Cookie Theft Demo: Bypass Two-Factor Authentication (2FA)

Summary: The video discusses the vulnerabilities of cookie management in web security, demonstrating how attackers can bypass strong passwords and two-factor authentication (2FA) using cookie theft methods. Through practical examples and demonstrations, the video highlights the ease with which cookies can be manipulated to gain unauthorized access to accounts on reputable sites.

Keypoints:

  • The video emphasizes that strong passwords and 2FA may not be sufficient security measures against cookie theft.
  • Demonstrations show how cookies can be inspected and modified using browser developer tools.
  • The first demo illustrates cookie stealing using the “inspect element” feature on GitHub, allowing an attacker to impersonate an admin account.
  • The second demo shows how a Chrome extension can be exploited to export cookies as a JSON file, enabling remote access to credentials.
  • The discussion includes risks associated with installing unknown or dubious browser extensions, which may compromise security.
  • Various testing scenarios highlight that cookie vulnerabilities can affect all major browsers, including Chrome, Firefox, and even Linux systems.
  • Listeners are cautioned against assuming that using multiple systems (like Mac OS or Linux) inherently provides better security.
  • The video encourages ethical hacking practices, reminding viewers to use the demonstrated techniques only on systems they own or have explicit permission to test.
  • Links to GitHub repositories and resources for further exploration of the techniques demonstrated are provided.
  • Viewers are invited to connect with Kieran Hume on LinkedIn for questions and collaboration opportunities.

Youtube Video: https://www.youtube.com/watch?v=pSdu6iW878E
Youtube Channel: David Bombal
Video Published: Sun, 13 Apr 2025 13:30:39 +0000


Views: 9