In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-29 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)05/31 Report--
This article introduces how to use Fake-SMS to bypass SMS verification based on mobile phone number. The content is very detailed. Interested friends can use it for reference. I hope it will be helpful to you.
About Fake-SMS
Fake-SMS is a simple but powerful command line tool, which can help researchers to use a temporary mobile phone number as an agent to bypass the SMS SMS verification mechanism based on mobile phone number.
This tool is currently only an experimental tool, please do not use it in any bank transfer operation! In addition, do not use it for malicious purposes.
The tool uses the European service provider Upmasked's messaging service, and the data will be stored on Upmasked's server, so you need to ensure that you agree with the EU data Governance Act and GDPR. The developers advise the majority of researchers not to use this for any personal transactions that expose their identity.
Function introduction
The tool is developed based on Go v1.15 and has module support enabled
Provides an interactive command line interface for easy to use
Provides database-based local file storage support, which can help us better manage, record and reuse fake mobile phone number lists.
Upmasked unofficial client is provided
Environmental requirements
Go programming language environment v 1.15 +.
Tool download
Researchers can use the following commands to clone the source code of the project locally:
Git clone https://github.com/Narasimha1997/fake-sms.git code construction
Fake-SMS is also built in the same way as other Go modules. We can run the following command to build Fake-SMS:
Export GOBIN=$PWD/bingo install
The above command completes the code build and stores the built project in the bin/ directory. We can also consider using the precompiled code already provided in the bin/ directory.
Tool use
The first step is to register a mobile phone number in the local database. We can also select one of the existing mobile phone numbers to register, as shown in the following figure:
The second step is to use the registered mobile phone number to obtain information. We can select the mobile phone number stored in the first step and then view its message in the form of a list. The tool can also export data in JSON format, which is "${PWD} / selected-phone-number.json". It is shown in the following figure:
The third step is optional. We can choose to delete the recorded mobile phone number or list item.
On how to use Fake-SMS to bypass the SMS verification based on mobile phone number to share here, I hope the above content can be of some help to you, you can learn more knowledge. If you think the article is good, you can share it for more people to see.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.