Database Decryption Improvements : master issue
ppwwyyxx opened this issue · comments
Different phones / users may experience different failures of decryption. Three directions can improve the decryption success rate:
- Implement better ways to obtain UIN.
- A few methods currently implemented are in https://github.com/ppwwyyxx/wechat-dump/blob/master/decrypt-db.py. Maybe there are other methods to try as well.
- Handle phones with multiple UIN. Currently, only the first UIN in XML file is returned.
echo -n mm$UIN | md5sum
is the directory name. This can be used.
- Implement better ways to obtain IMEI:
- Currently using "CompatibleInfo" file from wechat. It should probably be the accurate IMEI that wechat uses. If not, please let us know.
- Implement/integrate password cracker from https://github.com/chg-hou/EnMicroMsg.db-Password-Cracker
Please comment on this issue only if you have ideas for improvements. Please DO NOT comment in this issue about decryption failures. People who don't have your phone will not know why decryption fails on your phone.
So one additional idea here is to use Frida, eg #97 , it directly gets the key by hooking into WeChat
A bit more involved but it has the benefit of not depending on the uin nor the IMEI nor the password computation method
Also password cracker python version works fine but is quite slow (ten of hours)