Sponsored
Soical Engineering

Takeover Instagram Accounts Like A Pro

Hey Folks, in this tutorial we are going to demonstrate a method using which you can easily take over the user’s Instagram account. Actually this is a minor weakness in Instagram’s website that allows us to embed any external URL with the official URL of Instagram and redirect users to the external site provided by us. Well now you will know everything by staying with us till the end.

Let’s move on 🙂 !!

Important Setup

So we can’t make much profit by embedding normal URL and we are writing this article specifically to takeover Instagram account so we need to create phishing URL of Instagram for which we will use advphishing tool. You can visit the below mentioned URL once for complete setup of advphishing tool. Just hold on tight to the phishing URL.

https://secnhack.in/advphishing-otp-bypass-phishing-tool/

Grab Original URL of Instagram

Listen carefully 🙁 !! As we know that most of the Instagram users keep on adding some external sources to their Instagram profile as shown in the image below. So all you have to do is copy the hidden URL by double clicking on it.

Modify and Embedding

Now paste the entire copied URL in your notepad but in our case we are doing this all through kali linux for some reason. Ok 🙂 !! Just look at the highlighted part of the copied URL which we need to replace with our created phishing URL and after doing this the URL will look like shown in the picture. Now as you can see the URL does not look like any malicious URL and now anyone can click on it without much thought. Now it’s time to send the URL to the victim through fake social media handlers.

GOOD 🙂 !! Now as soon as the victim clicks on that URL, the phishing page will magically open on the victim’s device instead of the original page.

BOOOM 🙂 !! Now when the victim will enter the credentials to login to his account, in reality he will come to us.

About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
Sponsored

View Comments

Recent Posts

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 month ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

8 months ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

2 years ago

API Security Testing 101: Know Everything About API Security Testing!

The security of your API should be one of the top priorities of companies. Without…

2 years ago

7 Best Tools for Web Penetration Testing: Comprehensive Details

Hey Folks, In today's business world, it is essential to have an online presence. However,…

2 years ago

Cyber Security Audits: Everything You Need to Know About It

Hey Folks, Is your business prepared in case of a cyber attack? Many companies don't…

2 years ago
Sponsored

This website uses cookies.