Skip to playerSkip to main content
  • 22 hours ago
Transcript
00:00Hello guys, welcome back to the new video
00:02To a─Н kiz video ka ntho rana ablog baat karne waal hai
00:04Whatsapp hacking ke baare mein
00:05I know bhoat dino se aap log jokie isi video ka inntazar kar raha he
00:08To aaj mai ap logko practicali batane waalau
00:10Kis tarikay se ham log eck whatsapp account ko hack kar saktay
00:13Bhoat dino se mujhe jokie commentar a raana
00:14To aap logko jokie isi tarikay ka video dekhne me maza aata hai
00:17Whatsapp hacking, facebook hacking, instagram hacking
00:20To isilie mai bhoat logki demand per isi video ka mene buna raha ho
00:22To a─Н kiz video ka ntho rana me aap logko step by step batane waalau
00:25рдХрд┐рд╕ рддрд░реАрдХреЗ рд╕рдм рд▓реЛрдЧ рдПрдХ WhatsApp account рдХреЛ hack рдХрд░ рд╕рдХрддреЗ рд╣реИрдВ
00:28рдПрдХрджрдо basic advance рддрдХ
00:29рдмрдЯ рдХреБрдЫ рдЪреАрдЬ рдЖрдк рд▓реЛрдЧ рдХреЛ рд╕рдмрд╕реЗ рдкрд╣рд▓реЗ рдзреНрдпрд╛рди рд░рдЦрдирд╛ рдкрдбрд╝реЗрдЧрд╛
00:32рдЬреИрд╕реЗ рдХрд┐ рдХреБрдЫ рднреА рдЪреАрдЬрд╝реЗ hack рдХрд░рдиреЗ рд╕реЗ рдкрд╣рд▓реЗ
00:35рд╣рдореЗрдВ рдЬреЛ рдХрд┐ рдЕрдкрдирд╛ social engineering skills рд╕реЗ рдЙрд╕рдХреЛ improve рдХрд░рдирд╛ рд╣реЛрдЧрд╛
00:39рдЕрдм social engineering skills рдХреНрдпрд╛ рд╣реИ
00:41рдХрд┐рд╕ рддрд░реАрдХреЗ рд╕реЗ social engineering attacks рдХреНрдпрд╛ рдЖрдЬрд╛рддрд╛ рд╣реИ
00:43рдЕрдЧрд░ рдпреЗ рдЖрдк рд▓реЛрдЧ рдХреЛ рдирд╣реАрдВ рдкрддрд╛ рддреЛ рдпрд╛рд░ рд╡реАрдбрд┐рдпреЛ рдЖрдк рд▓реЛрдЧ рдХреЗ рд▓рд┐рдП рдирд╣реАрдВ рд╣реИ
00:45рдЬреЛ рд▓реЛрдЧ рдПрдХрджрдо рд╣реА beginner рд╣реЛ рдХреБрдЫ рдирд╣реАрдВ рдкрддрд╛ рдЗрддрд┐рдХрд╛ рд▓рд╛рдХрд┐рдВрдЧ рдХрд╛
00:48рд╕реЗ рдкрд░ рд╕рд┐рдл рдердордиреЗрд▓ рд▓реЗрдХрд░ рдЖрдЧреЗ рд╣реЛ рдХрд┐ WhatsApp hacking рд╕реАрдЦрдиреЗ рдХреЛ рдорд┐рд▓реЗрдЧрд╛
00:51рддреЛ рдпрд╛рд░ рдЕрднреА рдЫреЛрдбрд╝рдХреЗ рдЪрд▓рд╛ рдЬрд╛рдУ рдХрд┐ рдЖрдкрдХреЛ рдХреБрдЫ рднреА рд╕рдордЭ рдореЗрдВ рдирд╣реАрдВ рдЖрдиреЗ рд╡рд╛рд▓реЗ рдЗрд╕ рд╡реАрдбрд┐рдпреЛ рдХреЗ рдЕрдВрджрд░
00:54рдЗрд╕ рд╕реНрдХреНрд░рд┐рдкреНрдЯ рдХрд░реА рдЬреИрд╕реЗ рдореИрдВ рдЖрдк рд▓реЛрдЧ рдХреЛ рдХреБрдЫ рднреА рдирд╣реАрдВ рд╕рд┐рдЦрд╛ рддреЛ
00:57рдореИрдВ рдЬреЛ рднреА рдЖрдк рд▓реЛрдЧ рдХреЛ рд╕рд┐рдЦрд╛ рддреЛ рдПрдХрджрдо рдЕрдЪреНрдЫреЗ рд╕реЗ explain рдХрд░рдХреЗ рд╕рд┐рдЦрд╛ рддреЛ
01:00рдПрдВрдб рд╡реАрдбрд┐рдпреЛ рд╕реНрдЯрд╛рд░реНрдЯ рдХрд░рдиреЗ рд╕реЗ рдкрд╣рд▓реЗ рдХрд╛рдИрд╕ рдореЗрдВ рдЖрдк рд▓реЛрдЧ рдПрдХ рдЪреАрдЬрд╝ рдмрддрд╛ рджреЗрддрд╛ рд╣реЛ рдЬреЛ рд╣рдорд╛рд░рд╛ 90%
01:04cyber attack рд╣реЛрддрд╛ рд╣реИ рдкреВрд░реЗ world рдореЗрдВ рд╡реЛ рд╕рднреА рдХреЗ рд╕рднреА рдЬреЛ рдХреЗ social engineering рдХреА рдереБрд░реА рд╣реЛрддрд╛ рд╣реИ
01:08hacker рд╕рдмрд╕реЗ рдкрд╣рд▓реЗ рдЖрдкрдХрд╛ рджрд┐рдорд╛рдЧ hack рдХрд░рддрд╛ рд╣реИ рдЙрд╕рдХреЗ рдмрд╛рдж рдЖрдкрдХрд╛ smartphone рдЖрдкрдХрд╛ device рдХреЛ hack рдХрд┐рдпрд╛ рдЬрд╛рддрд╛ рд╣реИ рдареАрдХ рд╣реИ
01:13рддреЛ рдЗрд╕рд▓рд┐рдП рдореИрдВ рдмреЛрд▓рддрд╛ рд╣реЛрдЧреЗ social engineering skills рдЬреЛ рдХреЗ рдХрд╛рдлреА рдерд╛рджрд╛ important рд╣реИ
01:17рдЖрдк рдЬреЛ рдХреЗ рд╡реАрдбрд┐рдпреЛ рд╕реНрдЯрд╛рд░реНрдЯ рдХрд░рдиреЗ рд╕реЗ рдкрд╣рд▓реЗ рдореИрдВ рдЖрдк рд▓реЛрдЧ рдХреЛ рдФрд░ рдПрдХ рдЪреАрдЬрд╝ рдмрддрд╛ рджреВ
01:20рдЖрдк рд▓реЛрдЧ рдПрдХ pen рдФрд░ рдкреЗрдкрд░ рд▓рд╛рдИрдП рдФрд░ рд▓рд┐рдЦ рд▓реАрдЬрд┐рдП рдХрд╣реАрдВ рдкреЗ
01:23рдпрд╣ рдЬреЛ рд╡реАрдбрд┐рдпреЛ рдореЗрдВ рдЖрдк рд▓реЛрдЧреЛрдВ рдореИрдВ рдЯреЗрдХреНрдирд┐рдХреНрд╕ рдмрддрд╛рдиреЗ рд╡рд╛рд▓рд╛ рд╣реВрдБ
01:25рдпрд╣ рдЕрдЧрд░ рдХрд╣реА рдФрд░ рджреЗрдЦреЗ рд╣реЛрдВрдЧреЗ рдЖрдк рддреЛ рдореБрдЭреЗ рдмрддрд╛рдирд╛ рдореИрдВ рд╡реАрдбрд┐рдпреЛ рдХреЛ рдбрд┐рд▓реАрдЯ рдХрд░ рджреВрдБрдЧрд╛ рдареАрдХ рд╣реИ рдпреВрдЯреНрдпреВрдм рд╕реЗ
01:29рддреЛ pen or paper рд▓рд╛рдУ рдФрд░ рд▓рд┐рдЦ рджреЛ
01:31рдЕрдм рдЗрд╕реЗ рд╕рдм рдиреЛрдб рдкрд░ рд▓реЛрдЧрд░ рдХрд╣реАрдВ рдкреЗ рднреА рджреЗрдЦрд╛ рдЖрдкрдиреЗ рдЗрд╕ рд╡реАрдбрд┐рдпреЛ рдХреЛ рддреЛ рдлрд┐рд░ рдореБрдЭреЗ рдмрддрд╛рдирд╛ рдореИрдВ рдЗрд╕ рд╡реАрдбрд┐рдпреЛ рдХреЛ рдбрд┐рд▓реАрдЯ рдХрд░ рджреВрдБрдЧрд╛ рддреЛ рдлрд┐рд░ рдЪрд▓реЛ рд╡реАрдбрд┐рдпреЛ рдХреЛ рдХрд░рддреЗ рд╣реИрдВ
01:37рд╕реНрдЯрд╛рд░реНрдЯ рдмрдЯ рдЙрд╕рд╕реЗ рдкрд╣рд▓реЗ
01:39рдЕрдм рд╕рдмрд╕реЗ рдкрд╣рд▓реЗ рдЖрдкрдХреЛ рдЕрдкрдиреЗ рдЪреИрдб рдЬреАрдкреАрдЯреА рдУрдкрдиреЗ рдХреЗ рдмрд╛рдж рдЖрдкрдХреЛ рдЗрд╕рдХреЗ рдкреНрд░реЙрдВрдкреНрдЯ рджреЗрдирд╛ рд╣реИ
02:07рдЕрдм рдкреНрд░реЙрдВрдкреНрдЯ рдХреНрдпрд╛ рджреЗрдирд╛ рд╣реИ рдХрд┐ рдПрдХ рдореЗрд▓ рд▓рд┐рдЦрд╡рд╛рдирд╛ рд╣реИ рдЗрд╕рд╕реЗ рдареАрдХ рд╣реИ
02:10рдЕрдм рдореИрдВ рдЗрд╕ рдкрд░ рдореЗрд▓ рдХреЗ рддреБрд░реВ рдХрд░ рд░рд╣реЗ рд╣реИрдВ рдЗрд╕рдХрд╛ рдорддрд▓рдм рд╣реА рдирд╣реАрдВ рдХрд┐ рдЖрдк рд▓реЛрдЧреЛрдВ рдХреЛ рднреА рдореЗрд▓ рдХреЗ рддреБрд░реВ рдХрд░рдирд╛ рдкрдбрд╝реЗрдЧрд╛
02:14рдЕрдм рдЬрд┐рд╕ рддрд░реАрдХреЗ рд╕реЗ рдЖрдкрдХрд╛ рдЯрд╛рд░реНрдЧреЗрдЯ рдХреЛ рдХрд░ рд╕рдХрддреЗ рд╣реЛ рдпрд╣ рдбрд┐рдкреЗрдВрдб рдХрд░рддреЗ рд╣реИ рдЖрдкрдХрд╛ рдЬреЛ рд╕реЛрд╕рд▓ рдЗрдВрдЬрд┐рдиреЗрд░рд┐рдВрдЧ рд╕реНрдХрд┐рд▓реНрд╕ рд╣реЛ рдХрд┐рддрдирд╛ рдкрд╛рд░рдлреБрд▓ рд╣реИ рдареАрдХ рд╣реИ
02:22рдЖрдкрдХрд╛ рд╕реЛрд╕рд▓ рдЗрдВрдЬрд┐рдиреЗрд░рд┐рдВрдЧ рд╕реНрдХрд┐рд▓реНрд╕ рдЕрдЪреНрдЫрд╛ рд╣реЛрдЧрд╛ рддреЛ рдлрд┐рд░ рд╕рд╣реА рд╣реИ рдЕрдЧрд░ рдЖрдкрдХреЛ рдЗрд╕ рдПрдХ рдкреНрд░реЙрдореНрдЯ рд▓рд┐рдЦ рд▓реЗрдирд╛ рд╣реИ рдЕрдЧрд░ рдЖрдк рдХрд┐рд╕реА рдФрд░ рдХреЗ рддреБрд░реВ рдХрд░ рд░рд╣реЗ рд╣реЛ рдпрд╣ рдбрд┐рдореЗрдВрдб рдХрд░рддреЗ рд╣реИрдВ рдЖрдкрдХреЗ рдЙрдкрд░ рдкреВрд░рд╛ рдХреЗ-рдкреВрд░рд╛ рдареАрдХ рд╣реИ
02:39So, I will close the chat and now I will show you the things I will show you.
02:43Okay, so you can see that I will have a WhatsApp page open, a web page.
02:48Which is why I will have a website login, which I will have an interface,
02:51I will have a same to say, I will have an interface.
02:53Now, I will attack and tell you what to do.
02:56After that, I will explain how to do it.
03:00Now, what do you want to do?
03:01You will take your target on this page.
03:04In any way, I will convince you.
03:06You will depend on your social engineering skills.
03:10Use this to be a WhatsApp account, which will be compromised.
03:15Investigations in time, the target phone.
03:17Which will be an investigation through,
03:20or department, which will help you through.
03:23So, this is a very case solved.
03:26This method is good.
03:28And this is what I have done.
03:30Now, I will give you a target.
03:31Now, I will give you a link to your target.
03:35If you use a smartphone, then you will open it.
03:37If you use a laptop or desktop, then you will open it.
03:41Now, what do you do?
03:43As a hacker, I will give you a side way.
03:46Now, WhatsApp page is open.
03:48This is our target interface.
03:50Target is open.
03:52Now, what do you want to open it?
03:54Now, what do you want to open it?
03:57Now, what do you want to do?
03:57You have to do here.
03:59The target phone number is dialing to WhatsApp.
04:01As we open it, enter your phone number.
04:04So, I will add my number.
04:06Now, I have added my number.
04:07What do you want to do here?
04:08What do you want to do here?
04:10Now, the target has added my number.
04:11Now, the target has added my number.
04:12Then, the next click.
04:13As we click on the next click,
04:15Now, the target phone has got an OTP.
04:16It's got an inter-6-digit code.
04:18Now, the OTP will not go.
04:21Why will not go?
04:21Basically, it's a fake page.
04:22Now, what do you want to do here?
04:24Now, what do you want to do here?
04:26As a hacker, what do you want to open it?
04:28New phrase, WhatsApp.
04:29If you want to use a virtual phone,
04:30then you can use it.
04:31If you want to use it.
04:32Otherwise, you can create a clone.
04:34And then, you can use your target number.
04:36Now, until next click here,
04:39then, the target phone will not go.
04:42Now, the target phone will not go.
04:44Now, the target phone will not go.
04:46Now, the target phone will go.
04:48Now, let's continue.
04:50Allow.
04:51Now, check your email.
04:53This means you can use WhatsApp.
04:57Now, the target from OTP is in my Instagram.
04:59Now, what do you want to do here?
05:01So, my target will check your email.
05:03Now, what do you want to do here?
05:05Now, what do you want to call you?
05:07Now, the target will come up to OTP.
05:09Now, the victim will use OTP.
05:11Here, I have a hacker OTP.
05:13Now, you'll need OTP.
05:15Now, OTP is the 6.
05:17three double nine and
05:20jayasai mein esko dal ke verify
05:22pe click karunga then boom guys
05:24yukye khatam ho gaya thik hai abus page ka jukye
05:26kuch bhi kama nahi hai thik hai aap mujhe kya karna hai
05:27as a hacker ab me kya karunga mujhe otp kya se milega
05:30abhi hem logoo ne joko kya ho as a target me nai kiya
05:32abh mujhe kya karna me aap log eek chiz dikhata ho
05:34abh aap log eek bar yahaan pe dekho guys
05:35yaha pe joh target ka number hai country code
05:38and usi ke sath sath most important
05:40uska joh otp hai yoh humare paas
05:42aagya abh akbar otp ko validate bhi karlo
05:43abh ye joh otp hai
05:47yeh meere paas kaise aya
05:48abh me aap log ko pura ke pura chiz jokye explain karke
05:51batao ga ki isko me nai kaise kya
05:52kis tariqe se me nai kisi ka whatsapp hai
05:54abh mujhe kya karna hai me just otp ko copy karunga
05:56or me aapne phone pe aake
05:57yaha pe jis ko paste kar dunga
05:59and paste karta hi joki hai
06:00uska access meere paas aajayega
06:01main esko karke nahi dikharo ki kya agar me here
06:04otp dal jaya to jokye meere phone se
06:06meera whatsapp log out ho jayaega
06:07to isilio me esko karke nahi dikharo
06:09main esko close kar djeta ho abhi
06:10abh me nai kiya kiya
06:13main esko whatsapp ka jesai simpto se
06:15main esko html css and javascript se
06:17main esko page banaya
06:18abh usko main ek public domain
06:20pere ja ke usko host kar dya
06:21abh me jesko public domain pere host
06:23isilioe karna pada
06:24taakki main esko attack
06:25over the internet kar sako
06:26mujhe apne local area network pe naihi
06:28karna hai apne wifi pe naihi
06:29karna hai
06:29mujhe usko over the internet
06:31pura wall pe me kisiko bhi
06:32isko send karke
06:33usko code isko me compromise
06:34kar saakta ho
06:34thikhar
06:35to mujhe usko send karna hai
06:36abh me log egar kisi target
06:37ko par attack karra
06:38information gathering karra
06:39to obviously
06:39humare paas uska whatsapp ka number
06:40ho ga
06:41thom log usi se jokie
06:41easily isko kar saakta hai
06:42abh wo target
06:43jasai apne hoon pe number
06:44ndumber ndalega
06:44number ndalena ke baad
06:45hame kya karna
06:46hame apne device se
06:47jokie request generate
06:48karna whatsapp ka
06:48otp ka
06:49abh jasai uske paas otp
06:50jaya ga
06:50abh ho bhi dhek paaya ga
06:51ke haan uske paas otp
06:52aya hai
06:52abh jasai yoh
06:53hamaray page pere otp
06:53ndalega
06:54uska joh otp
06:55otp hai
06:55woha humare paas
06:56ajaaga
06:56abh hum log us
06:57otp ko leke
06:57uska joh whatsapp
06:58hai
06:58pura ke paus
06:59ko compromise
07:00kar saakta hai
07:00abh compromise
07:01kar dhenne ke baad
07:02ham uske whatsapp
07:02kan dha
07:02twister verification
07:03bhi laga saakta hai
07:04abh twister verification
07:05agar kisi whatsapp
07:06mein hai
07:06abh usko bhi
07:07bypass
07:07kar saakta hai
07:08abh
07:08abh meh nesko
07:09abh loge
07:09itna jadha
07:10karke naihi
07:10bita ya
07:10itna jadha
07:11explain nai
07:11kya
07:12kyu nai
07:12kya
07:12already
07:13channel
07:13pere strike
07:14pada hoa
07:14aya
07:14iso liye
07:14itna dina
07:15video
07:15nai
07:15aip
07:15baar
07:15baar
07:16bhi
07:16thas
07:17iso liye
07:17video
07:17bhi
07:17bhi
07:17nai
07:17dal
07:18pae
07:18ame
07:18abh
07:18agar
07:18aap
07:18go
07:19sikko
07:19sikha
07:19na
07:19practically
07:20pura
07:20kera
07:20code
07:21cahyye
07:21pura
07:21server
07:22cahyye
07:22johan
07:22pere
07:22otp
07:23receive
07:24ho
07:24raha
07:24to
07:24aap
07:24join
07:25kari
07:25kari
07:25kari
07:26whatsa
07:27course, where you can learn thousands of methods in this way, which you can hack through
07:31anyone's own.
07:33If you have two-factor authentication, then you can hack through WhatsApp.
07:37For advanced processes, you can learn more and more.
07:41But you can do that.
07:43How do you like this video?
07:45If you like this video, please like and subscribe.
07:48If you like this video, please like this channel.
07:50If you like this video, please subscribe.
07:52If you like this video, please like this video.
07:55If you like this video, please like this video.
07:57If you like this video, please like this video.
07:59See you in the next video.
08:01Goodbye.
Comments

Recommended