Skip to main content

Posts

Showing posts from January, 2017

How Hackers Bypass Mobile Verification

Please Note: The purpose of this article is to inform people of how hackers can steal information and to prevent the illegal and criminal use of Penetration Testing Software like redpill Hacker.


Cyber-criminals can install key loggers on your computer to get your login details. Sites that require a more secure form of log-in will send a verification code to the user's mobile phone (SMS - OTP) to prevent this type of attack. It is mostly banks but also other sites (think of Google's two step verification) that uses this method.

So how do hackers get past the mobile verification step?

Easy - The ask the user what the code is! It is called social engineering and this is how it works:

They get information about you - usually everything they need they can get from your facebook account. All they need to get started is your email and phone number.They then use hacking tools to get your username and password from your computer.They will then give you a call claiming to be from the com…