bobsyouruncle6661
OSINT Instructor
2
MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1
400 XP
▪WhatsApp - Generate Payload for CVE-2019-11932▪
Auto install GCC (no harm command, you can see this is open-source)
Saving to .GIF file
sudo apt install git
Tool link
cd WhatsRCE && bash start.sh
or Watch Video -
▪How Get Shell ?
You just send the .GIF file to victim user AS A DOCUMENT NOT IMAGES
And set the nc / netcat to port you set on the WhatsRCE tools {nc -lnvp your_port}
You can use the Social Engineering attack so that victims can be attracted to launch this exploit
tell the victim to open the gallery via whatsapp and send the victim to send any photos (no need, it's just got to the gallery no problem) after that a few seconds later you will receive a shell connection from the victim
How To Avoid This Attack?
Update your whatsapp to the latest version (Patched on Version 2.19.244)
how to receive any file including audio images and others from people we don't know
Auto install GCC (no harm command, you can see this is open-source)
Saving to .GIF file
sudo apt install git
Tool link
You must upgrade your account or reply in the thread to view hidden text.
cd WhatsRCE && bash start.sh
or Watch Video -
You must upgrade your account or reply in the thread to view hidden text.
▪How Get Shell ?
You just send the .GIF file to victim user AS A DOCUMENT NOT IMAGES
And set the nc / netcat to port you set on the WhatsRCE tools {nc -lnvp your_port}
You can use the Social Engineering attack so that victims can be attracted to launch this exploit
tell the victim to open the gallery via whatsapp and send the victim to send any photos (no need, it's just got to the gallery no problem) after that a few seconds later you will receive a shell connection from the victim
How To Avoid This Attack?
Update your whatsapp to the latest version (Patched on Version 2.19.244)
how to receive any file including audio images and others from people we don't know