Tuesday 23 June 2015

Hack Whats app Account Tutorial 



All you need is to get access to victim phone to get the victims phone “MAC address along with the verifying massage” which is acquired to verify your device.

Get mac address on your android phone.
Finding MAC address on an Android Phones
On your phone’s home screen, click on menu, then go to setting.

 
Click on about phone.
Click on the status.
And then view your Wi-Fi MAC address.
As soon the message is received Push the MAC address as well as Verifying code to your server or mail it your ID. That banks on your convince.
Cheat your phone’s MAC address to the Victims address and install whatsapp and after that type the verify code.

 
And now its done. You get full access to the victim’s whatsapp ID. So now you can keep spying/watching your victim’s movements.

 
That means you and the victim is using the same ID from different devices.

 
Whatsapp hack to use it by not using your number
This hack works by cheating the Whatsapp Verification Servers by sending a spoofed request for an authorisation code expected for a different phone.
Install Whatsapp on your device. Whatsapp now opens a counter where it sends a verification message to its servers.

 
Block the message service – it can be blocked by changing the message centre number or turning the phone into Airplane mode.


Whatsapp now gives a substitute method of verification – Select verify through SMS and fill in your email address. Once you click to send the SMS press cancel to abort the call for authorisation to the Whatsapp server.

Now you have to do sms Spoofing.
Examine your outbox and copy the message details into the spoofer application and send the spoofed verification.


You will now receive messages expected for the spoofed number on your mobile device and you can communicate with people under the spoofed number.


Note:- This information has been shared to create awareness among people regarding the “Ways to Hack Whatsapp” so that you can protect yourself from getting hacked. In no way do we promote misusing of the information. 
for technical aspects please take a second to share the post on your time-line... 

No comments:

Post a Comment