How to hack whats app using MITM attack
WhatsTrapp uses a Man In the Middle (MITM) attack to establish a session with the WhatsApp’s target: once the session has been established, actions for retrieving and collecting the data are executed in the browser context by using the very same WhatsApp Web’s APIs (thank to a bit of reverse engineering).
- Docker Compose
- git clone github.com/Wicker25/whatstrapp.git
$ cd whatstrapp/
Launch the WhatsTrapp server with:
$ docker-compose up
Then open your browser at http://127.0.0.1:8025/ and wait until the QR code has been loaded.
Launch the target’s WhatsApp and, from the main menu, select “WhatsApp Web”
If you are trying to use WhatsTrapp on a GNU/Linux operating system you might need to increase the kernel parameter max_map_count by running:
#sysctl -w vm.max_map_count=262144
Educational Purpose Only