How to hack any social media account?

Yashwant Singh 🐧
System Weakness
Published in
4 min readNov 9, 2022

--

Everyone knows that this is one of the most asked questions on the internet. So, let’s answer. But first, let me break the question into parts:

  1. Can you hack a social media account? : Yes you can!

2. Can you hack it easily, as shown in the movies? : No way in hell!

Expectation v/s Reality

Requirements:

  1. Any Linux terminal, it is possible on windows though too.
  2. Internet connection of course!
crying over the internet

3. Patience

4. Good sense of humor! (optional)

Let’s begin! First of all, we need to understand, what we are going to do and what will be the final result. We are going to do a very simple attack, notoriously known as “Phishing”, and some “Social engineering”.

Phishing is a type of social engineering where an attacker sends a fraudulent message (link) designed to trick a person into revealing sensitive information to the attacker. All we have to do is to know, how to make the fraudulent message (link) and how to send it to the victim, so that he won’t suspect that it is fraudulent.

We are going to use a very awesome tool called ‘PyPhisher’. It is available on GitHub. (If you don’t know what GitHub is, it is like a platform where numerous programs and code are hosted). Now, let’s set up our PyPhisher!

TYPE THE FOLLOWING COMMANDS IN YOUR TERMINAL AS IS:

Clone this repository

Enter the directory

  • cd PyPhisher

Install all modules

  • pip3 install -r files/requirements.txt

Run the tool

  • python3 pyphisher.py

After the setup, it would look like this:

PyPhisher Options

Now, let’s say, we want to hack someone’s Twitter account. All you have to do is enter the code adjacent to it. For Twitter, it is 16. You should get something like this after entering 16.

Now, to keep it simple we say, no we don’t want the OTP page. Type ’n’ and press enter. It will ask for these too. You can modify them, but for now, I am going to keep it simple. Press Enter…Enter!

Now here comes the magic! There you go!

You can see the links in the image here, those are the links to our phishing page.

We got the phishing link :)

If you send any of those links to anyone and if the victim clicks on them, then our mission will be considered a success. Let me show you how it looks from a different perspective, In the victim’s browser (after clicking the link):

#MemesOnOccassion
Victim’s browser

Now, as stupid as people are. They will enter the email and the password here as expected thinking that they are logging in, on Twitter. But actually, they are giving us the information.

Now, here comes the next part “the social engineering”, now figure out a way and use some creativity to deliver this link to your target,(you can use HTML email, etc.) and hope he/she clicks on it. If he/she does, he/she is fu*ked. And, after all of this you can do this:

follow me too:)

Now, Like a good boy it is my duty to tell you that, doing this is not illegal but, if you are doing it to a person without their knowledge, then it’s illegal. So, be a good boy and don’t hack anyone without their written and signed permission.

In my next article we will discuss the depth and feelings of this meme:

#memes

--

--