Best Black Hat Forum

Full Version: WHATSAPP HACKING USING MITM ATTACK
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
[hide]
WhatsTrapp uses a Man In the Middle (MITM) attack to establish a session with the WhatsApp's target: once the session has been established, actions for retrieving and collecting the data are executed in the browser context by using the very same WhatsApp Web's APIs (thank to a bit of reverse engineering).

[Image: proxy.php?image=https%3A%2F%2Fi.ibb.co%2...rn_error=1]
IMG-20200515-WA0011
Image IMG-20200515-WA0011 hosted in ImgBB
[img=12x0]https://altenen.is/proxy.php?image=https%3A%2F%2Fsimgbb.com%2Fimages%2Ffavicon.png&hash=d38d5d16b4a227924e4e53b359036e84&return_error=1[/img] ibb.co


REQUIREMENTS :

Docker
Docker Compose

git clone github.com/Wicker25/whatstrapp.git

1) $ cd whatstrapp/

2) Launch the WhatsTrapp server with:

$ docker-compose up
Then open your browser at http://127.0.0.1:8025/ and wait until the QR code has been loaded.

3) Launch the target's WhatsApp and, from the main menu, select "WhatsApp Web

4) If you are trying to use WhatsTrapp on a GNU/Linux operating system you might need to increase the kernel parameter max_map_count by running:

# sysctl -w vm.max_map_count=262144



[/hide]