Security Audit

Our Web Application Pentest ( WAP) attempts to address the Owasp top 10 & SANS top 20 web application vulnerabilities and other exploitable loopholes of your web application . Along with it our WAP team also test web applications for Business logic flaws that can directly or indirectly effect the functioning of application.


We are here to help you solve your biggest query- where and how to start? CDI has brought various courses in Ethical Hacking in Chandigarh where all you technology lovers will be given the much needed push to move forward and create a niche for yourself in the field. From Beginner to Expert level we have many kinds of training patterns.

Call Us : +91-771045-0011 | +91-771045-0022

Whatsapp collects metadata of users!                


After conducting a research, a group of experts told that through the forensic study of WhatsApp, metadata of user’s could be gathered. Phone numbers, call durations and other data is included in it.

At the University of New Haven (F. Karpisek of Brno University of Technology in the Czech Republic) researchers conduct a research. Ibrahim Baggili and Frank Breitinger are two researchers which are the co-directors of the Cyber Forensics Research & Education Group. They are worried for the large community of whatsApp users. After research they indicate that the popular messaging service whatsApp collects data like phone numbers, call duration and other private information of the users.

Mr. Ibrahim Baggili said, “Our motive behind this search was to demonstrate the type of data, which could be gathered through forensic study of whatsapp application. He also said that we want to give a path to the technical guys to conduct the additional study into the network forensic of messaging apps.

According to the researchers it is clear that whatsapp implements a protocol named FunXMPP (Extensible messaging and presence protocol).This protocol is used for exchanging the structured data. Researchers were able to view exchanged data with the help of custom made command-line tool, after decrypting the connection between whatsapp client ad servers.

Also read: How Online Sales Scams are Happening!

During a whatsApp call the team has focused on analysis of the signalling messages exchanged established with an Android device. The experts uncovered the codec used by whatsApp after study the authentication process of it. This codec was used for voice media streams, the Opus at 8 or 16 kHz sampling rates. The researcher’s analysis the traffic to find the signals transfers between the clients and servers during a call. Data includes phone numbers, phone call establishment metadata, phone call duration metadata and date-time stamps.

They also explains how whatsApp clients announce their endpoint addresses, for the media streaming, along with the relay server IP addresses during the calls.

Leave a Reply

Email id
Contact No

See more of Cyber Intelligence by logging in.
Connect with cyber security experts,Discover job opportunities,Online Training, Information Security Advisory and lot more.