Sponsored
Exploiting Tools

Ways to Takeover Instagram Accounts

Hey Folks, in this tutorial we are going to talk about the multiple ways from which we can take over Instagram accounts and even collect information related to victim profiles using OSINT tool. Today most of the youth want to access another personโ€™s social media account, which may be their neighbor, friend, girlfriend etc. Usually most people fall into the attacker trap because they are familiar with hacking and methods, but this tutorial will help you protect yourself against the attacker.

Keep in Mind : โ€œThe article is made for educational purposes only, so do not misuse it โ€.

Lets take a look ๐Ÿ™‚ !!

Letโ€™s talk about the methods first and if I talk as a beginner, there are such two options from which we can access another personโ€™s Instagram accounts.

  • BruteForce Attack
  • Soical Engineering -> Phishing Attack

Instead, there is no option left from which we can access another personโ€™s account. But the only person who can do it as per the need is the bug hunter.

Lets move toward attacks ๐Ÿ™‚ !!

BruteForce Attack

First we will talk about an bruteforce tool and there are many such tools available on github but we will use it just for demonstration and show you how attackers do it. So first we will download it from github and then go to the directory of this tool.

git clone https://github.com/Pure-L0G1C/Instagram.git
cd Instagram

We have already fulfilled all the requirements of this tool but in your case you have to execute all the commands one by one.

apt install python
apt install python3
apt install python3-pip
pip3 install -r requirements.txt

After doing the above process we can start this tool using pyhon3 tool or given command.

python3 instagram.py -h

Wait ๐Ÿ™‚ As you know about the bruteforce technique, in which we require multiple combinations of username and password and for this purpose we will use kali linux inbuilt tool called โ€œCrunchโ€œ. Just execute โ€œCrunchโ€ and the tool will launch on the terminal.

Keep understand the command that is given below in order to make powerful wordlist.
Usage ๐Ÿ™‚ crunch < min length > < max length > your keywords -o < output path >

crunch 3 6 secnhack -o /root/word.txt

Time to perform bruteforce attack. See the command below in which we will add the name and path of the password file generated by the crunch tool.
Usage ๐Ÿ™‚ python3 instagram.py < Username > /root/word.txt

Great ๐Ÿ™‚ We do not need to do more! As you can see, as soon as we execute the command, it gives us the password of another personโ€™s Instagram account in a few minutes.

Phishing Attack

Social Engineering is one of basic attack in which we can execute our plan with minimum efforts. But success of the phishing attack is always depend upon the social engineering and the more social engineering skills you have, the better for you. The same scenario we are taking and will show you how attackers do. For this demonstration we will use the AdvPhishing tool which is a latest phishing tool that allows us to easily access other usersโ€™ social media accounts, even if TFO is enabled on the user account then we can bypass it too. If you want to know in deep then you can visit here. Installation is very simple and just you have to execute the same command that are given below.

git clone https://github.com/Ignitetch/AdvPhishing.git
cd AdvPhishing/
chmod 777 *
./Linux-Setup.sh

Note : If you are using mobile applications such as Termux then you have to execute the โ€œ./Android-Setup.shโ€ command.

Give it a few minutes and they will do all the things themselves. In between you will see a message like the one below in which you have to enter your ngrok token which will be found from here.

Thats it ๐Ÿ™‚ !! Now we can use this tool using the below command without any further formalities.

./AdvPhishing.sh

Choose the Instagram option and proceed towards obtaining a phishing link. As soon we get the phishing link we will share it to the victim through the social engineering. Also you can consider the phishing URL that look like real domain.

Technique : When victim enter his credentials, you need to go to original website and use those credentials to send real OTP to victim. Once he enter that OTP such OTP will also be there with you and you will be allowed to login the account before him.

Wow ๐Ÿ™‚ !! Once all the processing is done, we can get the credentials of another account, whether TFO is enabled or not, we can bypass security and take over instagram accounts.

OSINT โ€“ Information Gathering

We already discussed about this tool and you can visit from here. Now we will take the help of this tool and will try to get details of another personโ€™s profile from this h@cked account. You can go to the complete installation web page of this tool from the above link.

Here you can see the interface and useful features of this tool.

Followers

As you can see the victim will not be aware that we are using his account and we will get all the information related to the target.

Info

Collect information of specific Instagram user.

There are other options in this tool from which we can collect more information against the target.

Followers Increase and Decrease

Most beginners will be really happy to see this topic in this article ๐Ÿ™‚ ๐Ÿ™‚ !! But if you are a professional cyber security expert then you can leave it now. Lets see how we can do it. The tool is available on github and you can configure it using the below command.

git clone https://github.com/masokky/instagram-tools.git
cd instagram-tools
yum install nodejs12 && apt install nodejs && pkg install nodejs
node index.js

The tool is really doing work and as below you can see that in order to successfully connect to your account you have to give Instagram credentials for which you want to increase followers. Make sure to give name of any account.

Done ๐Ÿ™‚ Finally you can see the result on your Instagram account which you have chosen according to your own.

Keep in Mind : โ€œThe article is made for educational purposes only, so do not misuse it โ€.

About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
Sponsored

View Comments

Recent Posts

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 month ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

8 months ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

2 years ago

API Security Testing 101: Know Everything About API Security Testing!

The security of your API should be one of the top priorities of companies. Without…

2 years ago

7 Best Tools for Web Penetration Testing: Comprehensive Details

Hey Folks, In today's business world, it is essential to have an online presence. However,…

2 years ago

Cyber Security Audits: Everything You Need to Know About It

Hey Folks, Is your business prepared in case of a cyber attack? Many companies don't…

2 years ago
Sponsored

This website uses cookies.