Skip to main content

HOW TO HACK A WHATSAPP ACCOUNT

 MAC Spoofing

Media Access Control address (MAC address) is a 12-character unique identifier assigned to the network adapter of your WiFi device. A MAC address can be used to uniquely identify the smartphone of your friend whom you want to hack the Whatsapp account on the Internet or the local network.
If you want to access the WhatsApp account of your friend, you need to find the MAC address of their account. Follow the below steps in order to hack your friend’s account.
Step 1: Uninstall Whatsapp Account from your device
Uninstall-whatsapp
  • Initially, you must uninstall your Whatsapp account from your device.
  • Don’t worry! Your account can be reinstalled and configured at the end of your Hacking process.
  • Be Careful! Make sure that your Whatsapp account on your mobile device is completely uninstalled successfully.
Step 2: Acquire the smartphone of the target (victim) that you wish to Hack
  • Get the mobile phone of the victim that you desire to access. Though it is a bit rugged, try to acquire the mobile phone of the victim.
  • The victim’s mobile phone will be essential at two variant steps throughout the hacking process.
  • Be cautious while using the victim’s phone. Don’t take much time and try to place it back before the victim starts to locate the device.
Step 3: Locate the MAC (Media Access Control) Address from the Target’s Phone
Hack-others-Whatsapp-Account
  • A MAC address is a 12-character unique identifier assigned to the mobile device which can be served as its online identity.
  • A MAC address varies from one device to other. So, find the platform of the smartphone that is used by the victim.
  • A MAC address consists of six pairs of digits that are separated by colons. For Example, it looks like (01:53:35:47:78: cb).
         Smartphone Platform: How to find MAC Address?
    Android : Settings >> About Phone >> Status >> Wi- Fi MAC address
    iPhone : Settings >> General >> About >> Wi-Fi Address.
    Windows Phone : Settings >> About >> More info >> MAC Address.
    BlackBerry : Options >> Device >> Device and Status Info >> WLAN MAC
Step 4: Find the MAC address of your own Mobile Phone
  • Get the MAC address of your Mobile device and save and ensure that you store it in a secure manner.
  • Again, you’ll require your MAC address to use your mobile device after completion of your hacking process.
Step 5: Alter [Spoof] your MAC address similar to the victim’s MAC address
  • Spoofing the MAC address allows your mobile device look similar as victim’s device.
  • By spoofing there is an advantage of letting you persuade Whatsapp that you are logging into your own account.
  • But, truly you are trying to log in into the victim’s Whatsapp account.
Step 6: Install variant spoofing apps depending on the victim’s mobile device.
                   Device                         :               Spoofing App
   iPhone (or) other device     :           MacDaddy X or WifiSpoof.
–>Use this app to change your MAC address.
     Android                                     :           BusyBox, Terminal Emulator
–>Both these apps are available for free on Google Play.
  • In the terminal, type “ip link show” and you can view a list of interfaces.
  • Identify the one that has your MAC address.
Example:
Assume we’ll use the eth0 interface. In the terminal emulator, enter “ip link set eth0 address XX:XX:XX:XX:XX:XX” and “ip link set eth0 broadcast XX:XX:XX:XX:XX:XX”, where eth0 is the interface you identified and XX:XX:XX:XX:XX:XX is your target’s MAC address. In order to verify that you’ve changed your MAC address successfully, enter “ip link show eth0.”
open-whatsapp-messengerStep 7: Re-Install and configure WhatsApp account on your Device















  • After installing and configuring Whatsapp account on your device, you access the victim’s whatsapp account.
  • Enter the victim’s phone number so as to set up WhatsApp rather than your own.
  • This allows you to receive and send messages from the victim’s account.
Step 8: Attain Confirmation Code from the victim’s mobile phone
Verify-the-targets-number
  • During the WhatsApp configuration process, the confirmation code will be sent to the victim’s phone number.
  • Access the victim’s phone for the last time to acquire that verification code.
  • Enter it into WhatsApp that is on your phone.
  • Finally, you have successfully hacked the Whatsapp account of your target.
  • If you don’t wish the victim to detect about your spoofing, make sure to delete the confirmation code from their device.
Step 9: Change your MAC address as earlier after successfully accessing the victim’s mobile.
Alter-the-MAC-Address
  • Similarly, repeat the instructions to change the MAC address, but you need to change it to your original address rather than the victim’s MAC address.
  • Now, your mobile will be restored to its original position and ensures that there are no future problems with Internet usage or connectivity issues.

Comments

Popular posts from this blog

IMPORTANCE AND ADVANTAGES OF SIWES

STUDENTS INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES) The Industrial Training/Students Industrial Work Experience Scheme, IT/SIWES is a new Directorate under the Vice-Chancellor’s Office.  It was established on 20th April, 2012 The Students Industrial Work Experience Scheme (SIWES) is a skills training programme designed to expose and prepare students of universities and other tertiary institutions for the Industrial Work situation they are likely to meet after graduation.  It is also a planned and structured programme based on stated and specific career objectives which are geared towards developing the occupational competencies of participants (Mafe, 2009).  Consequently, the SIWES programme is a compulsory graduation requirement for all Nigerian university students offering certain courses. The Students Industrial Work Experience Scheme (SIWES), is the accepted training programme, which

How to Reset HP Elitebook 8460p BIOS/Administrator Password

Have you  forgotten HP Elitebook 8460p password , bios or administrator account password? How to do if both of them lost? It seems hard though there may be lots of ways that can solve it. But if we talk about it separately, such as in two parts,  HP elitebook password reset  would be not so difficult. Part 1: Reset HP Elitebook 8460p BIOS password Part 2: HP Elitebook 8460p Administrator password recovery Part 1: How to Reset Forgotten HP Elitebook BIOS Password? Generally, there are two ways to  reset forgotten BIOS password .  One  is forcing BIOS/CMOS to reset itself to its stored defaults by removing all power from it.  The other  is to use a program to either locate or identify the password, and reveal it to you or erasing the password clearly. And the most easiest and convenient method for erasing dynamic BIOS/CMOS settings is to remove battery directly from the motherboard. However, it applies to most motherboards besides HP Elitebook BIOS. Fortunately, HP Eliteb

Ethical Hacking - TCP/IP Hijacking

TCP/IP Hijacking is when an authorized user gains access to a genuine network connection of another user. It is done in order to bypass the password authentication which is normally the start of a session. In theory, a TCP/IP connection is established as shown below − To hijack this connection, there are two possibilities − Find the seq which is a number that increases by 1, but there is no chance to predict it. The second possibility is to use the Man-in-the-Middle attack which, in simple words, is a type of network sniffing . For sniffing, we use tools like Wireshark or Ethercap . Example An attacker monitors the data transmission over a network and discovers the IP’s of two devices that participate in a connection. When the hacker discovers the IP of one of the users, he can put down the connection of the other user by DoS attack and then resume communication by spoofing the IP of the disconnected user. Shijack In practice, one of the best TCP/IP hijack too