00
0
No products in the cart.

Shopping Cart

Elcomsoft Explorer for WhatsApp

Elcomsoft Explorer for WhatsApp

301.78 SAR

Sold By: WJN Cybersecurity Company

Elcomsoft Explorer for WhatsApp is a tool to download, decrypt and display WhatsApp communication histories. The tool automatically acquires WhatsApp databases from one or multiple sources, processes information and displays contacts, messages, call history and pictures sent and received. The built-in viewer offers convenient searching and filtering, and allows viewing multiple WhatsApp databases extracted from various sources.

(Available)
Quantity

SKU:EXWA237N1

Categories:Digital Forensics

Tags:Digital Forensics

Share:

The Ultimate WhatsApp Acquisition Tool

Elcomsoft Explorer for WhatsApp (EXWA) is a Windows tool to acquire, decrypt and display WhatsApp communication histories. The tool offers multiple acquisition options to extract and decrypt WhatsApp data from multiple local and cloud sources including Android smartphones, iOS system backups (iTunes and iCloud), and WhatsApp proprietary cloud backups in Google Drive and iCloud Drive.
The tool supports both rooted and non-rooted Android phones. Encrypted backups can be automatically decrypted providing that the correct password is supplied. Downloading cloud backups from Apple iCloud and iCloud Drive requires entering the user’s Apple ID and password or using a binary authentication token extracted from the user’s computer, while Google Drive downloads require a login and a password. Two-factor authentication is supported for both Apple and Google accounts.
The built-in viewer offers convenient view of messages, calls and pictures stored in multiple WhatsApp databases obtained from the different sources. Instant filtering and ultra-fast searching allow finding records of interest in a matter of seconds.


WhatsApp Acquisition

Elcomsoft Explorer for WhatsApp supports all of the following acquisition methods of WhatsApp databases:

  • Direct extraction from Android smartphones
    Rooted (Android 4.0-9.0) and non-rooted (Android 4.0-6.0.1) devices are supported. Phone must be unlocked for acquisition.
  • Over-the-air acquisition of WhatsApp proprietary backups stored in Google Drive
    WhatsApp backups can be pulled from the user’s Google Account and decrypted. Access to registered phone number or SIM card is required. Google ID and password required.[1]
  • Extraction from local iTunes backups
    Encrypted backups are automatically decrypted. The correct password is required to decrypt the backup.
  • Over-the-air acquisition from iOS backups stored in Apple iCloud
    WhatsApp databases are automatically retrieved from iOS backups stored in Apple iCloud. Fast acquisition is made possible by selectively downloading WhatsApp information instead of pulling the entire backup from the cloud. Apple ID and password or binary authentication token required.[2].
  • Over-the-air acquisition of WhatsApp proprietary backups stored in iCloud Drive
    Proprietary WhatsApp backups can be pulled from the user’s iCloud Drive account and decrypted. Access to registered phone number or SIM card is required. [1] Apple ID and password or binary authentication token required.[2]


WhatsApp Acquisition: Not an Easy Target

WhatsApp Messenger is one of the most popular instant messaging tools, if not the most popular one. WhatsApp clients are available for all mobile platforms including Android, Apple iOS, Blackberry, and Microsoft Windows Phone 8.x and Windows 10 Mobile. WhatsApp is a popular target for spammers, hoaxers and cyber criminals. On at least one occasion, intercepted WhatsApp communications helped uncover a terrorist organization.
Since WhatsApp employs secure end-to-end messaging, it is not possible for law enforcement to request communication histories from Facebook who currently owns WhatsApp. As a result, acquisition is only possible from end-user devices or data backups produced by such devices and saved either locally or stored in a cloud.


Requirements to Download WhatsApp Databases from the Cloud

The Standard edition of Elcomsoft Explorer for WhatsApp can download information from Google Drive, Apple iCloud and iCloud Drive[1].
In order to be able to download information from Google Drive, Apple iCloud or iCloud Drive, the correct login and password are required. For Apple iCloud, one can use a binary authentication token extracted from the user’s PC or Mac. For extracting binary authentication tokens, we recommend using a tool from Elcomsoft Phone Breaker (if you don’t own a license, the evaluation version will work just fine). Decrypting the backup requires a one-time code received by an SMS to a registered phone number. [1]
Without the code, the conversation database will remain encrypted; only the files (photos and videos) and contacts (Google Drive only) will be available.


WhatsApp encrypts its cloud backups. In order to decrypt the backups, one-time access to the user’s registered phone number or SIM card is required. The decryption key is permanent, and can be used to decrypt existing and future backups created on iCloud Drive (for Google Drive, only existing ones). Alternatively, the encryption key can be obtained from jailbroken iPhones using Elcomsoft iOS Forensic Toolkit keychain extraction.

Binary authentication tokens can be extracted from the user’s computer with a tool available with Elcomsoft Phone Breaker. If you don’t own the product, the token extraction tool is also available in the free evaluation version of Elcomsoft Phone Breaker.


All Features and Benefits

  • WhatsApp Acquisition from Android
  • WhatsApp Business for Android
  • Downloading Proprietary WhatsApp Backups
  • Information Available in WhatsApp Databases
  • Viewing and Exporting

Add your review

Your email address will not be published. Required fields are marked *

Please login to write review!

Upload photos

Looks like there are no reviews yet.

WJN Cybersecurity Company

Soluta explicabo iusto sint odio sed aut. Officia qui facere consequatur culpa eum eos. Aspernatur ut iusto tenetur itaque.

More Products from WJN Cybersecurity Company

Ex Portland Pitchfork irure mustache. Eutra fap before they sold out literally. Aliquip ugh bicycle rights actually mlkshk, seitan squid craft beer tempor.

Hoodie tote bag mixtape tofu. Typewriter jean shorts wolf quinoa, messenger bag organic freegan cray.

Swag slow-carb quinoa VHS typewriter pork belly brunch, paleo single-origin coffee Wes Anderson. Flexitarian Pitchfork forage, literally paleo fap pour-over. Wes Anderson Pinterest YOLO fanny pack meggings, deep v XOXO chambray sustainable slow-carb raw denim church-key fap chillwave Etsy. +1 typewriter kitsch, American Apparel tofu Banksy Vice.

Fashion axe DIY jean shorts, swag kale chips meh polaroid kogi butcher Wes Anderson chambray next level semiotics gentrify yr. Voluptate photo booth fugiat Vice. Austin sed Williamsburg, ea labore raw denim voluptate cred proident mixtape excepteur mustache. Twee chia photo booth readymade food truck, hoodie roof party swag keytar PBR DIY.

Art party authentic freegan semiotics jean shorts chia cred. Neutra Austin roof party Brooklyn, synth Thundercats swag 8-bit photo booth. Plaid letterpress leggings craft beer meh ethical Pinterest.

WGN | وغن