Saturday, 11 July 2015

The IP Address ... Public VS Private...

No comments:

 IP Address.











Hey guys its been long time after my previous post,
well today we will learn about The IP Address , Public vs Private.

About IP addresses

An IP address (short for Internet Protocol address) is used to identify computers on the Internet. It works like a return address would on a piece of mail.

How IP addresses work

When your computer or device sends a request, like a search on Google, it tags the request with your IP address. That way Google knows where to send the response.

What an IP address looks like

Your IP address will be a number, like 172.16.254.1 or 2001:db8:0:1234:0:567:8:1.

Find your IP address

When you search what is my IP on Google Search, you’ll see the IP address of the computer or device where you did the  search
You can even search more about your IP Address and ISP Information here.

What are Private IP Addresses?

An IP address is considered private if the IP number falls within one of the IP address ranges reserved for private networks such as a Local Area Network (LAN). The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP address space for private networks (local networks):
Private IP addresses are used for numbering the computers in a private network including home, school and business LANs in airports and hotels which makes it possible for the computers in the network to communicate with each other.
Say for example, if a network X consists of 10 computers, each of them can be given an IP starting from 192.168.1.1 to 192.168.1.10. Unlike the public IP, the administrator of the private network is free to assign an IP address of his own choice (provided the IP number falls in the private IP address range as mentioned above).
Devices with private IP addresses cannot connect directly to the Internet. Likewise, computers outside the local network cannot connect directly to a device with a private IP. It is possible to interconnect two private networks with the help of a router or a similar device that supports Network Address Translation.
If the private network is connected to the Internet (through an Internet connection via ISP), then each computer will have a private IP as well as a public IP. Private IP is used for communication within the network where as the public IP is used for communication over the Internet. Most Internet users with a DSL/ADSL connection will have both a private as well as a public IP.
You can know your private IP by typing ipconfig command in the command prompt. The number that you see against “IPV4 Address:” is your private IP which in most cases will be 192.168.1.1 or 192.168.1.2. Unlike the public IP, private IP addresses are always static in nature.
What are Public IP Addresses?

A public IP address is assigned to every computer that connects to the Internet where each IP is unique. In this case, there cannot exist two computers with the same public IP address all over the Internet. This addressing scheme makes it possible for the computers to “find each other” online and exchange information. User has no control over the IP address (public) that is assigned to the computer. The public IP address is assigned to the computer by the Internet Service Provider as soon as the computer is connected to the Internet gateway.
A public IP address can be either static or dynamic. A static public IP address does not change and is used primarily for hosting web pages or services on the Internet. On the other hand, a dynamic public IP address is chosen from a pool of available addresses and changes each time one connects to the Internet.
Most Internet users will only have a dynamic IP assigned to their computer which goes off when the computer is disconnected from the Internet. Thus when it is re-connected it gets a new IP.



Read More

Wednesday, 20 May 2015

Santoku Linux – Mobile Forensics, Malware Analysis, and App Security Testing LiveCD

No comments:

Santoku Linux – Mobile Forensics, Malware Analysis, and App Security Testing LiveCD















The word santoku loosely translates as ‘three virtues’ or ‘three uses’. Santoku Linux has been crafted with a plethora of open source tools to support you in three endeavours, mobile forensics, malware analysis and security testing. Boot into Santoku and get to work, with the latest security tools and utilities focused on mobile platforms such as Android and iOS.

Pre-installed platform SDKs, drivers, and utilities, plus helpful tools for easy deployment and control of mobile apps. Auto Detection and setup of new connected mobile devices. To make future updating of Santoku WAY easier for users, we’re hosting a repository. Set it up just once and get updates with package management instead of downloading a whole new iso.

Mobile Malware
Tools for examining mobile malware
  • Mobile device emulators
  • Utilities to simulate network services for dynamic analysis
  • Decompilation and disassembly tools
  • Access to malware databases
Mobile Security
Assessment of mobile apps
  • Decompilation and disassembly tools
  • Scripts to detect common issues in mobile applications
  • Scripts to automate decrypting binaries, deploying apps, enumerating app details, and more.
Mobile Forensics
Tools to acquire and analyze data
  • Firmware flashing tools for multiple manufacturers
  • Imaging tools for NAND, media cards, and RAM
  • Free versions of some commercial forensics tools
  • Useful scripts and utilities specifically designed for mobile forensics
You can download Santoku here:
– santoku_0.5.iso (Direct ISO)
– santoku_0.5.iso.torrent (Torrent)
Or read more here.
Read More

Saturday, 18 April 2015

SavetheInternet! OMG What is it ? #NetNeutrality??

No comments:

Now a days there is alot chaos going On the social walls of Facebook , Twitter , Instagram...
What is #NetNeutrality??
Well  lets get easy as a b c..
The internet's success in fostering innovation, access to knowledge and freedom of speech is in large part due to the principle of net neutrality — the idea that internet service providers give their customers equal access to all lawful websites and services on the internet, without giving priority to any website over another.
Due to intense lobbying by telecom operators like Airtel and Vodafone, the Telecom Regulatory Authority of India (TRAI) is planning to allow them to block apps and websites to extort more money from consumers and businesses — an extreme violation of net neutrality.
TRAI has released a consultation paper with 20 questions spread across 118 complicated pages and wants you to send them an e-mail by 24th of April, 2015.
What is net neutrality?
Firstly, we need to understand what exactly net neutrality is. Net neutrality means Internet that allows everyone to communicate freely. It means a service provider should allow access to all content and applications regardless of the source and no websites or pages should be blocked, as long as they aren’t illegal. It’s like a fixed-telephone line, which is equal to all, and no one gets to decide who you call or what you speak. Another aspect of net neutrality is level playing field on the internet. This means, all websites can co-exist without hampering others. All websites are accessible at the same speed and no particular website of application is favoured. For instance – like electricity, common for all. Net neutrality also means all web sites and content creators are treated equal, and you don’t have to pay extra for faster Internet speed to a particular site/service.
Why should I bother or what will happen if there is no net neutrality?
To put it out straight, if there is no net neutrality, the Internet won’t function as we’ve known it too. It will mean Internet Service Providers (ISP) will be able to charge companies like YouTube or Netflix as they consume more bandwidth, and eventually the load of the extra sum will be pushed to the consumers. Similarly, ISPs can then create slow as well as fast Internet lanes, which will mean all websites cannot be accessed at the same speed and one can do so only on paying an additional sum. For instance, currently, you have a standard data package and access all the content at the same speed, irrespective of whether its an international website or desi. Similarly, ISPs can also charge extra for the free calls you make using services like WhatsApp, Skype and others, and eventually the load of additional payable sum by the OTT players will be pushed onto consumers.
Net Neutrality is extremely important for small business owners, startups and entrepreneurs, who can simply launch their businesses online, advertise the products and sell them openly, without any discrimination. It is essential for innovation and creating job opportunities. Big companies like Google, Twitter and several others are born out of net neutrality. With increasing Internet penetration in India and given that we are becoming a breeding ground for startups and entrepreneurs, the lack of net neutrality should worry us greatly. Besides, it is very important for freedom of speech, so that one can voice their opinion without the fear of being blocked or banned.
Equal for all! Image: Reuters
Equal for all! Image: Reuters
How activists have been fighting for it in the west?
Net neutrality isn’t something new and many activists have been battling to achieve it in the west.
In 2010, FCC had passed an order to prevent broadband Internet service providers from blocking or meddling with the traffic on the Web. Known as the ‘Open Internet Order’, it ensured the Internet remained a level playing field for all.
However, in 2014, the court said the FCC lacked the authority to do so and enforce rules. This means, telecom companies who were earlier forced to follow the rules pf net neutrality started adopting unruly ways. This also paved way for ISPs to monitor data on their networks and also allowing governments to ban or block data. Besides banning or blocking data, we also jad the high profile Netflix-Comcast tussle.
Recently, FCC has approved “net neutrality” rules that prevent Internet providers such as Comcast and Verizon from slowing or blocking Web traffic or from creating Internet fast lanes that content providers such as Netflix must pay for. European Union member states have also been striving for net neutrality.
No more a thing of the west – Net neutrality in India
Taking the recent events into account, its time net neutrality is imposed in India too.
Since the past couple of years, the instances of Internet censorship in India have increased manifold. In 2011, India adopted the new ‘IT Rules 2011’ that supplemented the IT Act 2000. These rules made it mandatory for Internet intermediaries to remove objectionable content within 36 hours of receiving complaint. But the terms included were vague and open to interpretations. These rules received sharp criticism, but they have prevailed. In 2011, government also drew flak as it asked major sites like Google, Facebook and Yahoo to ‘pre-screen’ content and remove any objectionable, defamatory content from going live.Government requests for banning content has also been on rise over the past couple of years.
On the other hand, with the increasing popularity of instant messaging apps like WhatsApp, Viber and others, telcos had started making noise against the accelerated adoption of these services. Throughout last year, they’ve have been quite vocal about their dislike for over-the-top (OTT) services, who have been cannibalizing their main revenue streams – calls and SMSes.
There was buzz around a fee being imposed on popular OTT services, but the matter fizzled out soon after TRAI rejected telcos’ proposal to do so. In a bid to make up for the losing revenue, Airtel decided to play evil Santa on Christmas 2014 and announced an extra charge on making VoIP calls. The Twitterati had gone all out condeming Airtel for the act, and the service provider had to soon retract its decision. Net neutrality got yet another blow in India with the recent announcements from Reliance and Airtel.
Messaging apps
In India, Facebook has teamed up with Reliance Communications in an effort to bring Internet.org to smartphone as well as feature phone users. But at the Mobile World Congress, telecom service providers such as Vodafone, Airtel and Telenor have made their discomfort clear when it comes to offering free Internet services over expensive telecom networks.
In order to compete with Reliance, Airtel announced Zero marketing platform allowing customers to access apps of participating app developers at zero data charges. Now, you may be wondering what is wrong if someone wants to offer free Internet? Free internet sounds tempting, but you need to be aware that you are only getting free access to services/apps which have struck a deal with the telcos. App developers and services flush with funds will not find it an issue to pay telcos for data charges. But this can leave app developers, specially start ups, who cannot afford Airtel or Reliance’s data rates at a definite disadvantage.
In India, the concept of net neutrality doesn’t exist legally. However, ISPs try to moderately not violate any laws. They’ve approached Trai for the losing revenues and are awaiting Trai’s decision on regulation IM app by OTT players. Most decisions here are made by DoT and Trai. However, it would be a good move to get things legally on paper, while Internet access in India is still at its infancy.

--------------------------------------------------------------------------------------------------------------------------
Watch An Superb Video BY #AIB

Hope you get it and send an email to TRAI..
Some Good Reference :-
Read More

Saturday, 27 December 2014

New Wallpapers

No comments:

New Wallpapers




Read More

Thursday, 4 December 2014

Crashing Whatsapp With Just an Message!!

No comments:

Crashing Whatsapp With Just An Message!!!


Whatsapp being Worlds most favourite chatting messenger now can be expoilted through a "Message".
Two 17 year researches from India have Developed it namely Indrajeet Bhuyan & Suarav Kar.
They have submitted the Video for POC :)



The Video Also Can Be Watched Here
The  Expoilt Code is:

  1. ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠
  2. ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ
  3. ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ
  4. 㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠
  5. ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠
  6. ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ
  7. ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰
  8. ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊
  9. ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
  10. ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
  11. ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
  12. ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
  13. ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
  14. ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
  15. ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
  16. ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
  17. ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
  18. ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
  19. ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
  20. ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
  21. ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
  22. ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㰟
  23. Ѝ
  24. ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
  25. ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
  26. ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
  27. ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
  28. ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
  29. ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
  30. ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
  31. ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊊ߘ㊠ ߘ
  32. ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
  33. ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
  34. ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
  35. ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
  36. ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
  37. ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
  38. ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
  39. ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
  40. ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
  41. ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
  42. ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
  43. ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
  44. ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
  45. ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
  46. ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
  47. ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
  48. ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
  49. ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
  50. ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
  51. ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
  52. ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
  53. ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
  54. ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
  55. ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
  56. ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
  57. ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
  58. ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
  59. ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
  60. ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
  61. ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
  62. ㊠ ߘ㠊



The worried impact of the vulnerability is that the user who received the specially crafted message will have to delete his/her whole conversation and start a fresh chat, because opening the message keeps on crashing WhatsApp unless the chat is deleted completely.

Thanks for THN for providing the Video.
Read More