Submit Search
Upload
Whats app forensic
•
Download as PPT, PDF
•
1 like
•
947 views
R
Raghunath G
Follow
Null HYD APR 2015
Read less
Read more
Education
Report
Share
Report
Share
1 of 13
Download now
Recommended
What's New In PHP7
What's New In PHP7
Petra Barus
Null HYD Playing with shodan null
Null HYD Playing with shodan null
Raghunath G
Searching Shodan For Fun And Profit
Searching Shodan For Fun And Profit
E Hacking
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2
J M
Shodan
Shodan
J M
Seh based exploitation
Seh based exploitation
Raghunath G
New living and working
New living and working
James Lavigne
Raspberry pi 2
Raspberry pi 2
Raghunath G
Recommended
What's New In PHP7
What's New In PHP7
Petra Barus
Null HYD Playing with shodan null
Null HYD Playing with shodan null
Raghunath G
Searching Shodan For Fun And Profit
Searching Shodan For Fun And Profit
E Hacking
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2
J M
Shodan
Shodan
J M
Seh based exploitation
Seh based exploitation
Raghunath G
New living and working
New living and working
James Lavigne
Raspberry pi 2
Raspberry pi 2
Raghunath G
UGA Guest Lecture: Social Media 101
UGA Guest Lecture: Social Media 101
steffan
Función BUSCARV
Función BUSCARV
Francisco Monteverde
Xss 101 by-sai-shanthan
Xss 101 by-sai-shanthan
Raghunath G
Buying a business in florida
Buying a business in florida
James Lavigne
Ted talk newest
Ted talk newest
niki298
Security News Bytes
Security News Bytes
Raghunath G
Nomadic Display Setup Fabri Mural
Nomadic Display Setup Fabri Mural
Nomadic Display
Null July - OWTF - Bharadwaj Machiraju
Null July - OWTF - Bharadwaj Machiraju
Raghunath G
The Art of Social Media: Tips & Tricks
The Art of Social Media: Tips & Tricks
steffan
Lockout
Lockout
Aileen Mc Auliffe
SAmador CV
SAmador CV
Susan Amador
Securitynewsbytes april2015-150418153901-conversion-gate01
Securitynewsbytes april2015-150418153901-conversion-gate01
Raghunath G
Nomadic Display Instand Instructions
Nomadic Display Instand Instructions
Nomadic Display
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
Raghunath G
Baseball stats
Baseball stats
Rachel Monaco
Internet safety presentation
Internet safety presentation
mkajiwara1
Example problems Binomials
Example problems Binomials
Rachel Monaco
Buying a business in florida
Buying a business in florida
James Lavigne
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Anant Shrivastava
Securing Startups
Securing Startups
Omaid Faizyar
Incident Prevention and Incident Response - Alexander Sverdlov, PHDays IV
Incident Prevention and Incident Response - Alexander Sverdlov, PHDays IV
Alexander Sverdlov
Introduction To ICT Security Audit OWASP Day Malaysia 2011
Introduction To ICT Security Audit OWASP Day Malaysia 2011
Linuxmalaysia Malaysia
More Related Content
Viewers also liked
UGA Guest Lecture: Social Media 101
UGA Guest Lecture: Social Media 101
steffan
Función BUSCARV
Función BUSCARV
Francisco Monteverde
Xss 101 by-sai-shanthan
Xss 101 by-sai-shanthan
Raghunath G
Buying a business in florida
Buying a business in florida
James Lavigne
Ted talk newest
Ted talk newest
niki298
Security News Bytes
Security News Bytes
Raghunath G
Nomadic Display Setup Fabri Mural
Nomadic Display Setup Fabri Mural
Nomadic Display
Null July - OWTF - Bharadwaj Machiraju
Null July - OWTF - Bharadwaj Machiraju
Raghunath G
The Art of Social Media: Tips & Tricks
The Art of Social Media: Tips & Tricks
steffan
Lockout
Lockout
Aileen Mc Auliffe
SAmador CV
SAmador CV
Susan Amador
Securitynewsbytes april2015-150418153901-conversion-gate01
Securitynewsbytes april2015-150418153901-conversion-gate01
Raghunath G
Nomadic Display Instand Instructions
Nomadic Display Instand Instructions
Nomadic Display
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
Raghunath G
Baseball stats
Baseball stats
Rachel Monaco
Internet safety presentation
Internet safety presentation
mkajiwara1
Example problems Binomials
Example problems Binomials
Rachel Monaco
Buying a business in florida
Buying a business in florida
James Lavigne
Viewers also liked
(18)
UGA Guest Lecture: Social Media 101
UGA Guest Lecture: Social Media 101
Función BUSCARV
Función BUSCARV
Xss 101 by-sai-shanthan
Xss 101 by-sai-shanthan
Buying a business in florida
Buying a business in florida
Ted talk newest
Ted talk newest
Security News Bytes
Security News Bytes
Nomadic Display Setup Fabri Mural
Nomadic Display Setup Fabri Mural
Null July - OWTF - Bharadwaj Machiraju
Null July - OWTF - Bharadwaj Machiraju
The Art of Social Media: Tips & Tricks
The Art of Social Media: Tips & Tricks
Lockout
Lockout
SAmador CV
SAmador CV
Securitynewsbytes april2015-150418153901-conversion-gate01
Securitynewsbytes april2015-150418153901-conversion-gate01
Nomadic Display Instand Instructions
Nomadic Display Instand Instructions
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
Baseball stats
Baseball stats
Internet safety presentation
Internet safety presentation
Example problems Binomials
Example problems Binomials
Buying a business in florida
Buying a business in florida
Similar to Whats app forensic
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Anant Shrivastava
Securing Startups
Securing Startups
Omaid Faizyar
Incident Prevention and Incident Response - Alexander Sverdlov, PHDays IV
Incident Prevention and Incident Response - Alexander Sverdlov, PHDays IV
Alexander Sverdlov
Introduction To ICT Security Audit OWASP Day Malaysia 2011
Introduction To ICT Security Audit OWASP Day Malaysia 2011
Linuxmalaysia Malaysia
Malware analysis, threat intelligence and reverse engineering
Malware analysis, threat intelligence and reverse engineering
bartblaze
Drupal, lessons learnt from real world security incidents
Drupal, lessons learnt from real world security incidents
sydneydrupal
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara
Practical Exploitation - Webappy Style
Practical Exploitation - Webappy Style
Rob Fuller
006.itsecurity bcp v1
006.itsecurity bcp v1
Mohammad Ashfaqur Rahman
OSINT for Proactive Defense - RootConf 2019
OSINT for Proactive Defense - RootConf 2019
RedHunt Labs
Pen Testing Development
Pen Testing Development
CTruncer
Demise of test scripts rise of test ideas
Demise of test scripts rise of test ideas
Richard Robinson
Malware Cleanup Project
Malware Cleanup Project
Subarno Saha
Lecture 9 and 10 comp forensics 09 10-18 file system
Lecture 9 and 10 comp forensics 09 10-18 file system
Alchemist095
What Your Tech Lead Thinks You Know (But Didn't Teach You)
What Your Tech Lead Thinks You Know (But Didn't Teach You)
Chris Riccomini
Security and why you need to review yours.
Security and why you need to review yours.
David Busby, CISSP
0-Day Up Your Sleeve - Attacking macOS Environments
0-Day Up Your Sleeve - Attacking macOS Environments
SecuRing
Security .NET.pdf
Security .NET.pdf
Abhi Jain
Google Dorks -Advance Searching Technique
Google Dorks -Advance Searching Technique
Mayur Parmar
Man-In-The-Disk
Man-In-The-Disk
Priyanka Aash
Similar to Whats app forensic
(20)
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Securing Startups
Securing Startups
Incident Prevention and Incident Response - Alexander Sverdlov, PHDays IV
Incident Prevention and Incident Response - Alexander Sverdlov, PHDays IV
Introduction To ICT Security Audit OWASP Day Malaysia 2011
Introduction To ICT Security Audit OWASP Day Malaysia 2011
Malware analysis, threat intelligence and reverse engineering
Malware analysis, threat intelligence and reverse engineering
Drupal, lessons learnt from real world security incidents
Drupal, lessons learnt from real world security incidents
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
Practical Exploitation - Webappy Style
Practical Exploitation - Webappy Style
006.itsecurity bcp v1
006.itsecurity bcp v1
OSINT for Proactive Defense - RootConf 2019
OSINT for Proactive Defense - RootConf 2019
Pen Testing Development
Pen Testing Development
Demise of test scripts rise of test ideas
Demise of test scripts rise of test ideas
Malware Cleanup Project
Malware Cleanup Project
Lecture 9 and 10 comp forensics 09 10-18 file system
Lecture 9 and 10 comp forensics 09 10-18 file system
What Your Tech Lead Thinks You Know (But Didn't Teach You)
What Your Tech Lead Thinks You Know (But Didn't Teach You)
Security and why you need to review yours.
Security and why you need to review yours.
0-Day Up Your Sleeve - Attacking macOS Environments
0-Day Up Your Sleeve - Attacking macOS Environments
Security .NET.pdf
Security .NET.pdf
Google Dorks -Advance Searching Technique
Google Dorks -Advance Searching Technique
Man-In-The-Disk
Man-In-The-Disk
More from Raghunath G
Securitynewsbytes
Securitynewsbytes
Raghunath G
Analysis of malicious pdf
Analysis of malicious pdf
Raghunath G
Mobile application security 101
Mobile application security 101
Raghunath G
Is iso 27001, an answer to security
Is iso 27001, an answer to security
Raghunath G
Null HYD VRTDOS
Null HYD VRTDOS
Raghunath G
Metasploit
Metasploit
Raghunath G
Null dec 2014
Null dec 2014
Raghunath G
Security News Bytes
Security News Bytes
Raghunath G
Decoy documents
Decoy documents
Raghunath G
Spear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishna
Raghunath G
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekar
Raghunath G
Netcat 101 by-mahesh-beema
Netcat 101 by-mahesh-beema
Raghunath G
The art of_firewalking-by-sujay
The art of_firewalking-by-sujay
Raghunath G
Heartbleed by-danish amber
Heartbleed by-danish amber
Raghunath G
More from Raghunath G
(14)
Securitynewsbytes
Securitynewsbytes
Analysis of malicious pdf
Analysis of malicious pdf
Mobile application security 101
Mobile application security 101
Is iso 27001, an answer to security
Is iso 27001, an answer to security
Null HYD VRTDOS
Null HYD VRTDOS
Metasploit
Metasploit
Null dec 2014
Null dec 2014
Security News Bytes
Security News Bytes
Decoy documents
Decoy documents
Spear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishna
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekar
Netcat 101 by-mahesh-beema
Netcat 101 by-mahesh-beema
The art of_firewalking-by-sujay
The art of_firewalking-by-sujay
Heartbleed by-danish amber
Heartbleed by-danish amber
Recently uploaded
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
Jisc
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
MaritesTamaniVerdade
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
Mebane Rash
Understanding Accommodations and Modifications
Understanding Accommodations and Modifications
MJDuyan
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
Amanpreet Kaur
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
Poonam Aher Patil
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
Admir Softic
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Denish Jangid
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
Esquimalt MFRC
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
Dr. Sarita Anand
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
christianmathematics
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
jbellavia9
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
Celine George
Application orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
RamjanShidvankar
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
Single or Multiple melodic lines structure
Single or Multiple melodic lines structure
dhanjurrannsibayan2
Recently uploaded
(20)
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
Understanding Accommodations and Modifications
Understanding Accommodations and Modifications
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
Application orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
Single or Multiple melodic lines structure
Single or Multiple melodic lines structure
Whats app forensic
1.
About Me
2.
I am Not
A.... ● Teacher ● Trainer ● Hacker ● .........I am An IT Security Analyst ........
3.
Todays Entertainment WhatsApp Forensic
4.
Introduction
5.
Steps to Perform
Forensic
6.
Key Artifiacts of
WhatsApp ● Main Evidence files-->> ● ->/data/data/com.whatsapp/databases/msgstore.db ● ->/data/data/com.whatsapp/databases/wa.db ● ->/sdcard/WhatsApp/Databases/msgstore.db.crypt8
7.
Directory Structure ● Main Evidence
Directories-->> ● .Shared - Hidden ● .Trash - Hidden ● Databases ● Media ● Profile Pictures
8.
Ricovery Methods ● 1. Online
Websites ● Example:- https://www.recovermessages.com/ 2. Get back Deleted WhatsApp Messages Manually ● 3. Tools ● Example:- Oxygen Forensic Suite, Mobiledit Etc
9.
Comman Challenges ● 1. Encryption ● 2.
Tools are Paid ● 3. Patience and Time Consuming
10.
Demo...
11.
References ->http://sch3m4.github.io/wforensic/ ->http://www.magnetforensics.com/recovering-whatsapp-forensic-artifacts/ ->http://blog.digital-forensics.it/2012/05/whatsapp-forensics.html
12.
Credits -->> Internet
& Me
13.
Any Queries..?? ----------->>Thank You<<-----------
Download now