WhatsApp - Generate Payload for CVE-2019-11932

Auto install GCC (no harm command, you can see this is open-source)
Saving to .GIF file

sudo apt install git
Tool link https://gplinks.co/2WuR0zQC

cd WhatsRCE && bash start.sh

or Watch Video
https://gplinks.co/HWJVPZ

▪How Get Shell ?

You just send the .GIF file to victim user AS A DOCUMENT NOT IMAGES
And set the nc / netcat to port you set on the WhatsRCE tools {nc -lnvp your_port}
You can use the Social Engineering attack so that victims can be attracted to launch this exploit
tell the victim to open the gallery via whatsapp and send the victim to send any photos (no need, it's just got to the gallery no problem) after that a few seconds later you will receive a shell connection from the victim

How To Avoid This Attack?
Update your whatsapp to the latest version (Patched on Version 2.19.244)





Enjoy! Follow us for more...

No comments:

Post a Comment

What is Prototype content functions in JavaScript Framework Programming.mp4

  Download now Enjoy! Follow us for more...