• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
webrtcHacks

webrtcHacks

Guides and information for WebRTC developers

  • Home
  • About
    • Chad Hart
    • Philipp Hancke
  • Subscribe
  • Contact
  • Show Search
Hide Search

Blackbox Exploration

Reverse-Engineering apple, Blackbox Exploration, e2ee, FaceTime, ios, wireshark

FaceTime finally faces WebRTC – implementation deep dive

Deep dive analysis on how FaceTime for Web uses WebRTC. Philipp “Fippo” Hancke uses webrtc-internals, Wireshark, and reviews the JavaScript implementation to expose Apple’s implementation details.

Philipp Hancke · June 14, 2021

Reverse-Engineering Azure, Blackbox Exploration, CPaaS, Microsoft, SDP

How does the new Azure Communication Services implement WebRTC? (Gustavo Garcia)

Walkthrough and deep analysis of how Azure Communications Service makes use of WebRTC by Gustavo Garcia

Gustavo Garcia · October 23, 2020

Reverse-Engineering Blackbox Exploration, DataChannel, webassembly, webrtc-nv, websocket, zoom

How Zoom’s web client avoids using WebRTC (DataChannel Update)

Editor’s Note: This post was originally published on October 23, 2018. Zoom recently started using WebRTC’s DataChannels so we have added some new details at the end in the DataChannels section. Zoom has a web client that allows a participant to join meetings without downloading their app. Chris Koehncke was excited to see how this […]

Philipp Hancke · September 8, 2019

Reverse-Engineering Technology Blackbox Exploration, fuzzing, RTCP, SRTCP, WhatsApp

The WhatsApp RTCP exploit – what might have happened?

As you may have heard, Whatsapp discovered a security issue in their client which was actively exploited in the wild. The exploit did not require the target to pick up the call which is really scary. Since there are not many facts to go on, lets do some tea reading… The security advisory issued by […]

Philipp Hancke · May 17, 2019

Reverse-Engineering Blackbox Exploration, SDES, wireshark

Messenger was not forced to wiretap but…

By david drexler – Flickr, CC BY 2.0, Link   Back in August, Reuters reported on a “secret legal fight” between the FBI and Facebook about wiretapping Messenger calls. The Verge as they found our old post about reverse-engineering Messenger from 2015 and had a number of follow-up questions on it for a Messenger wiretapping article they ran. Technical […]

Philipp Hancke · October 1, 2018

Primary Sidebar

  • Sponsored. Become a webtcHacks sponsor

Email Subscription

Subscribe to our mailing list

* indicates required
webrtcHacksguides and information for WebRTC developers

Footer

SITE

  • Post List
  • About
  • Contact

Categories

  • Guide
  • Other
  • Reverse-Engineering
  • Standards
  • Technology

Tags

apple Blackbox Exploration Brief camera Chrome code computer vision DataChannel debug e2ee Edge extension gateway getUserMedia ICE ims insertable streams ios ip leakage janus jitsi kurento MCU Microsoft NAT Opus ORTC Promo Q&A raspberry pi Safari SDES SDP sfu signaling simulcast standards TensorFlow TURN video vp8 Walkthrough Web Audio webrtc-internals wireshark

Follow

  • Twitter
  • YouTube
  • GitHub
  • RSS

webrtcHacks · copyright © 2022