ErrorxCode/EasyInsta

How can I research IG Realtime?

Closed this issue · 5 comments

If you guys could provide some sort of guide on how can we research Instagram MQTT traffic. I've succeed in sniffing HTTP traffic and requests to the common endpoints, but still cannot figure out how to intercept MQTToT traffic

One unrelated question, do you know which endpoint is to request posts for a given tag? It used to be "/feed/tag/exampletag". If you have a sniffing tool you can check it by tapping on a tag on an instagram post. Thanks!

One unrelated question, do you know which endpoint is to request posts for a given tag? It used to be "/feed/tag/exampletag". If you have a sniffing tool you can check it by tapping on a tag on an instagram post. Thanks!

v1/tags/exampletag/sections/

One unrelated question, do you know which endpoint is to request posts for a given tag? It used to be "/feed/tag/exampletag". If you have a sniffing tool you can check it by tapping on a tag on an instagram post. Thanks!

v1/tags/exampletag/sections/

Hey thanks for your effort. Did you notice any other endpoints? Because this one doesn't return anything but also it doesn't say "Page not found". I guess it should include the "feed" keyword because we request posts.

One unrelated question, do you know which endpoint is to request posts for a given tag? It used to be "/feed/tag/exampletag". If you have a sniffing tool you can check it by tapping on a tag on an instagram post. Thanks!

#31

If you guys could provide some sort of guide on how can we research Instagram MQTT traffic. I've succeed in sniffing HTTP traffic and requests to the common endpoints, but still cannot figure out how to intercept MQTToT traffic

You can capture it using Wireshark. Other tools only intercept HTTP/S traffic.

BTW......I suggest you create a OpenAPI specification for the API that you have discovered so far so that it will be so easy to implement that in any language. Also, tell me the endpoints that you have discovered so that other do not waste their time in reverse engineering them again.