WhatsApp Sniffer: program description and how to protect yourself. Easy Hack: How to find potential vulnerabilities and hardcoded data of Android application Where to download and how to install

  1. Remember that when you install a third-party application, you yourself are responsible for the consequences!
  2. Reading someone else’s correspondence, you violate his rights, and criminal liability is provided for this!
  3. This instruction only gives information about how attackers read someone else’s correspondence, but in no case calls you to this action.

What is a sniffer? In thieves' jargon, these words mean a person who can open the safe with anything, even the rustiest pin. Let's figure out why you need such an application as WhatsApp Sniffer, for a computer and phone, which, by the way, can be downloaded from our website.

Why is it necessary

This utility was created in special classified laboratories in America - at least so say the developers. Using the sniffer, you can easily hack into any account in Votsap and get access to all the secrets of correspondence of the desired person. Of course, you download the program at your own peril and risk, no one is responsible for its bugs and other possible unpleasant moments.

So, assuring the developers, the sniffer allows you to:

  • completely take over the accounts of the “victim”, as if this is your personal account in Votsap;
  • read all user messages;
  • send messages to friends of the user on his behalf;
  • change the photo on the avatar;
  • change status;
  • send files and receive them.

How does it work

The utility works only on Android. The developers also assure us that this application is completely safe for the phone.

So, the essence of the sniffer is the following: each phone has its own original MAC-code, which the utility copies and, thus, the program thinks that it was accessed from a familiar smartphone or another gadget. The sniffer can copy the MAC code in three ways:

  • SMS They sent a special SMS to the victim with a link. When the victim opens the link, the sniffer will penetrate the phone and into the user's WhatsApp program, opening access for you.
  • The call. The application calls the victim’s phone and when it answers it penetrates the phone and the application.
  • Wi-fi If you are near the victim and you use the same wifi, then you just need to launch the sniffer on the phone and indicate the victim's number: in a second you will have access to WhatsApp.

To use the sniffer, just run the utility, select the method of use and press "spoof" - a button that allows you to find the phone of an interesting person.

Where to download and how to install

To download WhatsApp Sniffer for Android you need to type in Google: “whatsapp sniffer apk download”, or use the installation file, which you can find on our website. Unfortunately, Whatsapp sniffer cannot be downloaded for iphone, because it simply does not exist for this operating system.

In order to install the utility on the phone, follow these steps:

  1. Transfer the installation file to your smartphone.
  2. Run it - it will install as usual.
  3. When you open the file will ask for permission to access some functions, select "Allow". That's it: the sniffer is installed on your gadget.

If you can’t install Sniffer, then it is recommended to hack it. Why download WhatsApp Hach Sniffer in Russian for free?

How to protect yourself from WhatsApp Sniffer

What if you are not a spy, but a victim? At any slightest suspicion that your phone is used by intruders for selfish purposes, you should uninstall the Wotsap application and install it again. Moreover, it is recommended:

  • Clean the phone using any antivirus;
  • Contact the Votsap developers in order to put more serious protection against the penetration of third-party programs into the utility.
  • Always check how reliable the Wi-Fi network you use is. So, if you have any suspicions that hackers may be connected to it, it is better not to connect to it.

Top Hacker Software

Hidden from guests

It has a number of features that can help a pentester and a hacker. Two compatible applications used in this tool include the “Burp Suite Spider”, which you can list and map different pages and website settings by examining cookies. It initiates a connection with these web applications, as well as Intruder, which performs a series of automated attacks on targeted web applications.

Burp suite is a great web hacking tool that many pentesters can use to check website vulnerabilities and target web applications. Burp Suite works using detailed knowledge of the application, which has been removed from the HTTP oriented protocol. The tool works through an algorithm that is configurable and can generate a malicious attacking HTTP request, which hackers often use. Burp Suite is especially useful for detecting and identifying vulnerabilities for SQL injection and cross-Site Scripting (a).

Hidden from guests

Also known as ipscan, it is a freely available network hacking scanner that is both fast and easy to use. The main goal of this hacking tool for scanning IP addresses and ports is to find open doors and ports in other people's systems. It is worth noting that Angry IP Scanner also has a bunch of other methods for hacking, you just need to know how to use it. Common users of this hacking tool are network administrators and system engineers.

Hidden from guests

is an amazing tool for network hacking, which can be configured in one of three preset modes:
  1. it can be used as an interceptor
  2. packet recorder
  3. to detect network intrusions
More often, hackers use Sniffer mode, it gives them the ability to read network packets and display them on the graphical user interface. In packet recorder mode, Snort will audit and register packets to disk. In intrusion detection mode, Snort monitors network traffic and analyzes it with a set of rules defined by the user.

THC Hydra - Often seen as another password cracker. THC Hydra is extremely popular and has a very active and experienced development team. In essence, Hydra is fast and stable for cracking logins and passwords. She uses the dictionary and Brute Force attacks to try various combinations of usernames and passwords on the login page. This hacking tool supports a wide range of protocols including Mail (POP3, IMAP, etc.), databases, LDAP, SMB, VNC, and SSH.

Wapiti - has very dedicated fans. As a pentesting tool (or framework), Wapiti is able to scan and identify hundreds of possible vulnerabilities. In essence, this multi-purpose hacker utility can check the security of web applications by running a black box system. That is, she does not study the source code of the application, but scans the application’s HTML pages, scripts and forms, where she can cram her data.

Today it is the top hacker software. Do you have any fresh information? - Share it in the comments. Have questions? - ask. We will always answer and explain everything.

February 06, 2013, 09:57

Console download speed from 5 seconds to two minutes
(this specificity of work is absolutely all chips reset glitch hack)
As for the speed of launching games, games are launched both from an external drive and from an internal one quickly and quietly.

File manager for freeboot

XexMenu - a simple shell for launching games from any media, has a built-in file manager, allows you to run games and applications with * .xex extensions
Control buttons (rb, X - select the source dvd usb hdd, Y-output of the file operation menu copy past cut) The easiest way to start games and applications for beginners.
How to use? Very simple.
We go on the console in the section "game library" and run (if it does not appear in the game library, then select the demo version)

XexMenu can also be written to a memory card, flash drive or internal hdd. To do this, run the hehmenu from the blank, press X, select the DVD and copy the folder C0DE9999 with all its contents in the content \\ 0000000000000000 (16 zeros) of your HDD. That's it, now you can forget about the disc with hehmenu.

HOW TO START ISO from USB?
The file system of the hard disk should be only FAT 32 (use the acronis disk director for formatting)
Download the Xbox image browser program (link below)
Create a GAMES folder on your hard (or USB flash drive) (ALL WITH LARGE LETTERS)
Open the Xbox image browser ISO file with the game.
Create a folder in the GAMES folder with the name of your game.
Now right-click "EXTRACT" and extract all the files into the newly created folder with the name of the game on a USB drive.

After extracting the game, be sure to go to the external hard drive in the game folder and delete the $ systemupdate folder

Now insert the USB into the xbox360. We go to the game room. We start xexmenu. If you copied everything correctly, then the games will automatically appear in the xex menu.
Select a game and press A. Enjoy the game!

XeXmenu shows a list of games from a hard drive connected via usb

How to unlock arcade games?

Download an arcade game from the Internet. Download the program YarisSwap (link below)
Run the program. Select the game file (many numbers and letters). Click on the red button and wait. That's it, the file is patched. Then we take the patched file and paste it back into the folder where it was lying. Then we throw this folder on the internal hard drive (read below how to do it) in the section content \\ 0000000000000000 \\
Everything, we have the full version

How to copy games over the network:

XeXmenu shows the ip address for copying games over the network (it is an ftp server)

XeXmenu shows the temperature of the processor, memory and allows you to choose a cover to taste

(download of games goes through the total commander or FLASHFXP programs better)

We connect the Xbox 360 to the computer via LAN via FTP

There are two ways to copy games over the network:

1) directly connect to the PC (you need to manually register ip addresses)

2) connection through a router (the router will automatically do everything, provided that the DHCP service is configured on it)

Consider the first method in more detail:

directly connect to the PC (you need to manually register ip addresses)

We connect the network ports of the computer and the xbox 360 with a patch cord cable. If this was not included, it is sold at any computer store.

Turn on the xbox 360
- go to the system parameters
- network parameters
- configure the network
- tab basic settings
- select the manual mode of the ip-address parameters
- register the IP address 192.168.0.2
- subnet mask 255.255.255.0
- we do not need a gateway, register 0.0.0.0
- save the settings by clicking done
- run xex menu and leave it running
- on the PC we go with Network connections
- LAN connection properties

Go to the properties of the "Internet Protocol TCP / IP"

We register the IP address and network mask

Click OK
- reboot the PC
- run Total Commander (you can use any other FTP client)
- press Ctrl + F
- select New Connection
- register the ip-address of the xbox 360 ftp server and the port number through the colon - 192.168.0.2
- xbox login and xbox password

Click OK and connect to the created connection
- now all storage devices connected to xbox360 are available to us

Games copy to section HDD1 \\ content \\ 0000000000000000 \\

Using iso2god, you can upload games over the local network we just created.

How to install games on Freeboot from an iso image to an ORIGINAL hard drive on a network

Launch the Iso2God program (link below)

if the program starts with an error - disable your antivirus
when unpacking the archive, the antivirus scolded the xextool.exe program, but there is nothing dangerous in it.
- Click Add ISO

In Image Location, specify the path to the iso-image
- In Output Location - the way to save the converted freeboot result

There are 3 items in the lower drop-down list:
- None - choose if we do not need to reduce the size of the image
- Partial - the image is cropped at the end of the last sector used. Saves 800-1500 MB of hard disk space
- Full - a complete rebuild of the image with the removal of all empty sectors on it. You can leave the modified image for future use. We get the best size result. Additionally takes 5-10 minutes.
- select the settings we need and click Add Iso
- now convert

For example, the image of the game Saboteur decreased from 7.29 GB to 5.64 GB, with Full mode selected for rebuilding the image.
- now, the result obtained in the Output Location, I have this folder 4541088F - the name is unique for each game, copy it to the hard drive in partition3 in the folder HDD1 / Content / 0000000000000000 / over the local network using the FTP protocol.
Do not forget that for copying games over the network it must be running on xbox 360 XEXMENU
(it acts as an FTP client server)

Video codecs for watching movies - download

DLC (add-ons for games) and installing patches for games

As for the various DLCs, the title of updates is simple.
They downloaded the DLC, for example for a betman, usually the DLC has a folder 000002. So, you need to drop this folder into the folder hdd \\ Content \\ 0000000000000000 \\ 4500052 where 4500052 is a folder with a unique game number. Moreover, the game itself can be stored on USB Hdd, but the DLC must be on the HDD console!

Now about the title update, they are TU, they are patches. Everything is simple too - we throw a unique file in hdd \\ Cache (4L145C441000.000256 - an example of a file) (no more manipulations are required)
Usually download the latest update.
The site with the latest title updates -

Programs for PC:

Yarisswap
For what: unlocking arcades, DLC avatar (avatar clothes).
Optional: can upload content directly via ftp protocol to the box, can change the XUID.

Iso2God
For what: remakes games from ISO to GOD container (Games on Demand).
Additionally: can upload content directly via ftp protocol to the box, can change the picture of the label that will be visible in the dash, as well as the name of the game and description.

Xbox Image Browser
if the program starts with an error - disable your antivirus
For what: unpacks ISO
Optional: after unpacking, the game needs to be dropped in x: \\ Games \\ game name \\ (suitable for both the boxing hard drive and usb flash drives and hard drives). Run the game with the default.xex file through the xexmenu program, or from the dash shortcut if you previously create it in the Quickboot program.

Programs for Xbox360:

Xexmenu
For what: the main program for xbr consoles. Running games, emulators, other programs, as well as a file manager, shows the temperature of iron. FTP server.
Optional: to connect to the xbox via ftp protocol, this program must be running on the console. It has two types: NXE container (drop into content \\ 0000000000000000 \\ C0DE9999 \\ 00080000 \\) - the shortcut will appear in the game library \\ demo section of the game, and unpacked (launch via default.xex).

NXE2GOD
For what: it remakes games installed from the disk into GOD games (you will no longer need a disk to run it).
Additionally: it also looks like an NXE container (drop it into content \\ 0000000000000000 \\ C0DE9999 \\ 00080000 \\) - the shortcut will appear in the game library \\ demo section of the game, and unpacked (launch via default.xex).

Update Reset glitch hack (new freeboot) to the new dashboard 16197

iNTERNET EXPLORER appears in the new update of 16197.

Now you can walk around the Internet, view the latest posts on the wall in Vkontakte right on the XBox 360 game console

Sometimes it becomes necessary to find out what bugs were found in some top-end Android application. There can be a lot of reasons for this: from attempts to spin the vector further and search for similar vulnerabilities to trivial checks for hardcode. Let's try to crank, and the HackApp + Vulners bunch will help us in this.

HackApp is a shareware toolkit and service for finding bugs in mobile applications. HackApp maintain their database of vulnerabilities, which describe in detail attack vectors and vulnerable versions. Vulners is a free and open source vulnerability search engine for various products. In addition to the bugs themselves, Vulners finds and displays vulnerabilities related to vulnerabilities, patches and even news from open sources.

With Vulners and HackApp, you can search for vulnerabilities of more than 22,025 top Android applications from Google Play! Store To search, type type: hackapp. The search results display the title, the number of vulnerabilities by severity level (red circle - critical, yellow circle - medium criticality, gray circle - note), application information (icon, current version, developer and release date).

The link to the application vulnerability bulletin has the form https://vulners.com/hackapp/HACKAPP:RU.SBERBANK_SBBOL.APK. The bulletin lists all vulnerabilities with a brief description and indicates which versions of the application are considered vulnerable. A full description of the vulnerabilities is available at the link on the HackApp website.


But the real killer feature is the ability to find applications whose careless developers hardcoded inside the accounts from Amazon AWS. The simplest request https://vulners.com/search?query\u003dtype:hackapp%20AWS%20credentials will return a whole bunch of such “pearls”.


Great, we have AWS_KEY. Now we need more AWS_SECRET_KEY. Let's not stop and look at the "house" of developers? 🙂


Vulnerable APK can be conveniently downloaded directly from the HackApp website. Then we open it in a known manner:

Java -jar apktool_2.1.1.jar d.apk

We start grep and ... voila! It seems that we really found something:

MacBook-Pro: pwner $ grep -R "AKIAI5AWXTYSXJGU55QA" ./ .//smali/com/adobe/air/AdobeAIR.smali:.field private static final TEST_ACCESS_KEY: Ljava / lang / String; \u003d "AKIAI5AWXTYSXJGU55QA" .//smali/com/adobe/air/AdobeAIR.smali: const-string v1, "AKIAI5AWXTYSXJGU55QA"

What can I say: pwned in less than 1 minute!

By combining these two tools and a simple full-text search, you can still get a lot of shameful secrets of mobile applications :).

Good luck and successful knowledge!