Skip to content

Pentestblog

Menu
  • Home
  • Kali Linux
  • Blog
  • CTF Challenges
  • Course
    • Download Free Videos
  • Contact Us

What is phishing? How to protect Instagram account from phishing

By Pentestblog 16/02/2021 Phishing 3 Comments

Instagram is the most popular photo and video-sharing social website. Due to the increasing following of Instagram, A Lot of people want to Hack Instagram Account. In this blog, I will explain, How to protect the Instagram account from phishing. I will use the Phishing method to convince you.

What is Phishing

Phishing is a type of most dangerous Social Engineering Attack. It is used to steal users’ data, including Login details and Banking credentials. At this time, Instagram Account is more getting hacked. Less due to any weakness or bugs, these are more hacked by phishing. The latest Twitter Attack is its most extensive example.

Types of Phishing

  • Catphishing
  • SMS phishing
  • Spear phishing
  • Clone phishing
  • Voice phishing

Follow the Steps

If you follow this step. Then you can easily Protect your Instagram Account.

Let’s start, I am using Kali Linux 2020. First of all, You have to open Google Chrome or Mozilla Firefox browser on your Computer. Then, Go to Google and search the SocialPhish GitHub page. Now copy the git clone URL.

Socialphish github

At this stage, Open your Terminal. Then, Type git clone. Paste your URL, Press Enter Button, At once your cloning will be started.

git clone

In this stage, We will Enter in Socialphish folder. Then type the ls command, You will found a lot of scripts. But we are interested in socialphish.sh. Now we will set up permission on socialphish script. Following the below command.

chmod 755 socialphish.sh

Set Permission

Now, Following the below command.
bash socialphish.sh
There are lots of cloning pages for Phishing Attacks.

But we have interested in hacking Instagram account. For that, I choose the First Option. Then, we will select the second option.

Choose ngrok

in this stage, Ngrok server will start downloading. But we will wait till the ngrok server is started. Once the ngrok server is started then the PHP server will start. Then, the Ngrok server will generate a link. You must send this link to our target person.

ngrok generate link

As soon as, The target person will click on this link. Then, his important credential will be stolen.
Such as:- Country, Hostname, Ip-Address, Currency, etc.

In this stage, an Instagram login page will open. As soon as, The victim will fill up his credential in it. The victim’s Instagram Account details will go to the hacker. Then his Instagram account will be completely hacked.

Find Password

Protect Instagram account from phishing


If you want to avoid phishing, do not click on any unknown link. First, carefully identify that link. For that, you use a website like www.virustotal.com

Related

3 Comments

  1. Ryan Harish 09/09/2022

    The professional hacker true out the word that I believed in him is only Henryclarkethicalhacker Group Hackers Checked Google and see everybody comments on him he a professional that I believed in him if you have problems on any stuffed like a bank, company, school grades change examinations, database, Social media hacks, Email hacks, Phone hacks, Bitcoin hacks, increased Credit score boost to 800, School result upgrading, cryptocurrency, Binary option funds recovery, Bitcoin Mining, Instagram, WhatsApp, Twitter, Monitor your colleague, access your spouse social media, and a lot more, via, ,

    Reply
  2. Kate Lorena 05/02/2023

    Contact him for any type of hacking, he is a professional hacker that specializes in exposing cheating spouses, and every other hacking related issues. he is a cyber guru, he helps catch cheating spouses by hacking their communications like call, Facebook, text, emails, Skype, whats-app and many more. I have used this service before and he did a very good job, he gave me every proof I needed to know that my fiancee was cheating. You can contact him on his email to help you catch your cheating spouse, or for any other hacking related problems, like hacking websites, bank statement, grades and many more. he will definitely help you, he has helped a lot of people, contact him on, , and you can Text/Call &WhatsApp: +1 (773)-609-2741, or +1201-430-5865, and figure out your relationship status. I wish you the best.

    Reply
  3. Lizzy Agnes 24/09/2023

    A great hacker is really worthy of good recommendation , Henry
    really help to get all the evidence i needed against my husband and
    and i was able to confront him with this details from this great hacker
    to get an amazing service done with the help ,he is good with what he does and the charges are affordable, I think all I owe him is publicity for a great work done via, , and you can text, call him on whatsapp him on +12014305865, or +17736092741,

    Reply

Add a Comment

Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Protected: How To Mount USB Drive in Ubuntu Linux
  • CVE-2022-30190 (Follina)-Microsoft Support Diagnostic Tool Vulnerability
  • SQL INJECTION – Extracting Username and Password From Database
  • How To Dump Username And Password Using SQLMap Tool?
  • Protected: Exploit Apache Log4j Security Vulnerabilities – CVE-2021-44228

Recent Comments

  • Lizzy Agnes on How To Install AnyDesk In Ubuntu 20.04/18.04
  • Lizzy Agnes on Hack The Box (HTB) OSCP-Like machines List 2022
  • Lizzy Agnes on What is Termux? How To Use Termux Basic Command As a Beginner?
  • Lizzy Agnes on Download Our Best Hacking Videos Deleted by Youtube
  • Lizzy Agnes on Top 10 Best Computer Hacking Gadgets List 2022 For Hackers

Archives

  • January 2023
  • June 2022
  • May 2022
  • January 2022
  • December 2021
  • November 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021

Please Share

0
0
0
0
1
0
0
0
0

Follow Us

Pentestblog Youtube

RSS Pentestblog

  • Protected: How To Mount USB Drive in Ubuntu Linux

Categories

  • 0 Day CVE
  • 0-Day
  • Android Hacking
  • Apache Log4j
  • Blog
  • CTF Challange
  • CVE
  • Ethical Hacking
  • Gadgets
  • Hack the Box
  • Kali Linux
  • nothing
  • OSCP
  • Phishing
  • SQL Injeciton
  • SQL Injection
  • WordPress Hacking

Other Pages

  • Privacy Policy
  • DMCA
  • Terms and Conditions
  • About Us
  • Contact Us
  • Our Videos
  • Our Course
  • CTF Challenges
Pentestblog Copyright © 2024.
Created by Sandeep Yadav (Ethical Hacker) Back to Top ↑