Sponsored
Andorid Hacking

How To Bypass Google TFO (OTP)

Hey Folks, in this tutorial we’ll show you how we can bypass Google two-factor authentication via a phishing attack. As we know that we have the credentials of the victim account but we are sometimes stuck due to two factor authentication, hence we are not able to acquire the victim’s account even after obtaining the credentials, but through this tool we can bypass two factor authentication with the help of phishing page.

Let’s see how that is possible πŸ™‚ !!

Installation

We already have done complete installation of this tool on our previous article so you need to revisit that article. You can revisit from here.

git clone https://github.com/Ignitetch/AdvPhishing.git
cd AdvPhishing/
bash Linux-Setup.sh
./AdvPhishing.sh

After fully setup then boot up and choose the β€œ6” option to create a google phishing page.

Got it πŸ™‚ !! In the end it gives us the phishing link that we need to share with the victim. Done πŸ™‚ !!

This happened to be a normal process that you would have to follow to create a phishing page. But the main part will be started from here. Let’s see πŸ™‚ !! After the victim opens the link, the phishing page will look like the image below and obviously he will enter his credit to enter his account.

Alright πŸ™‚ !! As you can see we have the credentials entered by the victim on the phishing page.

Without waiting for a second, immediately we need to go to the original web page and enter those credentials to enter the victim account.

OPPS πŸ™‚ !! As we told you that if two factor authentication is enabled then we cannot access its account. Relax πŸ™‚ !! After entering the credentials by the victim obviously he will wait a few minutes to get the OTP and in the meantime you have to follow the same steps that we have just done.

After trying to access the victim account, the OTP will go to the attacker and the victim will enter on the phishing page without any doubt.

O’Nice πŸ™‚ !! You can see that we have successfully got the two factor authentication code, due to which we were not able to login to the victim account.

Amazing πŸ™‚ !! As you can see that after entered the OTP on the phishing page by victim, we have finally successfully entered the victim account. Its Done πŸ™‚ !!

Done πŸ™‚ !! This tool also has an interesting feature through which we can get upcoming credentials on our Gmail account.

About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
Sponsored

View Comments

Recent Posts

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 month ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

8 months ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

2 years ago

API Security Testing 101: Know Everything About API Security Testing!

The security of your API should be one of the top priorities of companies. Without…

2 years ago

7 Best Tools for Web Penetration Testing: Comprehensive Details

Hey Folks, In today's business world, it is essential to have an online presence. However,…

2 years ago

Cyber Security Audits: Everything You Need to Know About It

Hey Folks, Is your business prepared in case of a cyber attack? Many companies don't…

2 years ago
Sponsored

This website uses cookies.