Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 243
  • Last Modified:

Android encrypted wav file.

Well One of my users encrypted a voice file they made with an App called Tapatalk on their Andriod 2.2 phone and had encryption on it. (They do not know what type they said just standard) They only have the file in a backup of the phone and that phone no longer exists.

Does anyone know how to get the encryption off the file so we can hear the contents again.
0
dgreenjr26
Asked:
dgreenjr26
  • 2
  • 2
  • 2
1 Solution
 
HDatabase AdministratorCommented:
I would recommend installing Tapatalk on an android device, copy the encrypted file into the wav file directory. Tapatalk uses password based encryption. So you should be able to decrypt the wave file using the original password in tapatalk.
0
 
dgreenjr26IT DirectorAuthor Commented:
Unfortunately we tried this. The encryption was on the Android not Tapatalk. Any other suggestions?
0
 
HDatabase AdministratorCommented:
Oh well that's a different story. android uses linux dm-crypt for its standard encryption. This is touching on some Grey-Hat areas. But you will need to find some Brute-force decryption software and run the file through it. May take awhile. The faster the system/hardware/io the faster the decryption will take. I have read articles in the past that linux dm-crypt can be brute-forced decrypted. hint: search google for LUKS...Be careful with these tools. Lots of them are not safe and the websites are not all safe as well.
0
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
btanExec ConsultantCommented:
If you have these files in the link below -brute force may still be viable

http://forensics.spreitzenbarth.de/2012/02/28/cracking-pin-and-password-locks-on-android/

But since the phone is not avail and only encrypted file is left, I am thinking back of Android actual encryption used for the filesystem is 128 AES with CBC and ESSIV:SHA256. The master key is encrypted with 128 bit AES via calls to the openssl library. Disk encryption on Android is based on dm-crypt, which is a kernel feature that works at the block device layer. Not easily to simulate and recover w/o device. Going further the actual work is also done by "cryptfs" with command option such as are checkpw and etc.

http://source.android.com/tech/encryption/android_crypto_implementation.html

Saw some mention of change the password for the encryption but needed root access. The idea is have the UI sends the command "cryptfs changepw "to re-encrypts the disk master key with the new password.

http://code.google.com/p/android/issues/detail?id=29468

Not sure if this is best approach but not seems easy w/o having to get the password or those others file (in first link) to simulate.
0
 
dgreenjr26IT DirectorAuthor Commented:
Thank for all the input. But as it was stated no real good solution here. :-(
0
 
btanExec ConsultantCommented:
not possible to direct decrypt w/o password unless there is backdoor. prev there is mentioned of issue password store in  plain, so I wonder if that is still valid in this case.
https://support.tapatalk.com/threads/serious-issue-tapatalk-app-saves-passwords-as-plain-text.16507/#post-83505
And it was in past mentioned  the server send base64 encoded password which Base64 cna be decoded easily if there is transaction capture
https://support.tapatalk.com/threads/password-encryption.3665/#post-15653
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

  • 2
  • 2
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now