Skip to playerSkip to main contentSkip to footer
  • 6/23/2025
🔒 Learn how hackers target Instagram using advanced phishing techniques and social engineering tools to steal passwords. In this video, we cover:

• Guided phishing with Zphisher and MaxPhisher
• Live examples of phishing kit templates
• How social engineering tricks victims into sharing credentials
• Security threats like 2FA bypass and malicious “account recovery” bots
• 🔐 Safety tips: identifying fake links, enabling 2FA, verifying domains

This is an educational demo—all attacks shown are for ethical hacking labs only.

#EthicalHacking #InstagramHacking #PhishingAttack #CyberSecurity #Zphisher #MaxPhisher #SocialEngineering #2FA #SecurityAwareness


#EthicalHacking
#InstagramHacking
#CyberSecurity
#PhishingAttack
#SocialEngineering
#Zphisher
#MaxPhisher
#2FA
#SecurityAwareness
#HackingTools
#EthicalHacker
#Infosec
#PasswordSecurity
#AccountRecovery
#LearnHacking
#CyberAttack









#EthicalHacking
#CyberSecurity
#CyberAwareness
#TryHackMe
#HackTheBox
#KaliLinux
#NmapTutorial
#BurpSuite
#Pentesting
#CyberDefense
#HackingForBeginners
#LearnHacking
#InfoSec
#WhiteHatHacker
#CyberMindLab
#USCyberSecurity
#SecurityTools
#CTFChallenges
#HackingLegally
#TechEducation

Category

🤖
Tech
Transcript
00:00well hello friends in today's video we will talk about how hackers hack the
00:12password of your Instagram account if you guys do not use two-factor
00:17authentication so by using some simple basic tools you guys can also hack
00:22anyone's Instagram account so let me tell you step by step in this video how
00:27all this happens so here first of all you have to come on your terminal and here
00:33you have to do sudo apt update you have to update your system once after
00:40updating you will also have to install git because we are going to download a
00:44repository from github so for this here we will just do sudo 8 pit install git here
00:51git is already installed in my system and now we will install a tool so for this
00:57you have to come on your browser and here you have to search github simply so
01:01here I search gh hub and then we will open gth so here we will search for that
01:07tool now so here I will simply search social media hacking toolkit and here you
01:16have to give the spelling and uppercase lowercase properly so if you guys make a
01:21little change in uppercase then that repository does not show there in these
01:24case so here you can see that we have got a lot of repositories but the one we
01:29are going to use is this one social media hacking with Corrections
01:35so here I will open it and from here we will just copy its URL and again we will
01:40come inside the terminal and here I will do get clone and the URL that we had
01:44copied will be pasted here and entered
01:48so here this repository will be downloaded inside our system so here we wait for
01:54some time and let it download all right so here it has been downloaded inside our
02:00system so now we have to download some dependencies to run it so for this we will
02:06do CD so what do we do first here by doing CD I go inside this social media
02:11toolkit once okay and here we have to install some dependencies first so what
02:18will we do here using the CD command we have to come inside the dependency
02:22directory here so you have to do LS here once so here I will give a command here I
02:31am facing some problem with dependencies so for this I will give a command here if it
02:36happens inside your system then you can skip this command but now if you are
02:41also getting an error then you have to do sudo apt install so here we will give
02:49that command again once so now this Windscribe of ours has been completely
02:53installed inside our system so now what will we do simple once you come inside
02:58the browser you have to search for windy and you have to sign into this website so
03:04here I will quickly sign in once here you guys can use your temporary mail and
03:09sign in here so here I am already signed in so here I will come inside the
03:15terminal again and clear it once and here you just have to give a simple command
03:21Windscribe login and as you hit it it will ask you for the username here and here
03:26you have to enter the username which you had given while signing in on that
03:29website so here I will give my username here and the password which
03:34you had given there you also have to give it here so here you will also get a
03:40message logged in so that means you have successfully logged in so here we can
03:45remain anonymous with the help of this basically it provides us a VPN which is
03:50completely free so after this is done I clear it again and now we will come out
03:56of the dependency folder so here I will do cd dot dot now we will have to install
04:01some requirements as well what will we do for this cdcmd directory you have to
04:06come inside it
04:09so here I will do cdcmd and you have to execute this requirement here
04:15so what will I do simply for this pep3 install hfnr and I will give the
04:22requirement here and enter it you can see here I am getting an error because I had
04:28to create an environment here so here I created temporary environment here so for
04:34this here I will simply type python3 hfnm and give the name of the environment
04:39here you also have to give this command inside your system okay the environment has
04:44been created here now I will activate it so for this there is just one command
04:48source my environment and be activated so here you can see my environment has
04:52been activated and if I give the same command again then my requirements will
04:58be installed here okay so after this we will come out of cmd again our work is
05:05almost done so what do we have to do here now Linux we just have to give it
05:10executable permission so there is a command for this too so that is
05:13chmode plus xlinux and I will hit enter so here it has got the executable permission
05:20so now we will just run the tool for this you just have to do dot forward Linux and hit
05:27enter so your tool will run properly here so here we wait for a while here it will take
05:33a little loading so here you can see that this tool supports these various social medias
05:38so here now we are going to see for Instagram so here I will do one and here one is asking us
05:44whether you want to use VPN or not so here we have done all the setup of VPN so we will do one
05:49and after that you can see here we have three attacks here we can perform on Instagram
05:54first is brute force and mass report and phishing so here we are going to see brute force and we will
06:01see mass report and phishing in the upcoming videos so here we do one for brute force and you just have
06:07to give the username of the target here Instagram so here I give my username here here you have to
06:15give a word list I have already made a video on this where I told you how you can create your own
06:20word list so you guys should go and check out this video once so what do I have to do here now just give
06:27that word list here the word list that you have created you just have to paste it here inside the
06:32word list folder inside the social media toolkit directory so you can see here that I have pasted
06:38it here and this target based word list that we have given here you just have to enter its name here
06:44and press enter here this tool will try different passwords with different IPs and you can see here
06:53that this tool has got the password of this account so here you can see how simple it is to find
06:58anyone's password if we have an over list related to it so now you can understand that if you have
07:06not used 2fa then anyone can easily log into your account here so see you in the next video till then bye bye

Recommended