- 4

just for learning purpose guys.let say I use the most popular hacking method phishing to collect user Google password how can I

just for learning purpose guys.let say I use the most popular hacking method phishing to collect user Google password how can I sussefully login in without having to go through phone verification to confirm if it is really you. is it actually the user device Google use in knowing something is not right or is it the location? because if a Google account of a person in the same location as me is hacked and used it does not ask for phone verification to confirm if its really you.

2nd Dec 2017, 2:59 PM
Franklyn Omeben
Franklyn Omeben - avatar
12 Answers
+ 19
This seems a bit out of bounds for Sololearn. We can't tell you how to do illegal stuff.
2nd Dec 2017, 3:11 PM
Ahri Fox
Ahri Fox - avatar
+ 9
I'm not in support of this.keeping my lips zipped
2nd Dec 2017, 3:24 PM
᠌᠌Code X
᠌᠌Code X - avatar
+ 9
"Just for learning purpose", you might not lie but it seems soooo suspicious ^^
2nd Dec 2017, 3:25 PM
Baptiste E. Prunier
Baptiste E. Prunier - avatar
+ 6
Haha, this is a bit too specific to be a simple hypothetical.
2nd Dec 2017, 3:40 PM
Adrian
Adrian - avatar
+ 1
guess its all part of leaning if you don't know how to hack how can you protect your self from it
2nd Dec 2017, 3:26 PM
Franklyn Omeben
Franklyn Omeben - avatar
+ 1
yeah we know that @charan but it depends on how you use it. it can be still powerful
2nd Dec 2017, 3:30 PM
Franklyn Omeben
Franklyn Omeben - avatar
0
script kiddies!!!
2nd Dec 2017, 4:36 PM
ephy
ephy - avatar