<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[AlirezaieS]]></title><description><![CDATA[AlirezaieS]]></description><link>https://blog.sadegh.org</link><generator>RSS for Node</generator><lastBuildDate>Wed, 15 Apr 2026 03:49:19 GMT</lastBuildDate><atom:link href="https://blog.sadegh.org/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[Instagram Private Page Stalking]]></title><description><![CDATA[DISCLAIMER
THIS HAS BEEN ISSUED AND WRITTEN ONLY FOR EDUCATIONAL PURPOSES ONLY, TO SEE HOW HACKERS USE SOCIAL ENGINEERING FOR RECONNAISSANCE AND HARVEST INFORMATION ABOUT THEIR TARGETS WE HAVE TO USE THIS TO BE INFORMED AND REALIZE HOW TO PREVENT THI...]]></description><link>https://blog.sadegh.org/instagram-private-page-stalking</link><guid isPermaLink="true">https://blog.sadegh.org/instagram-private-page-stalking</guid><category><![CDATA[instagram]]></category><category><![CDATA[social engineering]]></category><category><![CDATA[reconnaissance ]]></category><category><![CDATA[staking]]></category><category><![CDATA[instagram-hacks]]></category><dc:creator><![CDATA[Mohammad Sadegh Alirezaie]]></dc:creator><pubDate>Fri, 30 Jan 2026 23:39:37 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1769811335646/2d8fce5f-60a7-4caa-899b-dc1641bd36cc.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-disclaimer">DISCLAIMER</h2>
<p><strong>THIS HAS BEEN ISSUED AND WRITTEN ONLY FOR EDUCATIONAL PURPOSES ONLY, TO SEE HOW HACKERS USE SOCIAL ENGINEERING FOR RECONNAISSANCE AND HARVEST INFORMATION ABOUT THEIR TARGETS WE HAVE TO USE THIS TO BE INFORMED AND REALIZE HOW TO PREVENT THIS TO BE HAPPEN TO KEEP OUR PRIVACY SAFE, I DO NOT CONSENT TO MISUSING THIS METHOD IN ANY FORM AND I DO NOT ACCEPT ANY RESPONSIBILITY.</strong></p>
<h2 id="heading-metadata">Metadata</h2>
<p>Tags: #Instagram #social_engineering #recon #stalking #illegal</p>
<p><strong>EXPOSED: TRUE</strong></p>
<p><strong>Skills needed:</strong></p>
<ul>
<li><p>Social Engineering</p>
</li>
<li><p>Creating anonymous accounts (fake / anonymous email and phone number)</p>
</li>
<li><p>Anonymizing your network</p>
</li>
</ul>
<p><strong>Chance of succession:</strong> 60% to 85%</p>
<p><strong>Works until:</strong> Instagram profile suggestions box in a private profile exists &amp;&amp; it suggests people who follows the victim, followed by victim or both.</p>
<p><strong>Source of this method:</strong> <a target="_blank" href="https://sadegh.org">Mohammad Sadegh Alirezaie</a></p>
<h2 id="heading-description">Description</h2>
<p>This method has been used and worked to get into an Instagram private account for gathering any information shared over that private account, what you get at the end is an Instagram account that uses to follow and trick the victim to accept your follow request on Instagram account;</p>
<p><strong>What you can get and see:</strong></p>
<ul>
<li><p>All the victim’s posts (if there are any)</p>
</li>
<li><p>All the victim's story highlights (if there are any)</p>
</li>
<li><p>Any comment available below their posts</p>
</li>
<li><p>All the followers and the followings list</p>
</li>
<li><p>Public / available posts that the victim has been tagged on</p>
</li>
<li><p>Reposted contents by the victim</p>
</li>
<li><p>Being able to send messages to the victim (as some people limit their messages to their followers/followings) for any purpose (further social engineering attacks and so on.)</p>
</li>
</ul>
<h2 id="heading-instructions">Instructions</h2>
<p>This method uses Instagram feature we all see in almost every profile we visit,</p>
<p>Every profile we visit has a box called “Suggested for You” which shows us some Instagram accounts that could be related to us (or at least Instagram thinks that way), the thing is when we visit an Instagram account, most of the accounts that suggested below that profile are related to that profile, and there are high chances that both account are being followed by each other, this is exactly what we (as attacker) are going to use;</p>
<p>The First step is to visit our victim’s account and navigate through the suggestion box, as we (as attacker) should have be sure, we’re going to look for some public profiles that has been suggested, open them one by one and check if the both victim and that public profile has been following each other, if so, BINGO! we have found or impersonation account and we mover through the next step;</p>
<p>The second step is to create an Instagram account with the information and photos of the public profile we have found, the best practice is to switch it to a private profile and uses some good texts for bio (like ‘pv page’ or ‘close friends only’) and also have some follows and followers to look more legit, now everything is ready to move to the final step;</p>
<p>The Third step is to send a follow request to to our victim, the profile we want to stalk, what happens here is that most of people never validate the source of request, like calling their friends to see if they’re the real one behind those account or asking if they have truly created a new account so the victim thinks that it’s just another new profile for any reason and accepts the follow request of the attacker, and on that basis attacker gains permission to get and overview of the victim’s followings and followers and so on, It’s also good the remove or footprints as much as we can and remove the account after we finish gathering our information.</p>
<h2 id="heading-conclusion">Conclusion</h2>
<p>In this article we learned how attackers and hackers may use social engineering to gain access to your private Instagram data, it’s also best to validate every request we receive and check if that’s valid, today’d world might look like a big mess but the solution is not to remove the question and giveaway our chances of using Internet and Social Media but gain more knowledge to be more consciousness;</p>
<p>I hope this would have been helpful to you, feel free to share, subscribe to the newsletter or contact me anytime you want.</p>
]]></content:encoded></item><item><title><![CDATA[Hello World!]]></title><description><![CDATA[Dear my friends, here is my first blog post after a decade, I’m not sure if I’m going to go with Hashnode and post here and move on, or use Hugo;
I haven’t make the decision yet but in a few hours I would make my choice,
However, whatever happens I’m...]]></description><link>https://blog.sadegh.org/hello-world</link><guid isPermaLink="true">https://blog.sadegh.org/hello-world</guid><category><![CDATA[Public Speaking]]></category><category><![CDATA[Hello World]]></category><dc:creator><![CDATA[Mohammad Sadegh Alirezaie]]></dc:creator><pubDate>Wed, 28 Jan 2026 16:44:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1769820838675/359fcbd1-0e67-4990-ac04-2ae66110aa7c.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Dear my friends, here is my first blog post after a decade, I’m not sure if I’m going to go with Hashnode and post here and move on, or use Hugo;</p>
<p>I haven’t make the decision yet but in a few hours I would make my choice,</p>
<p>However, whatever happens I’m going to be more active after “Years of Halt” as I call it and believe me or not my blog is going to be a place for almost anyone, you’re going to find interesting posts and explanations if you don’t have any technical experience in computer (which are the most lovely creatures ever!) or sometimes you’re gonna scratch your head and think of the last level insanity,</p>
<p>I’m gonna analyze those pirated software and Microsoft Windows Activators you use to see IF they are malicious and could be considered as malwares, or another day you may face a social engineering method on how to get into an Instagram private page and see how it’s done (LIKE A BOSS) and how to prevent it and maximize you safety online.</p>
<p>Whatever happens, MAY GOD BLESS US ALL.</p>
<p>THANK YOU FOR YOUR ATTENTION TO THIS MATTER,</p>
<p>Mohammad Sadegh Alirezaei</p>
]]></content:encoded></item></channel></rss>