• We just launched and are currently in beta. Join us as we build and grow the community.

Takeover Instagram Accounts Like A Pro

Daynicyo

Microservice Integrator
D Rep
0
0
0
Rep
0
D Vouches
0
0
0
Vouches
0
Posts
156
Likes
106
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 300 XP
Blue-and-White-Calm-Education-YouTube-Thumbnail.png


Hey Folks, in this tutorial we are going to demonstrate a method using which you can easily take over the userā€™s Instagram account. Actually this is a minor weakness in Instagramā€™s website that allows us to embed any external URL with the official URL of Instagram and redirect users to the external site provided by us. Well now you will know everything by staying with us till the end.

Letā€™s move on šŸ™‚ !!

Important Setup

So we canā€™t make much profit by embedding normal URL and we are writing this article specifically to takeover Instagram account so we need to create phishing URL of Instagram for which we will use advphishing tool. You can visit the below mentioned URL once for complete setup of advphishing tool. Just hold on tight to the phishing URL.


1.png

Grab Original URL of Instagram

Listen carefully šŸ™ !! As we know that most of the Instagram users keep on adding some external sources to their Instagram profile as shown in the image below. So all you have to do is copy the hidden URL by double clicking on it.

2.png

Modify and Embedding

Now paste the entire copied URL in your notepad but in our case we are doing this all through kali linux for some reason. Ok šŸ™‚ !! Just look at the highlighted part of the copied URL which we need to replace with our created phishing URL and after doing this the URL will look like shown in the picture. Now as you can see the URL does not look like any malicious URL and now anyone can click on it without much thought. Now itā€™s time to send the URL to the victim through fake social media handlers.

3.png


GOOD šŸ™‚ !! Now as soon as the victim clicks on that URL, the phishing page will magically open on the victimā€™s device instead of the original page.

4.png


BOOOM šŸ™‚ !! Now when the victim will enter the credentials to login to his account, in reality he will come to us.

5.png
About the AuthorShubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
 

428,602

311,185

311,194

Top