Navigation
Recherche
|
A Researcher Figured Out How To Reveal Any Phone Number Linked To a Google Account
lundi 9 juin 2025, 17:22 , par Slashdot
![]() In mid-April, we provided brutecat with one of our personal Gmail addresses in order to test the vulnerability. About six hours later, brutecat replied with the correct and full phone number linked to that account. 'Essentially, it's bruting the number,' brutecat said of their process. Brute forcing is when a hacker rapidly tries different combinations of digits or characters until finding the ones they're after. Typically that's in the context of finding someone's password, but here brutecat is doing something similar to determine a Google user's phone number. Brutecat said in an email the brute forcing takes around one hour for a U.S. number, or 8 minutes for a UK one. For other countries, it can take less than a minute, they said. In an accompanying video demonstrating the exploit, brutecat explains an attacker needs the target's Google display name. They find this by first transferring ownership of a document from Google's Looker Studio product to the target, the video says. They say they modified the document's name to be millions of characters, which ends up with the target not being notified of the ownership switch. Using some custom code, which they detailed in their write up, brutecat then barrages Google with guesses of the phone number until getting a hit. Read more of this story at Slashdot.
https://it.slashdot.org/story/25/06/09/156210/a-researcher-figured-out-how-to-reveal-any-phone-numbe...
Voir aussi |
56 sources (32 en français)
Date Actuelle
mar. 10 juin - 23:48 CEST
|