How to hack any social media account?
Everyone knows that this is one of the most asked questions on the internet. So, letâs answer. But first, let me break the question into parts:
- Can you hack a social media account? : Yes you can!
2. Can you hack it easily, as shown in the movies? : No way in hell!

Requirements:
- Any Linux terminal, it is possible on windows though too.
- Internet connection of course!

3. Patience
4. Good sense of humor! (optional)
Letâs begin! First of all, we need to understand, what we are going to do and what will be the final result. We are going to do a very simple attack, notoriously known as âPhishingâ, and some âSocial engineeringâ.
Phishing is a type of social engineering where an attacker sends a fraudulent message (link) designed to trick a person into revealing sensitive information to the attacker. All we have to do is to know, how to make the fraudulent message (link) and how to send it to the victim, so that he wonât suspect that it is fraudulent.

We are going to use a very awesome tool called âPyPhisherâ. It is available on GitHub. (If you donât know what GitHub is, it is like a platform where numerous programs and code are hosted). Now, letâs set up our PyPhisher!
TYPE THE FOLLOWING COMMANDS IN YOUR TERMINAL AS IS:
Clone this repository
git clone https://github.com/KasRoudra/PyPhisher
Enter the directory
cd PyPhisher
Install all modules
pip3 install -r files/requirements.txt
Run the tool
python3 pyphisher.py
After the setup, it would look like this:

Now, letâs say, we want to hack someoneâs Twitter account. All you have to do is enter the code adjacent to it. For Twitter, it is 16. You should get something like this after entering 16.

Now, to keep it simple we say, no we donât want the OTP page. Type ânâ and press enter. It will ask for these too. You can modify them, but for now, I am going to keep it simple. Press EnterâŚEnter!

Now here comes the magic! There you go!
You can see the links in the image here, those are the links to our phishing page.

If you send any of those links to anyone and if the victim clicks on them, then our mission will be considered a success. Let me show you how it looks from a different perspective, In the victimâs browser (after clicking the link):


Now, as stupid as people are. They will enter the email and the password here as expected thinking that they are logging in, on Twitter. But actually, they are giving us the information.
Now, here comes the next part âthe social engineeringâ, now figure out a way and use some creativity to deliver this link to your target,(you can use HTML email, etc.) and hope he/she clicks on it. If he/she does, he/she is fu*ked. And, after all of this you can do this:

Now, Like a good boy it is my duty to tell you that, doing this is not illegal but, if you are doing it to a person without their knowledge, then itâs illegal. So, be a good boy and donât hack anyone without their written and signed permission.
In my next article we will discuss the depth and feelings of this meme:
