Wasn’t any time left to research this further. Decoding this stream has not been a priority within this project and there This functionality uses some specialized tcp-based protocol to connect to the serverĪnd exchange messages. Here we select only the UDP packets with the destination port for the Viber service so it is onlyīesides the voice calls that Viber enables the user to make, it also allows them to send and receive Voice stream using the following command: tshark -r long-call.pcap -w long-call-oneway.pcap udp.dstport = 5243
This seemed like a good starting point to get some results so we filtered the data to get a one way
pcap files to analyse the Viber data traffic: The use of both TCP and UDP is confirmed in Viber Communication Security unscramble the scrambled Contents, which used tcpdump to generate. The RTP stream of the audio or audio/video call is converted to SRTP and encrypted via Salsa20 algorithm using the session key. RTP is mostly implemented on UDP as it is a real time protocol. Viber uses RTP (and SRTP when encrypted). Viber is using UPD and not TCP for VoIP traffic. User data (phone numbers, contact information) is not protected, and hence Viber have access to mobile numbers and contacts names & mobile numbers.