{"id":387,"date":"2021-12-02T13:36:59","date_gmt":"2021-12-02T13:36:59","guid":{"rendered":"https:\/\/news4hacker.com\/?p=387"},"modified":"2023-04-19T12:48:19","modified_gmt":"2023-04-19T12:48:19","slug":"how-to-hack-social-accounts-with-phishing-tool-2021-n4h","status":"publish","type":"post","link":"https:\/\/reconcybersecurity.com\/blogs\/how-to-hack-social-accounts-with-phishing-tool-2021-n4h\/","title":{"rendered":"Hack Any Social Account With Zphisher tool | Recon Cyber Security"},"content":{"rendered":"\n<p>In this article, we are going to tell you how to gain access to anyone&#8217;s <strong>&#8221; Social Account &#8220;<\/strong> with the help of a Phishing tool called <strong>Zphisher<\/strong>. Basically, it gives you a link of a fake login page of any social media login page which you want and if you succeed to make your friend enter their id and password of their account. You will get their account access \ud83d\ude09 and if you don&#8217;t know what is phishing, It means to make a login page which looks like a real website login page so the user can trust you. So let&#8217;s start!<\/p>\n\n\n\n<p>1st go to your favorite browser and search <strong>zphisher Github<\/strong> after that you can see a link from Github just click on it and copy the code from there as shown in the image\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2021\/12\/Screenshot_20211130_023646-1024x400.png\" alt=\"\" class=\"wp-image-393\"\/><\/figure>\n\n\n\n<p>Now open your terminal and go to the destination where you have to clone this tool. As always, we are going to save this in Downloads so type <strong>( cd &lt;destination&gt; )<\/strong> after that clone your tool by typing <strong>( git clone &lt;your code&gt; )\u2026<\/strong><\/p>\n\n\n\n<p>Now you have to type two basic commands as show below :-<\/p>\n\n\n\n<p># Going inside tool directory command &#8211; <strong>cd zphisher<\/strong><\/p>\n\n\n\n<p># Giving permission to tool command &#8211; <strong>chmod 777 zphisher.sh<\/strong><\/p>\n\n\n\n<p><em>~ To check that your tool has permission, type <strong>ls<\/strong> and see the color of your tool. If your tool color gets dark that means your tool has the permission. Otherwise, you have to give it permission again&#8230;<\/em><\/p>\n\n\n\n<p>After that run your tool by the command <strong>( .\/zphisher.sh )<\/strong>. <\/p>\n\n\n\n<p><strong>Note: If your tool didn&#8217;t run by this command, type this ( bash zphisher.sh )&#8230;<\/strong><\/p>\n\n\n\n<p>Now select the social media of which you want to send the login page. We are going with instagram so we will type<strong> (2)<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2021\/12\/Screenshot_20211130_025433-1024x397.png\" alt=\"\" class=\"wp-image-394\"\/><\/figure>\n\n\n\n<p>Now here you can see 4 options you have to select anyone. We are choosing 1st option.<\/p>\n\n\n\n<p>After that you have to select a port. You can see three options here but you have to select 3rd port because 1st is for localhost which means home network and 2nd is ngrok but it is not working now\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2021\/12\/Screenshot_20211130_030127-1024x151.png\" alt=\"\" class=\"wp-image-395\"\/><\/figure>\n\n\n\n<p>Now in a few seconds, you will see two links here you have to copy URL no.1 then send it to your target\u2026<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>If you have any problem with our blog so you can comment to us we will try to fix it.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"In this article, we are going to tell you how to gain access to anyone&#8217;s &#8221; Social Account&hellip;\n","protected":false},"author":1,"featured_media":10918,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[55],"tags":[56,57],"class_list":{"0":"post-387","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-hacking-tools","8":"tag-phishing-tool","9":"tag-social-media-hacking"},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/387","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/comments?post=387"}],"version-history":[{"count":1,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/387\/revisions"}],"predecessor-version":[{"id":10919,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/387\/revisions\/10919"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media\/10918"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media?parent=387"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/categories?post=387"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/tags?post=387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}