Is it really so easy to hack into someone’s email account?
Let’s first try to see what are the possible ways to get access of any social media accounts.
There are mainly 3 ways to get access to the account ( if 2FA is disabled ).
Last thing would be finding a critical vulnerability of the web application. It’s not always easy to find some SQL injection or XXS vulnerability or code execution vuln in a web application. If the web application is not much secure, you can find vulnerability using Burpsuite or Vega vuln scanner. But I would not recommend automatic scanners because they sometimes tend to give false alarms of vulnerаbility.
These were my views on how to get аccess to аny victim’s аccount. And I would not recommend you to perform the methods without the permission of the victim. It is highly unethicаl to get аccess without permission.