kaiko
De-Anonymization Specialist
2
MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1
200 XP
https://cdn.jsdelivr.net/joypixels/assets/6.6/png/unicode/64/1f4f2.pngINSTALLATION TOOL
Code:
git clone
cd ohmyqr/
bash ohmyqr.sh
sudo apt-get install scrot
sudo apt-get install xdotool
bash ohmyqr.sh
https://cdn.jsdelivr.net/joypixels/assets/6.6/png/unicode/64/1f916.pngQuick execution for Whatsapp session theft.
- Option 1 to start the Ngrok server
- Select website to duplicate or press ENTER to default WhatsApp and start PHP and Ngrok server and then it will generate a ngrok link (camouflage this link by shortener)
- Press Enter to start WhatsApp Web on your attacking machine
- It will launch web.whatsapp.com in Firefox browser in fullscreen mode on the attacker machine
- Send the ngrok link to the victim
- When the victim opens the malicious link in the browser, it will display the same WhatsApp Web QR code that is reaching the attacking machine
- In the screenshot below, the attacking screen is shown on the right, while on the left is the victim's machine
Code:
git clone
You must upgrade your account or reply in the thread to view the hidden content.
bash ohmyqr.sh
sudo apt-get install scrot
sudo apt-get install xdotool
bash ohmyqr.sh
https://cdn.jsdelivr.net/joypixels/assets/6.6/png/unicode/64/1f916.pngQuick execution for Whatsapp session theft.
- Option 1 to start the Ngrok server
- Select website to duplicate or press ENTER to default WhatsApp and start PHP and Ngrok server and then it will generate a ngrok link (camouflage this link by shortener)
- Press Enter to start WhatsApp Web on your attacking machine
- It will launch web.whatsapp.com in Firefox browser in fullscreen mode on the attacker machine
- Send the ngrok link to the victim
- When the victim opens the malicious link in the browser, it will display the same WhatsApp Web QR code that is reaching the attacking machine
- In the screenshot below, the attacking screen is shown on the right, while on the left is the victim's machine