WhatsApp Hacking Tool - Abhishek Shukla

Abhishek Shukla is a Network about Hacker News, Tech News & Tech Hacks - 2018 Latest & Viral Tech News, Hacker News and Hacking Tricks About Technology. & Kali Linux Tutorials

Top Ad

test banner

Post Top Ad

Responsive Ads Here

WhatsApp Hacking Tool

Share This
WhatsApp Hacking Tool: Hackers Can Hijack your WhatsApp Account With its Web Version
The Security Vulnerability can allow WhatsApp web clients to roll out your account. WhatsApp use end to end encryption to keep more security. Encryption has designed to ensure you to communicate and read the messages one to one. No one else can read messages between them.
WhatsApp online version is using for send and receive WhatsApp messages right from your computer. But if there is any vulnerability and if exploited would have allowed Cyber attackers to take over your whatsapp account from browser and access victim personal messages, group conversation, contact list, doc files, photos, videos and more things. It means that attacker could download private photos, read messages.

Technical Research:

CheckPoint research team has researched and managed to bypass the mechanism’s restrictions by uploading a malicious HTML document with a legitimate preview of an image in order to fool a victim to click on the document in order to takeover his account.
The attack on WhatsApp consists of several stages as mentioned below.
First, the attacker crafts a malicious html file with a preview image:
WhatsApp Research
WhatsApp web client stores the allowed document types in a client variable called W[“default”].DOC_MIMES this variable stores the allowed Mime Types used by the application.
WhatsApp Research
Since an encrypted version of the document is sent to WhatsApp servers it is possible to add new Mime type such as “text/html” to the variable in order to bypass the client restriction and upload a malicious HTML document.
Whats App Research
After adding the malicious document Mime Type to the client variable, the client encrypts the file content by using the encryptE2Media function and then uploads it encrypted as BLOB to WhatsApp server.
WhatsApp Research
Moreover, changing the document name and extension and creating a fake preview by modifying the client variables will make the malicious document more attractive and legitimate to the victim.
This is the result:
WhatsApp Research
Once he clicks on the file, the victim will see a funny cat under blob object which is an html5 FileReader object under web.whatsapp.com. That means the attacker can access the resources in the browser under web.whatsapp.com
WhatsApp Research
Just by viewing the page, without clicking on anything, the victim’s Local storage data will be sent to the attacker, allowing him to take over his account.
The attacker creates a JavaScript function that will check every 2 seconds if there is new data in the backend, and replace his local storage to the victim.

Part of attacker’s code:

WhatsApp Research
The attacker will be redirected to the victim’s account, and will be able to access anything in it.
WhatsApp Research
WhatsApp web does not allow a client to have more than one active session at a time so after the attacker steal the victim account the victim will receive the following message:
WhatsApp Research
It is possible to overcome this situation from the attacker perspective by adding a JavaScript code like this:
WhatsApp Research
The malicious HTML file that will cause the client browser window to get stuck and allow the attacker to control the account without interference, although the attacker will be connected to victim account until the victim will log from the account. Closing the browser wills not logout the attacker from the account and the attacker will be able to login to user account as long as he wants.

No comments:

Post a Comment

Post Bottom Ad

Responsive Ads Here

Pages