Skip to main content

Whatsapp Hacking (Exploit) for learning purpose


Hello everybody,
in this tutorial we will show you how to hack whatsapp account through mac spoofing attack.
First of all the requirements of this procedure are:
1. Mobile Phone Rooted
2. Target's Phone for 5 minutes
3. Busybox and Terminal App installed on your android device
4. Wifi Scanner ( if you can't reach the target's phone for getting his / her mac address through settings )
TUTORIAL
1. Uninstall WhatsApp from your phone or device. You'll install it again at the end of the method, but you'll need to configure it differently, and the easiest way to make sure you'll be able to do that correctly is to completely uninstall it now.
2.
Obtain your target's phone. You'll need it for two different steps throughout the process, but this shouldn't take too long - you should be able to return it before your target starts to miss it.
3. Find your target's phone's Media Access Control (MAC) address. A MAC address is a unique identifier assigned to your phone or other device that essentially serves as its online identity. Find and write down your target's MAC address. It takes the form of six pairs of letters or numbers, separated by colons (01:23:45:67:89:ab).
On an Android, find this in Settings → About phone → Status → Wi-Fi MAC address.
On an iPhone, go to Settings → General → About → Wi-Fi Address.
On a Windows phone, look in Settings → About → More info → MAC address.
On a BlackBerry, go to Options → Device → Device and Status info → WLAN MAC.
4. Find your MAC address using the instructions above. Make sure to save it somewhere secure, as you'll want to change your device back to that address once you're done.
5. Change ("spoof") your phone's MAC address to that of your target. This will allow your phone to pass as your target's, letting you convince WhatsApp that you are your target when you log in.
On an iPhone or other device, install a MAC spoofing app like MacDaddy X or WifiSpoof. Use that to change your MAC address.
On Android, install BusyBox and the Terminal Emulator (apps available for free on Google Play). In the terminal, type "ip link show" to see a list of interfaces. Identify the one that has your MAC address -- for this example, we'll use the eth0 interface. In the terminal emulator, enter "ip link set eth0 address XX:XX:XX:XX:XX:XX" and "ip link set eth0 broadcast XX:XX:XX:XX:XX:XX", where eth0 is the interface you identified and XX:XX:XX:XX:XX:XX is your target's MAC address. To check that you've successfully changed your MAC address, enter "ip link show eth0."
6.
Install and configure WhatsApp on your phone. Enter your target's phone number to set up WhatsApp rather than your own. This will allow you to receive their messages and send messages from their account.
7. Get the confirmation code from your target's phone. This code will be sent to their phone number as part of the WhatsApp configuration process. Access their phone one last time to get that verification code. Enter it into WhatsApp on your phone when prompted, and you're all ready to go.
If you don't want your target to find out about your spoofing, make sure to delete the confirmation code from their phone before they can see it.
8. When you no longer need to access your target's WhatsApp account, change your MAC address back to what it was. Repeat the instructions to change it, but this time change it to your original address rather than your target's. This will restore your phone to how it was originally, which will ensure that there are no future problems with Internet usage or connectivity.
NB: If you can't reach the target's phone to get mac address you can use a WIFI SCANNER. If you can't get the code because you don't have physical access into the victim's phone you can use social engineering and if you want further help just comment below
This is for learning purpose

Comments

Popular posts from this blog

Fake Receipt Generator .PSD Bundle (Bestbuy, Walmart, Gamestop & MORE) | GOOD FOR SE

All files are .PSD, you can open them in Photoshop and get yourself a nice and fast SE with a fake receipt done. I recommend printing it out and take a picture on your desk or print it out, crumple it a bit and scan it to make it look more legit. click to download

what is Wifi Deauther? how to use it?

Wifi Deauther A deauther allows you to  disconnect devices from a WiFi network . Even if you’re not connected to that network. Deauthers take advantage of a  weakness in the 802.11 protocol  which allows the sending of deauthentication frames by unauthorised devices. Deauthers come with other features such as  Beacon Spamming  (spamming WiFi network names) and Probe Spamming Our deauthers are not WiFi Jammers, though they have a similar effect   WiFi Be Gone! Deauthers main purpose is to demonstrate a  flaw in the WiFi protocol (2.4ghz band). Using our deauthers you can select a certain WiFi network, then with a click of a button all devices within range connected to that network will be  disconnected . As long as the attack is still running, no devices within range (2.4ghz) will be able to reconnect to that network. Other features include  Beacon Spamming , this feature will spam a custom list of WiFi network names within range. You can’t actually connect to these ne

How-to Make Your Own Silent Miner [Any Coin] [100% working]

Hey there! This setup is very basic but its still working without problems and you can mine any coin you want. Moreover, your silent miner will be 100 % free and you need just 5 minutes for the setup. https://www.up-4ever.com/oea45lj0z6le --no password-- Have phun! The Jump Start Kit: DOWNLOAD ONLINE   Using Claymore CPU Miner for x64 systems - tested 03/03/2017 (working) https://mega.nz/#!T1...ZtT96bUHhVl702U Just download and extract the rar. Register an account as described in the tutorial above. Now edit "start.bat" and put your email where it says "YOUREMAILHERE". Make a rar archive as described in the tutorial above. Congrats: Your miner is ready! Moreover you can use this Silent Miner Builder (XMR, merged mining works, too): https://mega.nz/#!e1...ZH_J2N3ONWRV6CY It's already available here on nulled.to - I do not take any credits for the crack. I have just packed it to a new r