Android encrypted wav file.

Well One of my users encrypted a voice file they made with an App called Tapatalk on their Andriod 2.2 phone and had encryption on it. (They do not know what type they said just standard) They only have the file in a backup of the phone and that phone no longer exists.

Does anyone know how to get the encryption off the file so we can hear the contents again.
dgreenjr26IT DirectorAsked:
Who is Participating?
 
btanConnect With a Mentor Exec ConsultantCommented:
not possible to direct decrypt w/o password unless there is backdoor. prev there is mentioned of issue password store in  plain, so I wonder if that is still valid in this case.
https://support.tapatalk.com/threads/serious-issue-tapatalk-app-saves-passwords-as-plain-text.16507/#post-83505
And it was in past mentioned  the server send base64 encoded password which Base64 cna be decoded easily if there is transaction capture
https://support.tapatalk.com/threads/password-encryption.3665/#post-15653
0
 
HDatabase AdministratorCommented:
I would recommend installing Tapatalk on an android device, copy the encrypted file into the wav file directory. Tapatalk uses password based encryption. So you should be able to decrypt the wave file using the original password in tapatalk.
0
 
dgreenjr26IT DirectorAuthor Commented:
Unfortunately we tried this. The encryption was on the Android not Tapatalk. Any other suggestions?
0
Protect Your Employees from Wi-Fi Threats

As Wi-Fi growth and popularity continues to climb, not everyone understands the risks that come with connecting to public Wi-Fi or even offering Wi-Fi to employees, visitors and guests. Download the resource kit to make sure your safe wherever business takes you!

 
HDatabase AdministratorCommented:
Oh well that's a different story. android uses linux dm-crypt for its standard encryption. This is touching on some Grey-Hat areas. But you will need to find some Brute-force decryption software and run the file through it. May take awhile. The faster the system/hardware/io the faster the decryption will take. I have read articles in the past that linux dm-crypt can be brute-forced decrypted. hint: search google for LUKS...Be careful with these tools. Lots of them are not safe and the websites are not all safe as well.
0
 
btanExec ConsultantCommented:
If you have these files in the link below -brute force may still be viable

http://forensics.spreitzenbarth.de/2012/02/28/cracking-pin-and-password-locks-on-android/

But since the phone is not avail and only encrypted file is left, I am thinking back of Android actual encryption used for the filesystem is 128 AES with CBC and ESSIV:SHA256. The master key is encrypted with 128 bit AES via calls to the openssl library. Disk encryption on Android is based on dm-crypt, which is a kernel feature that works at the block device layer. Not easily to simulate and recover w/o device. Going further the actual work is also done by "cryptfs" with command option such as are checkpw and etc.

http://source.android.com/tech/encryption/android_crypto_implementation.html

Saw some mention of change the password for the encryption but needed root access. The idea is have the UI sends the command "cryptfs changepw "to re-encrypts the disk master key with the new password.

http://code.google.com/p/android/issues/detail?id=29468

Not sure if this is best approach but not seems easy w/o having to get the password or those others file (in first link) to simulate.
0
 
dgreenjr26IT DirectorAuthor Commented:
Thank for all the input. But as it was stated no real good solution here. :-(
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.