How to Decrypt WhatsApp crypt7 Database Messages

WhatsApp has once again changed the algorithm to encrypt all the chat history messages saved on the SD card. This new encryption method is denoted by the .crypt7 filename extension.

To decrypt the crypt7 files, you will need two sets of decryption keys – the actual encryption key,K and an initialisation vector called IV . WhatsApp stores the keys in a file that is supposedly kept in a secure location.

Extract Key File

There are two ways to retrieve the file. For the first method, you will need a rooted phone. Using ADB shell, switch to root and copy the file to the SD card.

Once the file has been copied to the SD card, use ADB again to copy it to your computer.

The second method to retrieve the file is to use the ADB backup feature. This requires your phone to be running on at least Android 4. Make a backup of WhatsApp data by running:

This will cause a prompt on your phone as shown below. Click on the “Back up my data” button without providing a password.

adb-backup-prompt

Once the backup has been completed, you will see a file called whatsapp.ab on your computer. The .ab extension stands for Android Backup. To extract files from the file, we will first need to convert it to a tar archive.

Determine the key file location within the tar archive.

The key file is at “apps/com.whatapp/f/key“. Extract the key file and move it to the current working directory.

Verify that the key file is exactly 158 bytes in size.

Extract crypt7 file

Pull the encrypted WhatsApp messages file from your phone using ADB.

Extract Decryption Keys

The encryption method being used is AES with a key length of 256 bits and an initialisation vector size of 128 bits. The 256-bit AES key is saved from offset 0x7E till 0x9D in the file. Offsets start from 0x00. Extract the AES key with hexdump.

The above will give a 64-digit hexadecimal value in ASCII that is actually 256 bits in length.

Next, extract the IV or the initialisation vector.

The above will give a 32-digit hexadecimal value in ASCII that is actually 128 bits in length.

Strip Header in crypt7 File

Before we start the decryption process, we will need to strip the 67 byte header from the crypt7 file.

The above command will strip the the first 67 bytes from the crypt7 file and save it to a file with extension crypt7.nohdr. If you look at the contents of the header, the IV value is actually stored there – between offset 0x33 till 0x42.

The file size of the header stripped file must be divisible by 128 bits or 16 bytes. For example, the size of my output file is 12660752 bytes – a number that is divisible by 16. If the file size is not in multiples of 16 bytes, then most probably your file is corrupted.

Decrypt crypt7 File

Now we have the necessary parameters to decrypt the crypt7.nohdr file using the openssl utility.

Substitute $k and $iv with the AES encryption key and IV values that we retrieved using hexdump earlier. A non encrypted SQLite database file will be generated and saved to a file called msgstore.db.

Related: How to Extract Unencrypted Whatsapp Chat Messages

Related: Extract WhatsApp Password on Android

Related: How to Decrypt WhatsApp crypt8 Database Messages

ibrahim = { interested_in(unix, linux, android, open_source, reverse_engineering); coding(c, shell, php, python, java, javascript, nodejs, react); plays_on(xbox, ps4); linux_desktop_user(true); }