Tutorials

How to hack Instagram accounts from a smartphone using Termux

Instagram has become one of the most popular social platforms since its origins, and it has even become a source of income for many people and therefore a target of multiple threat actors.

Many users may already know, but it is possible to compromise a user account on this platform using Termux, the terminal emulator for Android system, as mentioned in the cybersecurity course of the International Institute of Cyber Security (IICS).


Below we will show you the appropriate way to use this hacking method.

To get started, you need to make sure you have installed a compatible version of Termux on your smartphone, as well as install stable packages. Then run the following commands.


apt-get update -y
apt-get upgrade -y
pkg install python -y 
pkg install python2 -y
pkg install git -y
pip install lolcat

To install the Instagram hacking tool, run the following commands:

git clone https://github.com/noob-hackers/ighack
ls
cd ighack
ls
bash setup
bash ighack.sh

More information on how this tool works will be available in the IICS cybersecurity course. For the next step we will need an Internet connection. You can select any option by clicking on your keyboard. IMPORTANT: Do not delete any of the scripts included in the main files.

Now open a new session and type tor into it and then go back to the previous session and start the ig hack tool and start attacking the target user’s account. There is also a custom pass list option in the tool, so use the appropriate location to use the password list in the tool, for example, /sdcard/Download/pass.txt.

As in the previous example, you must use the location in a custom access list attack.

Please note that this article was prepared for informational purposes only, so IICS is not responsible for any misuse of the information contained herein. To learn more about information security risks, malware, vulnerabilities and information technologies, feel free to request information about the cybersecurity course by specialists from the International Institute of Cyber Security (IICS).


Comments
To Top

Pin It on Pinterest

Share This