How a PDF Stole a Life — A Hacker’s Mental Game

Introduction


What if you had only a phone number and a private Instagram ID…

No name. No bio. No display picture.

No social media activity. No Google footprint.

Nothing.

Could you still find out who they are, where they live, and what they do?


An ethical hacker took on this challenge —

No tools. No Kali. No Google.

Only Termux. Only Python. Only the brain.


And what happened next was something even he didn’t expect...


Phase 1: No Tools, Just Mind


Let’s start with what we had:


Phone number (no Truecaller data)


Instagram ID (private, no bio, no DP)



Most people would quit.

But hackers don’t chase people — they bait them.


Phase 2: The Trap — Social Engineering


Instead of brute-forcing data, the hacker planned a psychological attack.


He designed a PDF file with a fake title:


> “Result Card - College Fall Term 2025.pdf”


It was crafted using Python in Termux:


from reportlab.pdfgen import canvas


def create_pdf():

    c = canvas.Canvas("result_card.pdf")

    c.drawString(100, 750, "College Result Report")

    c.drawString(100, 730, "Check your score here:")

    c.drawString(100, 710, "http://your-ngrok-link.ngrok.io/verify?id=235")

    c.save()


create_pdf()


The PDF looked clean. But the link was a trap — hosted on Termux using:


python3 -m http.server 8080


Then exposed using Ngrok:


ngrok http 8080


Phase 3: The Click


The hacker sent the PDF file to the target via email (or anonymous Insta DM):


> “Hey, I think this is your result file. I found it on a college server.”




Curiosity always wins.

And when the victim clicked…


BOOM.


Phase 4: The Payload


The hacker had set up a webhook logger (using webhook.site) to capture:


IP Address


Location (approx via IP)


Device Info


Browser Type


OS Platform


Time of Access



All of this from just a PDF click.


Sample Log:


IP: 39.50.93.XXX

Device: Android

Browser: Chrome Mobile

Location: Lahore, Punjab, Pakistan

Access Time: 10:43 AM

Referrer: Instagram App


What If It Was Malicious? (Hypothetical)


If the hacker had bad intentions, the PDF could have contained:


A reverse shell


A keylogger


Script to steal saved files


Or a full system exploit (like exploit/windows/fileformat/adobe_cooltype_sing)



But this case?

It was just a test of skill. A hacker’s mental challenge.


Moral of the Story


The strongest hacking tool isn’t a program.

It’s psychology.


Social engineering is more powerful than any brute-force script.

Even a basic Python script in Termux can expose identities —

If used with the right bait, brain, and timing.


Educational Note


This blog post is fictional and for ethical educational purposes only.


Never use hacking skills to harm, stalk, or violate privacy.

Use them to learn, protect, and educate others about cyber risks.


Final thoughts


One day you’ll face a locked door with no key.

You can keep pushing…

Or you can convince someone to open it for you.


That’s the hacker way.

>Want to learn about social Engineering check out my blog on Social Engineering Attacks: The Human Side of Hacking

https://theethicalexploit.blogspot.com/2025/04/social-engineering-attacks-human-side.html

Comments

Popular posts from this blog

Scanning and Enumeration in Ethical Hacking: A Complete Guide

Reconnaissance and Information Gathering in Ethical Hacking

The Basics of Website Hacking: A Beginner's Guide to Ethical Hacking