Decrypting Threema4.db

I was recently approached with a device that had the Threema application on and they wanted to extract the messages for it. The usual mobile forensics tools had failed to extract this information. TLDR: Extract the master_key.dat from the apps “files” folderConvert the file to a hex stringDecode it as a protobuf file using https://protobuf-decoder.netlify.app/ExtractContinue reading “Decrypting Threema4.db”

Decrypting Mega’s megaprefences Sqlite Database

It seems like almost and age since I last published anything on here, I’d like to say its due to a global pandemic causing issues, but mostly its just due to amount of work and a lack of interesting problems to solve for a little while. Luckily this all changed yesterday…… Background One of myContinue reading “Decrypting Mega’s megaprefences Sqlite Database”