Codelivly
Home » Ethical hacking » Bypass Google Two Factor Authentication
ETHICAL HACKING
Bypass Google Two Factor Authentication
By Rocky ◆ February 4, 2023 ◆ Updated: February 6, 2023 No Comments 4 Mins Read
Share
Hey Folks, today’s article is going to be very interesting because we are going to talk about a
method using which we can easily bypass “Google Two Factor Authentication” by tricking
the victim.
Let’s move on to the main topic !!
Get Credentials First
To bypass two factor authentication of any google account, you must first have the username
and password of that account and you must also use phishing with social engineering to
obtain the credentials. But the question is how do we do all this ? All this is very easy to do
you just only have to use a tool called “Advphishing” and you can easily get the victim’s
account username, password and even OTP by using fake WhatsApp numbers. Once the
whole process is done, keep the credentials with you and be calm.
What are we going to do ?
Usually when we try to login to our google account for the first time from
google chrome, it makes us do some security process to find out whether
that person is the right person or not. Google provides several features for
us to successfully login to an account and all of them have a two factor
authentication feature called “Tap on notification to continue” which
contains the attacker’s device information that alerts the victim to not allow
attacker to login into his account. So we just need to replace our device
information with the victim’s device information that they are using and we
will be able to defraud the victim. Hence in this tutorial you will learn how
you will be able to bypass two factor authentication by tricking the victim.
Footprinting ( Social Engineering )
The real steps start from here where we will now use social engineering techniques to
capture the victim’s device information. It is very easy to achieve and for that we have a
complete tutorial on it where you can go from here. Once the victim clicks on the link
provided by you then you will easily get every deep information about his device. What else
do you want !! Copy it and HODL.
Enter the Credentials Found
Let’s go to the Google account and enter the credentials but after entering the password
don’t submit it.
Set Fire to Burpsuite Tool
It is a web application penetration testing top leading tool which comes pre-installed in kali
linux operating system which you need to open it but we can’t use it without setting proxy so
you have to configure proxy first. Check this article if you got confused. Once everything is
done, “Turn on” intercept mode and then go to google account and click on Next. The device
information is always stored in the “User-Agent” param which we need to replace with the
victim device information found from the footprinting. Let’s change it.
Good !! As you can see we have changed all the information as we got from the footprinting.
After change it, forward the request.
Hmm !! Once again we have to follow the same process which we have done in our previous
step. After change it then forward the request and “Turn off” the intercept the mode.
Note You have to do both these steps within nano seconds.
OMG !! As soon as you forward the request a notification alert will be sent to the victim
phone and asking to allow this account to log in on the device the victim is using. Now the
victim will think that the request must have come from my device and will allow him to
login. BYPASSSSSSSS !!
Aamazing !! As you can see how easily we have taken over google account using social
engineering techniques.
About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and
researcher. Can be Contact on Linkedin.
ethical hacking
PREVIOUS ARTICLE NEXT ARTICLE
Seven Common Ways To Bypass Login Linux Privilege Escalation: DirtyPipe
Page (CVE 2022-0847)
Rocky
Rocky is a versatile author sharing in-depth tutorials on web development, AI, and ethical
hacking. Unlock new possibilities and expand your knowledge with Rocky's empowering
content.
Related Posts
CYBER SECURITY NETWORKING
So You Want to Be a Hacker: 2024 Edition Mastering Networking Fundamentals: A
May 8, 2024 Comprehensive Guide for Hackers
April 7, 2024
ETHICAL HACKING
Multiple Ways To Exploiting HTTP
Authentication
March 30, 2024
ADD A COMMENT
Search … SEARCH
Support Us
ABOUT US
This is the Codelivly blog. Here, you will find articles discussing various topics related to coding
and programming. Our goal is to provide helpful resources and advice for beginners and
experienced coders alike.
RECENT POSTS
So You Want to Be a Hacker: 2024 Edition
What is Active Directory? A Beginner’s Guide
Mastering Networking Fundamentals: A Comprehensive Guide for Hackers
Multiple Ways To Exploiting HTTP Authentication
Bypassing Two-Factor Authentication
IMPORTANT PAGE
About Us
Advertise With Us
Contact US
Privacy Policy
Refund Policy
Write For Us
© 2024 Codelivly. All Right Reserved