Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Database Decryption Improvements : master issue #64

Open
ppwwyyxx opened this issue Jun 28, 2020 · 1 comment
Open

Database Decryption Improvements : master issue #64

ppwwyyxx opened this issue Jun 28, 2020 · 1 comment

Comments

@ppwwyyxx
Copy link
Owner

ppwwyyxx commented Jun 28, 2020

Different phones / users may experience different failures of decryption. Three directions can improve the decryption success rate:

  1. Implement better ways to obtain UIN.
  1. Implement better ways to obtain IMEI:
  • Currently using "CompatibleInfo" file from wechat. It should probably be the accurate IMEI that wechat uses. If not, please let us know.
  1. Implement/integrate password cracker from https://github.com/chg-hou/EnMicroMsg.db-Password-Cracker

Please comment on this issue only if you have ideas for improvements. Please DO NOT comment in this issue about decryption failures. People who don't have your phone will not know why decryption fails on your phone.

@rom1504
Copy link

rom1504 commented Oct 1, 2023

So one additional idea here is to use Frida, eg #97 , it directly gets the key by hooking into WeChat
A bit more involved but it has the benefit of not depending on the uin nor the IMEI nor the password computation method

Also password cracker python version works fine but is quite slow (ten of hours)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants