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013Black Hat Sao Paulo

Hardware Specs - Dual octo-core E5-2690 (32 logical CPUs) - 256GB RAM (128GB for A/V hosts) - 6 x 800GB SSD (4TB SATA for A/V hosts) - 2 x dual link-agg gig-E (public, private) !New features - Resumable uploads and downloads - Reference counting

Peak Scalability - 214M images in a day - 8.8K images/sec downloaded - 29 Gb/sec output bandwidth !

NEW  ARCHITECTURE

Holiday Week

Page 10: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

SECURITY  FLAWS- WhatsApp communications were not encrypted, and data was sent and received in plaintext, meaning messages to easily be read if packet traces are available (WhatsApp Sniffer) !- WhatsApp began using IMEI numbers and MAC addresses as passwords. !- Remote storage of virus, programs, html etc. on WhatsApp servers !- Critical flaw lead to control any account (modify account, send and receive messages etc.) !- Data stored in plaintext on database !- An unknown hacker published a website (WhatsAppStatus.net) that made it possible to change the status of an arbitrary WhatsApp user, as long as the phone number was known. (To make it work, it only required a restart of the app)

Black Hat Sao Paulo

Page 11: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

MORE  SECURITY  FLAWS- On January 13, 2012, WhatsApp was pulled from the iOS App Store, and the reason was not disclosed. The app was added back to the App Store four days later !- Priyanka appeared spreading on Whatsapp through a contacts file that if you add to your contacts. !- WhatsApp Voyeur: allows you to view the profile picture and current "Status" of every user without using a mobile phone or registered account !- No authorization required to send messages, so any user can contact you or any custom designed bot could be created to send you spam. !- Serious WhatsApp flaw allows decrypting user messages !!!- This is what we know so far ...

Black Hat Sao Paulo

Page 12: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

BLOCKING- Saudi Arabia plans to block Internet-based communication tool WhatsApp within weeks if the U.S.-based firm fails to comply with requirements set by the kingdom's telecom regulator, local newspapers reported this week. !- This month the Communications and Information Technology Commission (CITC) banned Viber, another such tool, which like WhatsApp is hard for the state to monitor and deprives telecom companies of revenue from international calls and texts. !- The regulator issued a directive saying tools such as Viber, WhatsApp and Skype broke local laws, without specifying how.

http://www.reuters.com/article/2013/06/16/us-saudi-internet-idUSBRE95F04R20130616

Black Hat Sao Paulo

Page 13: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

SURVEILLANCE- Reports and documents leaked by Edward Snowden in June 2013 indicate that PRISM is used for monitoring communications and other stored information. !- The data that the NSA is supposedly able to get by PRISM includes email, video, voice chat, photos, IP addresses, login notifications, file transfer and details about social networking profiles. !- Internet companies such as Microsoft, Google, Yahoo, Dropbox, Apple and Facebook are inside the program. !- The objectives of the PRISM program are those citizens living outside the United States, but U.S. citizens are included too.

Black Hat Sao Paulo

Page 14: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

¿ Could WhatsApp be one of these companies ?

The NSA infected more than 50,000 computers worldwide with malicious software designed to steal confidential

information. Some countries affected are Venezuela, Bolivia, Brazil, Ecuador, Cuba, Colombia and Honduras, among others.

The attacks are performed by a special department called Tailored Access Operations (TAO), which has more than a

thousand hackers.

Black Hat Sao Paulo

Page 15: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

THE  IDEA

Black Hat Sao Paulo

Page 16: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

- The main objective of the research is to add a new layer of security and privacy to ensure that in the exchange of messages between members of a conversation both the integrity and confidentiality could not be affected by an external attacker :

GOALS

Black Hat Sao Paulo

- Add secure encryption to the client. If an attacker intercepts the messages, or any governments try to intercept our messages at WhatsApp's server , they won't find any legible information. - Give a certain level of anonymity to the conversation by using fake/anonymous accounts and intermediate communication nodes. - Modify the inner workings of the appl icat ion , rout ing a l l t r a ffic and conversation messages to own server (XMPP).

Page 17: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

- This technique has been developed to be used in a manner completely transparent to the users. !- The software works for all WhatsApp’s platforms: we have developed a Linux-based solution (it works inside a Raspberry Pi, your laptop computer or you could use a VPN). !- Could be ported to run inside Android.

Black Hat Sao Paulo

GOALS

Page 18: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

INSIDE  THE  WORLD  OF  WHATSAPP

Black Hat Sao Paulo

Page 19: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

FUNXMPP- WhatsApp uses a customized version of the open standard eXtensible Messaging and Presence Platform (XMPP), called FunXMPP, that uses XML as its syntax.. !- Without going into technical details, it is a messaging protocol that uses XML syntax: !

<message from=”[email protected]”         id=”1339831077-7”         type=”chat”         timestamp=”1339848755”>    <notify xmlns=”urn:xmpp:whatsapp”            name=”NcN” />    <request xmlns=”urn:xmpp:receipts” />    <body>Hello</body> </message>

!- Since WhatsApp is intended for mobile devices, they wanted to use as little overhead as possible. !- ¿ How did they achieve this ?

Black Hat Sao Paulo

Page 20: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

FUNXMPP- First of all, all keywords are assigned a byte each. If you can replace each by just one byte, it would reduce the overhead a lot. !- FunXMPP uses a HashTable for this, containing most (if not all) keywords !- Given the syntax \xnn for one byte with the hexadecimal value nn, the example above could be reduced to the following: !

<\x5d \x38=”01234567890@\x8a”      \x43=”1339831077-7”      \xa2=”\x1b”      \x9d=”1339848755”>   <\x65 \xbd=”\xae”         \x61=”NcN” />   <\x83 \xbd=”\xad” />   <\x16>Hello</\x16> </\x5d> !

- All remaining ascii values cannot be replaced by a representative byte-value, because they are variable/no fixed keywords.

Black Hat Sao Paulo

Page 21: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

BYTES- Byte \xfc: This byte signifies a sequence of ascii characters will be used as the value. The length of this sequence can be found in the next byte (max length 255). - Byte \xfd: Where \xfc reads one byte for the length,\xfd reads three bytes. This allows for strings up to a max of 16777215 characters. - Byte \xf8 y \xf9: Declare the beginning of a list and it is followed by its number of elements and subsequently the content,.

The way members are counted is: !   1      2             3 <message from=”[email protected]”          4      5         id=”1339831077-7”           6    7         type=”chat”             8           9         timestamp=”1339848755”>    <notify xmlns=”urn:xmpp:whatsapp”     |            name=”NcN” />                 |  10    <request xmlns=”urn:xmpp:receipts” /> |    <body>Hello</body>                    |

</message>

Black Hat Sao Paulo

Page 22: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

57:41 => WA 01:02 => PROTOCOL VERSION 1.2 !f8:05:01:c8:ab:a5:fc:12:69:50:68:6f:6e:65:2d:32:2e:31:30:2e:32:2d:35:32:32:32:00:00 0x01 => stream:stream 0xc8 => to 0xab: s.whatsapp.net 0xa5 => resource 0xfc => String 12caracteres => iPhone-2.10.2-5222 <stream:stream to=”s.whatsapp.net” resource=”iPhone-2.10.2-5222” /> !

f8:02:bb => 0xbb => stream:features f8:04 f8:03:70:31:ca => 0x70 => message_acks 0x31 => enable 0xca => TRUE f8:01:9c => 0x9c => receipt_acks f8:03:e4:cb:0c => 0xe4 => w:profile:picture 0xcb => type 0x0c => all f8:03:b9:7c:ca => 0xb9 => status 0x7c => notification 0xca => TRUE <stream:features> <message_acks enable=TRUE /> <receipt_acks /> <w:profile:picture type=ALL /> <status notification=TRUE /> </stream:features> !

f8:08:10:6d:ec:da:fc:0b:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:X:e8:cf 0x10 => auth 0x6d => mechanism 0xec => WAUTH-1  user => 34XXXXXXXXX 0x31 => enable 0xe8 => xmlns 0xcf => urn:ietf:params:xml:ns:xmpp-sasl <auth mechanism=”WAUTH-1” user=”XXXXXXXXXXX” xmlns=”urn:ietf:params:xml:ns:xmpp-sasl” />

LOGIN

Black Hat Sao Paulo

Page 23: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

LOGGING  IN  ON  A  NEW  DEVICE1) WhatsApp will send the user’s phone number to servers, through HTTPS, requesting an authentication code 2) The mobile phone receives, through text message, the authentication code 3) This authentication code is sent and compared, and if matches, WhatsApp obtains the password !

- To log in, the client uses a custom SASL mechanism, called WAUTH-1. First, the client sends:

<auth xmlns="urn:ietf:params:xml:ns:xmpp-sasl" user="XXXXXXXXXXXX" mechanism="WAUTH-1" /> !

- Server will answer with a challenge: <challenge xmlns="urn:ietf:params:xml:ns:xmpp-sasl">YYYYYYYYYYYYYYYYYYYY </challenge> !

- To respond the challenge, the client will generate a key using PKBDF2 with user’s password, challenge as salt and SHA1 as hash function. Only 20 bytes from result will be used as key <phone number> || <20 bytes> || UNIX timestamp:

<response xmlns="urn:ietf:params:xml:ns:xmpp-sasl">ZZZZZZZZZZZZZ</response>

Black Hat Sao Paulo

Page 24: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

ARE  MY  MESSAGES  SECURE  ?

- RC4, the most widely used software stream cipher and is used in popular protocols such as Transport Layer Security (TLS) and WEP, was designed by Ron Rivest of RSA Security in 1987 !- RC4 has two stages - a KSA, that initializes the state table to be a "random" permutation based on the key, and the PRGA, which actually returns a random byte.

¿ Where is the problem ?

Black Hat Sao Paulo

Page 25: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

From the creators of: - Don't run with scissors - Don't run near the pool - Don't run near the pool while carrying scissors !!Now comes:

DON’T re-use the same RC4 keystream to encrypt two different messages

Black Hat Sao Paulo

Page 26: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

EVERY  TIME  ALICE  ENCRYPTS  A  MESSAGE

Suppose Alice wants to send encryptions of m1 and m2 to Bob over a public channel. Alice and Bob have a shared key k; however, both messages are the same length as the key k. Since Alice is extraordinary lazy (and doesn't know about stream ciphers), she decides to just reuse the key. !Alice sends ciphertexts c1 = m1 ⊕ k and c2 = m2 ⊕ k to Bob through a public channel. Unfortunately, Eve intercepts both of these ciphertexts and calculates c1 ⊕ c2= m1 ⊕ m2.

c1 = m1 ⊕ k c2 = m2 ⊕ k

c1 ⊕ c2 = m1 ⊕ m2

m1 = c1 ⊕ k m2 = c2 ⊕ k

REUSED KEY ATTACK

,  GOD  KILLS  A  KITTEN  ...

Black Hat Sao Paulo

Page 27: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

ATTACKING  WHATSAPP’S  ENCRYPTION- From here, the task becomes separating the two plaintexts from one another (plaintext attack or Crib-Dragging), following the steps bellow: 1) Guess a word that might appear in one of the messages 2) Encode the word from step 1 to a hex string 3) XOR the two cipher-text messages 4) XOR the hex string from step 2 at each position of the XOR of the two cipher-texts (from step 3) 5) When the result from step 4 is readable text, we guess the English word and expand our crib search. 6) If the result is not readable text, we try an XOR of the crib word at the next position. !- To do this, we have to do a little guessing about the plaintexts themselves. !- The idea is to use a Frecuency Analysis based on the original language used in the plaintext.

Black Hat Sao Paulo

Page 28: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013Black Hat Sao Paulo

Page 29: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

"WhatsApp takes security seriously and is continually thinking of ways to improve our product. While we appreciate feedback, we're concerned that the blogger's story describes a scenario that is more theoretical in nature. Also stating that all conversations should be considered compromised is inaccurate" the company said.

WTF!Official response to https://blog.thijsalkema.de/blog/2013/10/08/piercing-through-whatsapp-s-encryption/

Black Hat Sao Paulo

Page 30: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013Black Hat Sao Paulo

-­‐  DEMO  -­‐

Page 31: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

ANONYMITY

Black Hat Sao Paulo

Page 32: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

VIRTUAL  NUMBERS

Black Hat Sao Paulo

Page 33: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

ADDITIONAL  ENCRYPTION

Black Hat Sao Paulo

Page 34: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

INTERCEPT  MESSAGES- We have verified that the encryption used to protect the information and privacy of our conversations is easy to break. !- ¿What can we do? We will intercept WhatsApp's message before you leaving the mobile phone. We'll decipher the original message with our key and we will apply a new cipher and then encrypt it with the original algorithm and key, not breaking the application. !- From now on, we’ll be working this way:

REAL-TIME MODIFICATION

Black Hat Sao Paulo

Page 35: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

CHALLENGE  AND  iOS

Black Hat Sao Paulo

- In iOS version we’ll use a little trick to get the challenge. Instead of exchanging it during the log-in, WhatsApp sends the challenge for the next session while connected. !- We’ll flip some random bytes, forcing WhatsApp to negotiate it again:

- The result for the log in of the second mobile is the same:

Page 36: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

- You can see how our program has decoded the original message: Bello !- HMAC is deleted in the decoded message and we calculate it again before sending. Finally, the message will leave our mobile phone. We can see that the new message is different from the original because is has a layer encryption implemented by us:

SENDING  MESSAGES

Black Hat Sao Paulo

- The message is sent from the client. Our program detects it, and using the RC4 session key used by WhatsApp, decrypts the message and extracts text. Once the text is clear, encrypts it with our algorithm and key, and re-wrap it in the original format with RC4 encryption it again, not breaking the operation of WhatsApp:

HMAC

Page 37: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

- In the screenshot you can see how we received an normal WhatsApp message, but it’s really special. When we use the RC4 key to decrypt the text inside, we find is completely unreadable.

- Using the same private key and algorithm, our program will decrypt the message text and reassemble the original text, so WhatsApp will be able to process it. !!- The final message can be read as usually by the user, and it’s the same as the first one:

RECEIVING  MESSAGES

Black Hat Sao Paulo

Page 38: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013Black Hat Sao Paulo

-­‐  DEMO  -­‐

Page 39: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

WITHOUT  PRIVATE  KEY

Black Hat Sao Paulo

Page 40: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

EXTERNAL  XMPP  SERVER

Black Hat Sao Paulo

Page 41: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

HIDING  OUR  MESSAGES

- The above method allows us to encrypt our messages, so other attackers capable of intercepting our traffic will not be able to get the contents of messages. !- But, ¿ what if we want the traffic to directly bypass the WhatsApp's server ?

EXTERNAL XMPP SERVER

Black Hat Sao Paulo

Page 42: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

USING  AN  EXTERNAL  XMPP  SERVER- We analyze the outgoing message and decrypt it using the RC4 key. !- Then, we extract the original text and send it to our external XMPP server :

<destination number>¿<message_id>¿<original text>

- The program will replace every character in the original text with our wildcard character, so the original message will never pass through WhatsApp's servers (this step is necessary or destination will reject our messages) !- Recipient receives our message full of wildcard characters, querys our XMPP server and replaces the wildcard characters with the original text.

Black Hat Sao Paulo

Page 43: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013Black Hat Sao Paulo

-­‐  DEMO  -­‐

Page 44: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013

WHATSAPP  CAN  ONLY  SEE  ...

Black Hat Sao Paulo

Page 45: Defeating WhatsApp’s Lack of Encryption - BH Sao Paulo 2013

Defeating WhatsApp’s Lack of Privacy

NoConName 2013Black Hat Sao Paulo