Submit Search
Upload
WhatsApp security
•
2 likes
•
3,222 views
J
Javi Hurtado
Follow
Just a school work for the english class.
Read less
Read more
Technology
Report
Share
Report
Share
1 of 8
Recommended
WhatsApp and its security issues
WhatsApp and its security issues
Kofi Kafui Kornu
WhatsApp End to End encryption
WhatsApp End to End encryption
Venkatesh Kariappa
End to End Encryption in 10 minutes -
End to End Encryption in 10 minutes -
Thomas Seropian
Common malware and countermeasures
Common malware and countermeasures
Noushin Ahson
Email security
Email security
Baliram Yadav
Transport layer security (tls)
Transport layer security (tls)
Kalpesh Kalekar
Email Security : PGP & SMIME
Email Security : PGP & SMIME
Rohit Soni
Mobile security
Mobile security
dilipdubey5
Recommended
WhatsApp and its security issues
WhatsApp and its security issues
Kofi Kafui Kornu
WhatsApp End to End encryption
WhatsApp End to End encryption
Venkatesh Kariappa
End to End Encryption in 10 minutes -
End to End Encryption in 10 minutes -
Thomas Seropian
Common malware and countermeasures
Common malware and countermeasures
Noushin Ahson
Email security
Email security
Baliram Yadav
Transport layer security (tls)
Transport layer security (tls)
Kalpesh Kalekar
Email Security : PGP & SMIME
Email Security : PGP & SMIME
Rohit Soni
Mobile security
Mobile security
dilipdubey5
Network Security Presentation
Network Security Presentation
Allan Pratt MBA
Trojan Horse Virus
Trojan Horse Virus
sitinursyafiqah
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
Mobile Application Security
Mobile Application Security
Ishan Girdhar
Mobile Device Security
Mobile Device Security
Nemwos
Social Networking Security
Social Networking Security
S. M. Shakib Limon
Wireless and mobile security
Wireless and mobile security
Pushkar Pashupat
Email security
Email security
Indrajit Sreemany
Computer & internet Security
Computer & internet Security
Gerard Lamusse
Mobile security
Mobile security
priyanka pandey
Phishing
Phishing
SaurabhKantSahu1
Mobile security
Mobile security
Naveen Kumar
Cyber warfare
Cyber warfare
VedangiBrahmbhatt
Social Media Security
Social Media Security
Del Belcher
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
koolkampus
Password management
Password management
Wilmington University
Dos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle Attack
marada0033
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
Amit Tyagi
Pgp
Pgp
Reham Maher El-Safarini
Ransomware - The Growing Threat
Ransomware - The Growing Threat
Nick Miller
whatsapp ppt
whatsapp ppt
Swati Luthra
Review on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integration
Govindarrajan NV
More Related Content
What's hot
Network Security Presentation
Network Security Presentation
Allan Pratt MBA
Trojan Horse Virus
Trojan Horse Virus
sitinursyafiqah
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
Mobile Application Security
Mobile Application Security
Ishan Girdhar
Mobile Device Security
Mobile Device Security
Nemwos
Social Networking Security
Social Networking Security
S. M. Shakib Limon
Wireless and mobile security
Wireless and mobile security
Pushkar Pashupat
Email security
Email security
Indrajit Sreemany
Computer & internet Security
Computer & internet Security
Gerard Lamusse
Mobile security
Mobile security
priyanka pandey
Phishing
Phishing
SaurabhKantSahu1
Mobile security
Mobile security
Naveen Kumar
Cyber warfare
Cyber warfare
VedangiBrahmbhatt
Social Media Security
Social Media Security
Del Belcher
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
koolkampus
Password management
Password management
Wilmington University
Dos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle Attack
marada0033
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
Amit Tyagi
Pgp
Pgp
Reham Maher El-Safarini
Ransomware - The Growing Threat
Ransomware - The Growing Threat
Nick Miller
What's hot
(20)
Network Security Presentation
Network Security Presentation
Trojan Horse Virus
Trojan Horse Virus
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Mobile Application Security
Mobile Application Security
Mobile Device Security
Mobile Device Security
Social Networking Security
Social Networking Security
Wireless and mobile security
Wireless and mobile security
Email security
Email security
Computer & internet Security
Computer & internet Security
Mobile security
Mobile security
Phishing
Phishing
Mobile security
Mobile security
Cyber warfare
Cyber warfare
Social Media Security
Social Media Security
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
Password management
Password management
Dos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle Attack
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
Pgp
Pgp
Ransomware - The Growing Threat
Ransomware - The Growing Threat
Viewers also liked
whatsapp ppt
whatsapp ppt
Swati Luthra
Review on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integration
Govindarrajan NV
Whatsapp project work
Whatsapp project work
Virginia Sgargi
Whatsapp PPT Presentation
Whatsapp PPT Presentation
VOCCE ICT
Encryption for Everyone
Encryption for Everyone
Coastal Pet Products, Inc.
Encryption: It's For More Than Just Passwords
Encryption: It's For More Than Just Passwords
John Congdon
iOS Application Security
iOS Application Security
Egor Tolstoy
Gregor kopf , bernhard brehm. deniability in messaging protocols
Gregor kopf , bernhard brehm. deniability in messaging protocols
Yury Chemerkin
Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1
Subhransu Behera
End-to-end encryption explained
End-to-end encryption explained
Todd Merrill
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3m
Prem Kumar (OSCP)
12 symmetric key cryptography
12 symmetric key cryptography
drewz lin
Different types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
subhradeep mitra
3 public key cryptography
3 public key cryptography
Rutvik Mehta
Whatsapp's Architecture
Whatsapp's Architecture
Udaya Kiran
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
raf_slide
Malware
Malware
Tuhin_Das
Computer Malware
Computer Malware
aztechtchr
Presentation on iOS
Presentation on iOS
Harry Lovylife
ETHICAL HACKING PPT
ETHICAL HACKING PPT
Sweta Leena Panda
Viewers also liked
(20)
whatsapp ppt
whatsapp ppt
Review on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integration
Whatsapp project work
Whatsapp project work
Whatsapp PPT Presentation
Whatsapp PPT Presentation
Encryption for Everyone
Encryption for Everyone
Encryption: It's For More Than Just Passwords
Encryption: It's For More Than Just Passwords
iOS Application Security
iOS Application Security
Gregor kopf , bernhard brehm. deniability in messaging protocols
Gregor kopf , bernhard brehm. deniability in messaging protocols
Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1
End-to-end encryption explained
End-to-end encryption explained
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3m
12 symmetric key cryptography
12 symmetric key cryptography
Different types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
3 public key cryptography
3 public key cryptography
Whatsapp's Architecture
Whatsapp's Architecture
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
Malware
Malware
Computer Malware
Computer Malware
Presentation on iOS
Presentation on iOS
ETHICAL HACKING PPT
ETHICAL HACKING PPT
Recently uploaded
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Orbitshub
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Nanddeep Nachan
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Zilliz
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Zilliz
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Angeliki Cooney
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
apidays
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Orbitshub
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Zilliz
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Juan lago vázquez
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
apidays
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
MadyBayot
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
Recently uploaded
(20)
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
WhatsApp security
1.
How does WhatsApp send
your messages over the net? BY JAVIER HURTADO
2.
Whatsapp security protocol
WhatsApp encrypts messages since versión 2.8.3 (2012) WhatsApp uses the RC4 protocol to encrypt messages Android: Reversed MD5 hash IMEI iPhone: MAC Address MD5 hash
3.
Obtaining hash in
Android IMEI: 012345678912345 =>
4.
Obtaining hash in
iPhone MAC Address: AA:BB:CC:EE:FF=>
5.
WhatsApp security bug
First it sends a plain text packet with: Client OS WhatsApp app version Port used for the message transmission (encrypted) 443 5222 5223 YOUR PHONE NUMBER
6.
WhatsApp security bug
(iPhone)
7.
WhatsApp security bug
(Android)
8.
Precautions Preferably do
not use WhatsApp on public WiFi networks (cafes, airports…) If there isn’t other option use a VPN