2FA/MFA/OTP Bypass
Enhanced Two-Factor Authentication Bypass Techniques
Direct Endpoint Access
Token Reuse
Utilization of Unused Tokens
Exposure of Token
Verification Link Exploitation
Session Manipulation
Password Reset Mechanism
OAuth Platform Compromise
Brute Force Attacks
Rate Limit Absence
Slow Brute Force
Code Resend Limit Reset
Client-Side Rate Limit Circumvention
Internal Actions Lack Rate Limit
SMS Code Resend Costs
Infinite OTP Regeneration
Race Condition Exploitation
CSRF/Clickjacking Vulnerabilities
"Remember Me" Feature Exploits
Predictable Cookie Values
IP Address Impersonation
Utilizing Older Versions
Subdomains
API Endpoints
Handling of Previous Sessions
Access Control Flaws with Backup Codes
Information Disclosure on 2FA Page
Password Reset Disabling 2FA
Decoy Requests
OTP Construction errors
References
Last updated

