Exploiting weak 2FA

· What is Two-Factor Authentication?

As name indicates two factor, it means we needs authentication of two layers in order to access any application/resource. Like first entering the password and then entering the a code or something sent to the mobile by the application we usually call it 2 Factor Authentication (2FA)

--

--

--

Security enthusiast working to secure web for others.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Enterprise Search with CybervoreQuery: Easy, Quick, Effective

{UPDATE} Lara Croft GO Hack Free Resources Generator

The Road to V3: YAMv2 Interim Governance Summary

BlindBox: Deep Packet Inspection over Encrypted Traffic: A Critique

A Love Affair: Internet, Education & Cyber Security

{UPDATE} Oil Tanker Hack Free Resources Generator

Qtum Peer Connections - May 21, 2018

Fortitude

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Gupta Bless

Gupta Bless

Security enthusiast working to secure web for others.

More from Medium

Understand SSTI in 3 minutes

Understanding Improper Asset Management

My Pentest Log -13- (Bypass Renaming on File Upload)

My mindset while hunting on Yandex and my SSRF