Skip to content

Pentestblog

Menu
  • Home
  • Kali Linux
  • Blog
  • CTF Challenges
  • Course
    • Download Free Videos
  • Contact Us

What is phishing? How to protect Instagram account from phishing

By Pentestblog 16/02/2021 Phishing 0 Comments

Instagram is the most popular photo and video-sharing social website. Due to the increasing following of Instagram, A Lot of people want to Hack Instagram Account. In this blog, I will explain, How to protect the Instagram account from phishing. I will use the Phishing method to convince you.

What is Phishing

Phishing is a type of most dangerous Social Engineering Attack. It is used to steal users’ data, including Login details and Banking credentials. At this time, Instagram Account is more getting hacked. Less due to any weakness or bugs, these are more hacked by phishing. The latest Twitter Attack is its most extensive example.

Types of Phishing

  • Catphishing
  • SMS phishing
  • Spear phishing
  • Clone phishing
  • Voice phishing

Follow the Steps

If you follow this step. Then you can easily Protect your Instagram Account.

Let’s start, I am using Kali Linux 2020. First of all, You have to open Google Chrome or Mozilla Firefox browser on your Computer. Then, Go to Google and search the SocialPhish GitHub page. Now copy the git clone URL.

Socialphish github

At this stage, Open your Terminal. Then, Type git clone. Paste your URL, Press Enter Button, At once your cloning will be started.

git clone

In this stage, We will Enter in Socialphish folder. Then type the ls command, You will found a lot of scripts. But we are interested in socialphish.sh. Now we will set up permission on socialphish script. Following the below command.

chmod 755 socialphish.sh

Set Permission

Now, Following the below command.
bash socialphish.sh
There are lots of cloning pages for Phishing Attacks.

But we have interested in hacking Instagram account. For that, I choose the First Option. Then, we will select the second option.

Choose ngrok

in this stage, Ngrok server will start downloading. But we will wait till the ngrok server is started. Once the ngrok server is started then the PHP server will start. Then, the Ngrok server will generate a link. You must send this link to our target person.

ngrok generate link

As soon as, The target person will click on this link. Then, his important credential will be stolen.
Such as:- Country, Hostname, Ip-Address, Currency, etc.

In this stage, an Instagram login page will open. As soon as, The victim will fill up his credential in it. The victim’s Instagram Account details will go to the hacker. Then his Instagram account will be completely hacked.

Find Password

Protect Instagram account from phishing


If you want to avoid phishing, do not click on any unknown link. First, carefully identify that link. For that, you use a website like www.virustotal.com

Related

Add a Comment

Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • CVE-2022-30190 (Follina)-Microsoft Support Diagnostic Tool Vulnerability
  • SQL INJECTION – Extracting Username and Password From Database
  • How To Dump Username And Password Using SQLMap Tool?
  • Protected: Exploit Apache Log4j Security Vulnerabilities – CVE-2021-44228
  • Hack The Box Previse HTB CTF Machine Walkthrough

Recent Comments

  • Cysecon on Top 10 Computer Hacking Tools For Ethical Hacker
  • Cysecon on How Can I See List All Users In A MySQL Database Server
  • Cysecon on Download Our Best Hacking Videos Deleted by Youtube
  • Cysecon on Top 10 Computer Hacking Tools For Ethical Hacker
  • deutschland on What is Termux? How To Use Termux Basic Command As a Beginner?

Archives

  • June 2022
  • May 2022
  • January 2022
  • December 2021
  • November 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021

Please Share

0
0
0
0
1
0
0
0
0

Follow Us

Pentestblog Youtube

RSS Pentestblog

  • CVE-2022-30190 (Follina)-Microsoft Support Diagnostic Tool Vulnerability

Categories

  • 0 Day CVE
  • 0-Day
  • Android Hacking
  • Apache Log4j
  • Blog
  • CTF Challange
  • CVE
  • Ethical Hacking
  • Gadgets
  • Hack the Box
  • Kali Linux
  • OSCP
  • Phishing
  • SQL Injeciton
  • SQL Injection
  • WordPress Hacking

Other Pages

  • Privacy Policy
  • DMCA
  • Terms and Conditions
  • About Us
  • Contact Us
  • Our Videos
  • Our Course
  • CTF Challenges
Pentestblog Copyright © 2022.
Created by Sandeep Yadav (Ethical Hacker) Back to Top ↑