- 4
just for learning purpose guys.let say I use the most popular hacking method phishing to collect user Google password how can I
just for learning purpose guys.let say I use the most popular hacking method phishing to collect user Google password how can I sussefully login in without having to go through phone verification to confirm if it is really you. is it actually the user device Google use in knowing something is not right or is it the location? because if a Google account of a person in the same location as me is hacked and used it does not ask for phone verification to confirm if its really you.
12 odpowiedzi
+ 19
This seems a bit out of bounds for Sololearn. We can't tell you how to do illegal stuff.
+ 9
I'm not in support of this.keeping my lips zipped
+ 9
"Just for learning purpose", you might not lie but it seems soooo suspicious ^^
+ 6
Haha, this is a bit too specific to be a simple hypothetical.
+ 1
guess its all part of leaning if you don't know how to hack how can you protect your self from it
+ 1
yeah we know that @charan but it depends on how you use it. it can be still powerful
0
script kiddies!!!