2FA is supposed to be your last line of defense. But what if it’s not as unbreakable as you think?
This video is for educational and awareness purposes only. The goal is to raise awareness of common web vulnerabilities so developers can defend against them.
▬▬ Tools Used ▬▬
- Kali Linux: Attacker machine
- Ubuntu Server: Victim
- Google Authenticator
- Burp Suite: web security tool
▬▬ ⏱️ Chapters ▬▬
00:00 Prologue
01:05 Previously on SallyShop
01:58 How 2FA Actually Works
05:19 Cracking the Second Factor
10:45 A Silent Break-In
11:48 What Went Wrong & How to Fix It
Join Neurix to get access to perks:
https://www.youtube.com/channel/UCUOlY1VUTHMdkLph5ORHF2Q/join
#penetrationtesting #2FA #cybersecurity