WhatsApp Remote Code Execution Vulnerability (CVE-2019-11932)

  Рет қаралды 194,199

The Hacker News

The Hacker News

Күн бұрын

Пікірлер: 138
@JaballahShow
@JaballahShow 5 жыл бұрын
i have no clue wtf is this and why it shows up in my recommendations
@0xsh1v4
@0xsh1v4 5 жыл бұрын
hahahaha
@0xffsetghost211
@0xffsetghost211 5 жыл бұрын
What he did was send a gif file with a malicious payload attached to it, whatsapp have a vulnerability with in its code that was not patched. When the recipient receives the gif file the payload is executed on the recipients phone. Now the attacker has what’sapp on the computer and is using natcat to listen on the specified port when the recipients opens the specified port that was designed in the payload to respond to the attackers ip and once that takes place the attackers uses a reverse proxy and gains access to the android OS shell. Now the attacker can navigate on the victims phone and copy files or do what ever they want
@n.w.aicecube5713
@n.w.aicecube5713 5 жыл бұрын
@@0xffsetghost211 sounds interesting there are alot of people out there who don't update the apps, what method is he using? is the exploit on exif metadata of the gif. Is the code released anywhere?
@naturelover-Andhrapradesh
@naturelover-Andhrapradesh 5 жыл бұрын
@@0xffsetghost211 thanks
@ahmadawalluddin8711
@ahmadawalluddin8711 5 жыл бұрын
@Ruslan Masinjila .
@Soulify
@Soulify 5 жыл бұрын
Indians: *heavy breathing*
@Soulify
@Soulify 5 жыл бұрын
@Whatz Fakiie Bruh
@josefaschwanden1502
@josefaschwanden1502 5 жыл бұрын
Only 0.0009% of indians, the rest is too dumb to understand.
@RakibFiha
@RakibFiha 5 жыл бұрын
What I realised is that he used netcat to open a reverse shell through whatsapp's sandbox. Nice
@ВиталийОвчаренко-и1н
@ВиталийОвчаренко-и1н 9 ай бұрын
The stages involved in resolving the problem with CVE-2019-11932 typically include identifying the vulnerability, assigning a CVE ID, notifying the affected vendor, developing a fix, releasing a patch or update, and then informing users to apply the fix to mitigate the vulnerability. Additionally, third parties or the CNA may initiate updates to the CVE entry if needed.
@googleo
@googleo Жыл бұрын
الي جاين من عند طارق العبسي الثغره قبل اربع سنين تم اغلاقها بوقتها وما كانوا يستغلوها الي اكتشفها بلغ وقتها واخذ مكافأته والي حدث الوتس اب بعام 2019 خلاص انت أمن
@Sircliffe
@Sircliffe 5 жыл бұрын
I just had a flashback to 10 years ago, you could turn off Sony Ericsson phones with a gif also.
@kymsy6598
@kymsy6598 5 жыл бұрын
Same goes with Wiko and Samsung, by sending a command line, the phone would reboot
@VDavid003
@VDavid003 5 жыл бұрын
If someone still has that gif from back then, could you please share it? I can't find it but I remember it.
@keerthyvash
@keerthyvash 5 жыл бұрын
This vulnerability has been fixed from WhatsApp on the update Version 2.19.244
@yolo-mb4cy
@yolo-mb4cy 5 жыл бұрын
Is it forced update or are there still devices?
@keerthyvash
@keerthyvash 5 жыл бұрын
@@yolo-mb4cy still on some devices
@ВиталийОвчаренко-и1н
@ВиталийОвчаренко-и1н 9 ай бұрын
The stages involved in addressing decision-making problems related to CVE-2019-11932 are: 1. Orientation: Members meet for the first time and start to get to know each other. 2. Conflict: Disputes, fights, and arguments occur among group members. 3. Emergence: The group discusses and clarifies vague opinions. 4. Reinforcement: Members make a decision and provide justification for it.
@paulodetarsonr3140
@paulodetarsonr3140 5 жыл бұрын
hes using netcat on port 5555 used for sending and receiving gifs and gain remote access using the netcat itself theres a video about this on yt if you look for it
@JOELwindows7
@JOELwindows7 5 жыл бұрын
This is your daily dose of Recommendation Oops! A Cyber Security bounty guy found a security hole! Exploit!!!
@invalidcode
@invalidcode 5 жыл бұрын
9 year olds be like hacker tryhards just to show off 'their hacking(?)' skills
@YankeeTM
@YankeeTM 5 жыл бұрын
Old, patched and can be faked easily. Gtfo
@ifan3270
@ifan3270 5 жыл бұрын
So target app crashes after ending the session ? Does it always or sometimes & any means of detecting this like logs or by monitoring incoming/outgoing connections - is always on that port or any?
@ЏонМастерман
@ЏонМастерман 5 жыл бұрын
Dont pretend you understand this mate!!
@dubcusb
@dubcusb 5 жыл бұрын
@@ЏонМастерман You're being really useful, thanks for your answer
@marcelo.trajano
@marcelo.trajano 3 жыл бұрын
@@ЏонМастерман lol
@i2Share
@i2Share 5 жыл бұрын
Thats an old method bro but i think its patched now and btw it doesn't accept any gif mal
@i2Share
@i2Share 5 жыл бұрын
@Lemon Hacking patched 😒😒😒
@NickyPuff
@NickyPuff 5 жыл бұрын
Indian still hungry even this video got liked
@stupidaudience5354
@stupidaudience5354 3 жыл бұрын
Hahaha
@gabriella2902
@gabriella2902 5 жыл бұрын
Bruh this shit too simple, i think its already patched.
@seebeez
@seebeez 5 жыл бұрын
what emulator are you guys using in this POC
@donb6732
@donb6732 5 жыл бұрын
Its called Genymotion
@seebeez
@seebeez 5 жыл бұрын
I have tried genymotion , it's not genymotion , it's different.
@saritagaikwad3844
@saritagaikwad3844 5 жыл бұрын
What coomond shell you are using
@andreipaulciuntu01
@andreipaulciuntu01 5 жыл бұрын
Sarita Gaikwad man that’s windows cmd...
@maximilianodanielguardiola3773
@maximilianodanielguardiola3773 5 жыл бұрын
Los mensajes que están en la base de datos de WhatsApp están encriptados por más que los puedas obtener no los vas a poder desencriptar.
@dubcusb
@dubcusb 5 жыл бұрын
Esto qué tiene que ver con el video?
@maximilianodanielguardiola3773
@maximilianodanielguardiola3773 5 жыл бұрын
@@dubcusb entendiste de que trata el vídeo ?
@dubcusb
@dubcusb 5 жыл бұрын
@@maximilianodanielguardiola3773 No es sólo un exploit de whatsapp que permite ejecutar comandos remotamente?
@maximilianodanielguardiola3773
@maximilianodanielguardiola3773 5 жыл бұрын
@@dubcusb eso dice el título del vídeo pero si observas la consola de puede ver qué tiene acceso al directorio de la víctima con el cual si quieres puedes ingresar al folder WhatsApp y extraer los archivos de copia de seguridad de WhatsApp que por cierto los chat están encriptados pero no los demás archivos como audios, fotos, videos, etc.
@maximilianodanielguardiola3773
@maximilianodanielguardiola3773 5 жыл бұрын
Parece solo un software para manejar WhatsApp desde la PC que los hay por cierto pero detrás de ese programa se esconde otras funciones.
@darkaccount3750
@darkaccount3750 5 жыл бұрын
Still working?
@betathoken6990
@betathoken6990 5 жыл бұрын
Not work in new whatsaap
@thinker........
@thinker........ 5 жыл бұрын
What the is going on. Some matrix shit..
@giovannialexander1956
@giovannialexander1956 5 жыл бұрын
I think that this is a simple connection ssh from your windows into your computer
@marocngx1973
@marocngx1973 3 жыл бұрын
any mithode to reverse atack
@AnyThingInThisChannel
@AnyThingInThisChannel 5 жыл бұрын
Can you explain step by step process of how to create malicious gif file ؟؟؟؟؟
@TheHackerNews
@TheHackerNews 5 жыл бұрын
Check details here ➤ thehackernews.com/2019/10/whatsapp-rce-vulnerability.html
@RahulSingh-rl4eh
@RahulSingh-rl4eh 5 жыл бұрын
github.com/KeepWannabe/WhatsRCE from there, you are on your own.
@yasyasmarangoz3577
@yasyasmarangoz3577 5 жыл бұрын
@@patrickbateman6431 Who are you and wtf are you commenting?
@yasyasmarangoz3577
@yasyasmarangoz3577 5 жыл бұрын
@@ARUNKUMAR-po5ep Nah, forget it?
@yasyasmarangoz3577
@yasyasmarangoz3577 5 жыл бұрын
*.
@tarek5960
@tarek5960 5 жыл бұрын
how to use dat ??
@nikolanojic6861
@nikolanojic6861 5 жыл бұрын
It ain't fake you noobs its has been patched, almost all exploits are found by their own research security team or third party which reports it to them so they have time to fix it before talking about it publicly
@pritamdas7930
@pritamdas7930 5 жыл бұрын
How u created that payload?? Atleast tell which programme or script u used to make that
@X3eRo0
@X3eRo0 5 жыл бұрын
It's an exploit he probably wrote under the cve search for the poc
@TheOneAndOnlyTyroneBostick
@TheOneAndOnlyTyroneBostick 6 ай бұрын
#TyroneBostick
@Lordavailable
@Lordavailable 3 жыл бұрын
Can this creat python
@doctordnatyping9424
@doctordnatyping9424 5 жыл бұрын
GIVE ME THE EXPLOIT TO START THE ATTACK
@rct31
@rct31 5 жыл бұрын
Be polite 1st.
@justnick7940
@justnick7940 5 жыл бұрын
which exploit used to get the nc shell would have been nice to see
@dishacarder2731
@dishacarder2731 5 жыл бұрын
Can u teach me how to hack it
@doguozgen3314
@doguozgen3314 2 жыл бұрын
He literally wrote the name of the cve man
@divyamagrawal9071
@divyamagrawal9071 5 жыл бұрын
You just filled me with joy earthling😈😈
@vitormds010
@vitormds010 5 жыл бұрын
Patched, tard
@divyamagrawal9071
@divyamagrawal9071 5 жыл бұрын
@@vitormds010 yeah i know because of that motherfycking whatsapp update
@nandinik3704
@nandinik3704 3 жыл бұрын
@@divyamagrawal9071 Bro u know any new way to hack WhatsApp by sending gif??
@tr1ck5t3r7
@tr1ck5t3r7 Жыл бұрын
@@nandinik3704 questions like these from someone who knows nothing about hacking make me mad
@jiejingjing4855
@jiejingjing4855 5 жыл бұрын
这是什么?入侵手机?
@danieleloy1824
@danieleloy1824 5 жыл бұрын
Tomate cru! Faz salada
@0x544D
@0x544D 5 жыл бұрын
this is totally not a big if a deal at all .. I can achieve that in 3 diffrent ways . on android atleast if not iphone too ..
@andrandr611
@andrandr611 5 жыл бұрын
So hi
@tamilstoner9584
@tamilstoner9584 5 жыл бұрын
Copy cat
@devyadv4574
@devyadv4574 5 жыл бұрын
aapki video mein Awaaz nahin hai
@saigmail4615
@saigmail4615 5 жыл бұрын
Bro can u explain step by step bro
@NewSubmitterGuy
@NewSubmitterGuy 5 жыл бұрын
If he could, he would. It's fake
@Scafidi616
@Scafidi616 5 жыл бұрын
This isn't a tutorial guys... Is just a demonstration of an exploit, not more than that
@dubcusb
@dubcusb 5 жыл бұрын
@@NewSubmitterGuy And of course you know a lot about exploits, right?
@NewSubmitterGuy
@NewSubmitterGuy 5 жыл бұрын
@@dubcusb the most
@dubcusb
@dubcusb 5 жыл бұрын
@@NewSubmitterGuy lmao
@4kPcGaming
@4kPcGaming 4 жыл бұрын
Lame video. Patcht AGES ago
@Reshiki69
@Reshiki69 5 жыл бұрын
Step pls i want to try this
@yasyasmarangoz3577
@yasyasmarangoz3577 5 жыл бұрын
@@patrickbateman6431 wtf? what are you talking about?
@azazmir9340
@azazmir9340 5 жыл бұрын
@@patrickbateman6431 lol rekt
@yasyasmarangoz3577
@yasyasmarangoz3577 5 жыл бұрын
@@Scafidi616 What are you talking about? Silly af...
@Scafidi616
@Scafidi616 5 жыл бұрын
@@yasyasmarangoz3577 r/ woosh
@dubcusb
@dubcusb 5 жыл бұрын
@@patrickbateman6431 What does experimenting with exploits and get to know about pentesting have to do with scamming? Get a life, weirdo
@j4v4legend29
@j4v4legend29 5 жыл бұрын
mouth firepistol u can feel it, people hack app & device but never cant hack ur brain, who can?
@geekyboy7725
@geekyboy7725 5 жыл бұрын
Can you explain step by step process of how to create malicious gif file
@TheHackerNews
@TheHackerNews 5 жыл бұрын
Check details here ➤ thehackernews.com/2019/10/whatsapp-rce-vulnerability.html
@RahulSingh-rl4eh
@RahulSingh-rl4eh 5 жыл бұрын
github.com/KeepWannabe/WhatsRCE from there, you are on your own.
@dubcusb
@dubcusb 5 жыл бұрын
@@patrickbateman6431 ? What's wrong?
@guiguicdd
@guiguicdd 5 жыл бұрын
Isso só funciona em celular com root
@himanshusain2521
@himanshusain2521 5 жыл бұрын
What's this happening ?? Cn anyone tell me, m beginner
@dishacarder2731
@dishacarder2731 5 жыл бұрын
Can u teach me how to hack it??
@KhaledAbdelnaserlolsboy
@KhaledAbdelnaserlolsboy 5 жыл бұрын
teach yourself watch liveoverflow see topics available and learn the requirements yourself
@rusirumunasinghe7354
@rusirumunasinghe7354 5 жыл бұрын
skiddie
@among-us-99999
@among-us-99999 5 жыл бұрын
@Disha Carder isn’t there a link in the description?
@KhaledAbdelnaserlolsboy
@KhaledAbdelnaserlolsboy 5 жыл бұрын
@@rusirumunasinghe7354 lol .. the first step to not be a script kiddie is to share your info .. i can send him DVWA or OWASP bee box and keep him struggling around like fly .. if he start by watching any binary exploitation and keep him with the right resources he will never ask someone to "teach" him hacking
@ghostx9555
@ghostx9555 5 жыл бұрын
So don’t buy androids guys
@duckduckgosearchtool9773
@duckduckgosearchtool9773 5 жыл бұрын
what...... hmmmmm....... owh....... i am newser..... thanks......
@yuvi_white_hat1942
@yuvi_white_hat1942 5 жыл бұрын
how to make a malicius gif
@rudolfmacek7264
@rudolfmacek7264 5 жыл бұрын
it's patched
@rct31
@rct31 5 жыл бұрын
How to make a malicious gif ?
@yuvi_white_hat1942
@yuvi_white_hat1942 5 жыл бұрын
@@rudolfmacek7264 that's i know bro but i need how to create a malicious gif??
@Scafidi616
@Scafidi616 5 жыл бұрын
@@yuvi_white_hat1942 you can create any kind of malicious gif with any software for image editing, but you can't create an exploit for an app that already was patched
@yuvi_white_hat1942
@yuvi_white_hat1942 5 жыл бұрын
@@Scafidi616 no bro.. just i test i will use older version of application. and how it works...
@usmandotcom
@usmandotcom 5 жыл бұрын
Fake
@TheHackerNews
@TheHackerNews 5 жыл бұрын
Check details here ➤ thehackernews.com/2019/10/whatsapp-rce-vulnerability.html
@EnitinEnitin
@EnitinEnitin 5 жыл бұрын
Bot.
@KhaledAbdelnaserlolsboy
@KhaledAbdelnaserlolsboy 5 жыл бұрын
***CVE***
@ۦۦۦۦ-م7غ
@ۦۦۦۦ-م7غ 5 жыл бұрын
@@KhaledAbdelnaserlolsboy what is ** CVE** I was heard about it so much ?
@KhaledAbdelnaserlolsboy
@KhaledAbdelnaserlolsboy 5 жыл бұрын
@@ۦۦۦۦ-م7غ common vulnerability and exposures when there's an cve it's like sharing the bug then according what people learn about paper they take your attack vectors then the publish exploit for it
@HjkLmn-rg2pk
@HjkLmn-rg2pk Жыл бұрын
Hey brother my device is attached with [EVILPARCEL (CVE-2017-13315)] HOW I GET RID OF IT
WhatsApp Messenger Runs Arbitrary Python Code
13:46
John Hammond
Рет қаралды 215 М.
Access Location, Camera  & Mic of any Device 🌎🎤📍📷
15:48
zSecurity
Рет қаралды 2,8 МЛН
Каха и дочка
00:28
К-Media
Рет қаралды 3,4 МЛН
My scorpion was taken away from me 😢
00:55
TyphoonFast 5
Рет қаралды 2,7 МЛН
Support each other🤝
00:31
ISSEI / いっせい
Рет қаралды 81 МЛН
When you have a very capricious child 😂😘👍
00:16
Like Asiya
Рет қаралды 18 МЛН
Watch these hackers crack an ATM in seconds
5:42
CNET
Рет қаралды 6 МЛН
3 Levels of WiFi Hacking
22:12
NetworkChuck
Рет қаралды 2,4 МЛН
How Cyberwarfare Actually Works
20:53
Wendover Productions
Рет қаралды 3,1 МЛН
Remote Command Execution Explained and Demonstrated!
12:56
Loi Liang Yang
Рет қаралды 63 М.
Hackers Bypass Google Two-Factor Authentication (2FA) SMS
12:47
John Hammond
Рет қаралды 1,1 МЛН
Where People Go When They Want to Hack You
34:40
Cybernews
Рет қаралды 2,4 МЛН
The Secret step-by-step Guide to learn Hacking
14:42
LiveOverflow
Рет қаралды 3,3 МЛН
How Easy It Is To Crack Your Password, With Kevin Mitnick
6:50
Netflix Removed React?
20:36
Theo - t3․gg
Рет қаралды 75 М.
Каха и дочка
00:28
К-Media
Рет қаралды 3,4 МЛН