Hack WhatsApp using Meterpreter in Kali Linux.

Today I will tell you how we can hack anyone’s Whatsapp account using the meterpreter Android Payload, we run this process on our local network, and you can try this method over the internet, but you need a static IP address and the second option is using third party tool. But today we run the process on our local network

  1. Hiddeneye Install in Termux
  2. hack Facebook account Facebook Phishing
  3. Whatsapp Hacking App 2021
  4. Hack Gmail Password Phishing 2021
  5. Hack WhatsApp using Meterpreter in Kali Linux

Let’s open your Kali Linux Terminal and run the ifconfig command for checking our local machine IP address.

Now we have our local machine IP address, in my case my local machine IP is 192.168.1.23, in your case your IP address is different, After get the machine IP we need to create a msfvenom Android Payload let’s run this command for creating android reverse Payload.

Hack WhatsApp using Meterpreter

After hitting the Enter keyboard button our payload is successfully generated now we need to start our Metasploit payload listener run the msfconsole command.

Hack WhatsApp using Meterpreter

Our Metasploit framework is stated let’s load the android meterpreter reverse payload using the multi-hander exploit.

Hack WhatsApp using Meterpreter

Now set your local machine IP address, After set the lhost IP address I direct exploit the payload, if you use a different port for your payload you need to change your lport you can change your lport using the set lport <> command.

Hack WhatsApp using Meterpreter

Now our reverse TCP hander is stated let’s send the payload to your target mobile and run the payload on the target mobile.

After opening the android payload we will get a meterpreter session as we can see them in the picture.

Hack WhatsApp using Meterpreter

After getting a session we can run any Linux command let’s change our current working directory using this command.

Now we are inside the target mobile phone again we change our directory sdcard to WhatsApp Directory.

here we can see our target mobile Whatsapp Files and directory let’s move to the Media directory.

After coming to the media folder, we can see the ALL media folder now I’m going to download our target Whatsapp images again change the directory using this command.

You can see here your target Whatsapp image you can use the ls command for listing all images and you can download any image file using the download command.

  1. Hack WhatsApp using Meterpreter in Kali Linux.
  2. Types of Penetration Testing
  3. MacChanger in Kali Linux
  4. Use of FTK Imager Forensic Tool
  5. Linux Lostat Command

19 thoughts on “Hack WhatsApp using Meterpreter in Kali Linux.”

  1. I got this site from my pal who shared with me about this
    web page and now this time I am visiting this site and reading very informative
    articles at this time.

  2. How can i push this virus on my phone i haven’t found virus what is the location of this virus where this whatsapp.apk saved ?

  3. Hello to every body, it’s my first pay a visit of this website;
    this web site contains awesome and actually fine material for readers.

  4. After doing all this when i use exploit command so this message appears Exploit failed: One or more options failed to validate: LHOST.

  5. Hi, I think your website might be having browser compatibility issues. When I look at your website in Opera,
    it looks fine but when opening in Internet Explorer, it has some overlapping.
    I just wanted to give you a quick heads up! Other than that, awesome blog!

  6. Hey There. I discovered your blog the use of msn. This is
    an extremely well written article. I’ll be sure to bookmark it and return to
    learn extra of your useful information. Thanks for the post.
    I will certainly return.

  7. i tried on my own phone. now please tell me what is the procedure to remove SING IN-TO NETWORK sign whenever opening mobile network data

  8. Hi,

    This part is missing from the instructions:
    * let’s send the payload in your target mobile and run the payload on target mobile.*

    Can you add it please?

  9. Wow, marvelous blog structure! How long have you been running a blog for? you made blogging look easy. The entire look of your website is excellent, let alone the content material!!

Comments are closed.