HOW TO HACK WHATSAPP ACCOUNT

Carder

Professional
Messages
2,616
Reaction score
2,025
Points
113
N this tutorial we will show you how to hack whatsapp account through mac spoofing attack.

First of all the requirements of this procedure are:

1. Mobile Phone Rooted

2. Target's Phone for 5 minutes

3. Busybox and Terminal App installed on your android device

4. Wifi Scanner ( if you can't reach the target's phone for getting his / her mac address through settings)

TUTORIAL

1. Uninstall WhatsApp from your phone or device. You'll install it again at the end of the method, but you'll need to configure it differently, and the easiest way to make sure you'll be able to do that correctly is to completely uninstall it now.

2. Obtain your target's phone. You'll need it for two different steps throughout the process, but this shouldn't take too long - you should be able to return it before your target starts to miss it.

3. Find your target's phone's Media Access Control (MAC) address. A MAC address is a unique identifier assigned to your phone or other device that essentially serves as its online identity. Find and write down your target's MAC address. It takes the form of six pairs of letters or numbers, separated by colons (01:23:45:67:89:ab).
On an Android, find this in Settings → About phone → Status → Wi-Fi MAC address.
On an iPhone, go to Settings → General → About → Wi-Fi Address.
On a Windows phone, look in Settings → About → More info → MAC address.
On a BlackBerry, go to Options → Device → Device and Status info → WLAN MAC.

4. Find your MAC address using the instructions above. Make sure to save it somewhere secure, as you'll want to change your device back to that address once you're done.

5. Change ("spoof") your phone's MAC address to that of your target. This will allow your phone to pass as your target's, letting you convince WhatsApp that you are your target when you log in.
On an iPhone or other device, install a MAC spoofing app like MacDaddy X or WifiSpoof. Use that to change your MAC address.
On Android, install BusyBox and the Terminal Emulator (apps available for free on Google Play). In the terminal, type "ip link show" to see a list of interfaces. Identify the one that has your MAC address — for this example, we'll use the eth0 interface. In the terminal emulator, enter "ip link set eth0 address XX:XX:XX:XX:XX:XX" and "ip link set eth0 broadcast XX:XX:XX:XX:XX:XX", where eth0 is the interface you identified and XX:XX:XX:XX:XX:XX is your target's MAC address. To check that you've successfully changed your MAC address, enter "ip link show eth0."

6. Install and configure WhatsApp on your phone. Enter your target's phone number to set up WhatsApp rather than your own. This will allow you to receive their messages and send messages from their account.

7. Get the confirmation code from your target's phone. This code will be sent to their phone number as part of the WhatsApp configuration process. Access their phone one last time to get that verification code. Enter it into WhatsApp on your phone when prompted, and you're all ready to go.
If you don't want your target to find out about your spoofing, make sure to delete the confirmation code from their phone before they can see it.

8. When you no longer need to access your target's WhatsApp account, change your MAC address back to what it was. Repeat the instructions to change it, but this time change it to your original address rather than your target's. This will restore your phone to how it was originally, which will ensure that there are no future problems with Internet usage or connectivity.

NB: If you can't reach the target's phone to get mac address you can use a WIFI SCANNER. If you can't get the code because you don't have physical access into the victim's phone you can use social engineering and if you want further help send us a PM.
 
HOW TO HACK A WHATSAPP ACCOUNT

1. Your phone must be rooted

2. If you can get access to the victims phone go to settings>>about phone>>You'll see A address write it down somewhere

3. Go to settings and write your WIFI-MAC address cause you'll need it after

4. Spoof you WIFI-MAC address, change it to the one of the victims so you and the victim will have the Same MAC-address, I'll send instructions on how to spoof it

5. After you've done that uninstall whatsapp

6. Install it again and set it up after that every message the victim receives after you get all the information you need uninstall whatsapp and spoof your MAC address to your original one and install whatsapp again.
 
Bypass WhatsApp blocking

Good day! Many of those who work through WhatsApp have encountered blockages in the course of their activities. Bans in WhatsApp are distributed in the following way: a ban is placed on an account linked to Gmail, sometimes it can fly by IP, but the usual blocking works according to the first and second principles. Phone numbers, however, do not matter.

How should we proceed:

1. When you receive such a lock, you need to delete all Gmail accounts from your smartphone, clear the cache and phone memory.
2. Once you have done all this, download WhatsApp again, but from a different account. Register from any number, after which, leave the account without activity for 3-4 hours.
3. Next, we write some messages to our clients in trade (or whatever you are doing there) in the amount of 6-7 pieces, after which we again forget about the account for an hour or two.
4. This should be done about 1-3 times a day. After all these manipulations, you can again write to at least 100 people with your suggestions and you will not catch a ban.

When using WhatsApp from a PC, you need to download Google Chrome Portable and log into it with a VPN. This is necessary so that when you receive a ban, after clearing the cache and entering WhatsApp, you do not get the ban again.
 
Hacking WhatsApp 2021
This method works only with the Web client.
First, the hacker creates a malicious html file with a preview image:
8d4f4c19b5128a12e357d.png


The WhatsApp web client stores the allowed document types in the client variable W ["default"]. DOC_MIMES This variable stores valid Mime types used by the application.
c3236771698bd75be5273.png


Since the encrypted version of the document is sent to WhatsApp's servers, you can add a new Mime type to this variable, such as "text / html", to bypass the client's restriction and download a malicious HTML document.
9f4225d5ecb7d38c4a356.png


After adding the URL of the malicious document to the client variable, the client encrypts the contents of the file using the encryptE2Media function, and then uploads it encrypted as a BLOB to the WhatsApp server
c3a09341ecfc7b0b86a40.png

Moreover, changing the document name and extension and creating a fake preview by changing client variables will make the malicious document more attractive to the victim.
This is the result:
ff01de39f5b50c53a9f5d.png


As soon as the victim clicks on the file, they will see a funny cat under the blob object, which is an html5 FileReader object under web.whatsapp.com. This means that a hacker can access resources in the browser under web.whatsapp.com
8ec9476699d48ba58c6fb.png


By simply viewing the page without clicking on anything, the victim's local storage data will be sent to the hacker, allowing them to take over their account.
The hacker creates a JavaScript function that checks every 2 seconds if there is new data in the backend, and replaces it with local storage for the victim.
Part of the hacker's code:
d3894fe29ea0e0193df0e.png


The hacker will be redirected to the victim's account and will be able to access it.
0046c2e4fd0c7a5ce0be0.png


The WhatsApp website does not allow a client to have more than one active session at a time, so after a hacker steals the victim's account, the victim will receive the following message:
7d0c14790b42e2c31e3d5.png


You can redo this code by adding JavaScript code like this:
66b135def6294cf01dd15.png


Malicious HTML file that will cause the client's browser window to get stuck and allow the hacker to manage the account without interference, although the hacker will be connected to the victim's account until the victim logs in to the account. Closing the browser will not log the hacker out of the account, and the hacker will be able to log in to the user's account for as long as they want.
 
Top