redvers
Performance Tuner
2
MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1
400 XP

Hey Folks, in this tutorial we are going to talk about the multiple ways from which we can take over Instagram accounts and even collect information related to victim profiles using OSINT tool. Today most of the youth want to access another person’s social media account, which may be their neighbor, friend, girlfriend etc. Usually most people fall into the attacker trap because they are familiar with hacking and methods, but this tutorial will help you protect yourself against the attacker.
Keep in Mind : “The article is made for educational purposes only, so do not misuse it ”.
Lets take a look

Let’s talk about the methods first and if I talk as a beginner, there are such two options from which we can access another person’s Instagram accounts.
- BruteForce Attack
- Soical Engineering -> Phishing Attack
Instead, there is no option left from which we can access another person’s account. But the only person who can do it as per the need is the bug hunter.
Lets move toward attacks

BruteForce Attack
First we will talk about an bruteforce tool and there are many such tools available on github but we will use it just for demonstration and show you how attackers do it. So first we will download it from github and then go to the directory of this tool.
git clone https://github.com/Pure-L0G1C/Instagram.git
cd Instagram12git clone
https://github.com/Pure-L0G1C/Instagram.gitcd Instagram
We have already fulfilled all the requirements of this tool but in your case you have to execute all the commands one by one.
apt install python
apt install python3
apt install python3-pip
pip3 install -r requirements.txt1234apt install pythonapt install python3apt install python3-pippip3 install-rrequirements.txt

After doing the above process we can start this tool using pyhon3 tool or given command.
python3 instagram.py -h1python3 instagram.py-h

Wait


Keep understand the command that is given below in order to make powerful wordlist.
Usage

crunch 3 6 secnhack -o /root/word.txt1crunch36secnhack-o/root/word.txt

Time to perform bruteforce attack. See the command below in which we will add the name and path of the password file generated by the crunch tool.
Usage


Great

Phishing Attack
Social Engineering is one of basic attack in which we can execute our plan with minimum efforts. But success of the phishing attack is always depend upon the social engineering and the more social engineering skills you have, the better for you. The same scenario we are taking and will show you how attackers do. For this demonstration we will use the AdvPhishing tool which is a latest phishing tool that allows us to easily access other users’ social media accounts, even if TFO is enabled on the user account then we can bypass it too. If you want to know in deep then you can visit here. Installation is very simple and just you have to execute the same command that are given below.
git clone https://github.com/Ignitetch/AdvPhishing.git
cd AdvPhishing/
chmod 777 *
./Linux-Setup.sh1234git clone
https://github.com/Ignitetch/AdvPhishing.gitcd AdvPhishing/chmod777*./Linux-Setup.sh

Note : If you are using mobile applications such as Termux then you have to execute the “./Android-Setup.sh” command.

Give it a few minutes and they will do all the things themselves. In between you will see a message like the one below in which you have to enter your ngrok token which will be found from here.

Thats it

./AdvPhishing.sh1./AdvPhishing.sh

Choose the Instagram option and proceed towards obtaining a phishing link. As soon we get the phishing link we will share it to the victim through the social engineering. Also you can consider the phishing URL that look like real domain.

Technique : When victim enter his credentials, you need to go to original website and use those credentials to send real OTP to victim. Once he enter that OTP such OTP will also be there with you and you will be allowed to login the account before him.

Wow


OSINT – Information Gathering
We already discussed about this tool and you can visit from here. Now we will take the help of this tool and will try to get details of another person’s profile from this h@cked account. You can go to the complete installation web page of this tool from the above link.

Here you can see the interface and useful features of this tool.

Followers
As you can see the victim will not be aware that we are using his account and we will get all the information related to the target.

Info
Collect information of specific Instagram user.

There are other options in this tool from which we can collect more information against the target.

Followers Increase and Decrease
Most beginners will be really happy to see this topic in this article


git clone https://github.com/masokky/instagram-tools.git
cd instagram-tools
yum install nodejs12 && apt install nodejs && pkg install nodejs
node index.js1234git clone
https://github.com/masokky/instagram-tools.gitcd instagram-toolsyum install nodejs12&&apt install nodejs&&pkg install nodejsnode index.js

The tool is really doing work and as below you can see that in order to successfully connect to your account you have to give Instagram credentials for which you want to increase followers. Make sure to give name of any account.

Done


Keep in Mind : “The article is made for educational purposes only, so do not misuse it ”.
About the AuthorShubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.