How to Bypass Device Verification for Email & Login | Courses | Crax

Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!
  • We are in solidarity with our brothers and sisters in Palestine. Free Palestine. To learn more visit this Page

  • Crax.Pro domain has been taken down!

    Alternatives: Craxpro.io | Craxpro.com

How to Bypass Device Verification for Email & Login

How to Bypass Device Verification for Email & Login

LV
1
 

highzum

Member
Joined
Jan 11, 2024
Threads
13
Likes
14
Awards
4
Credits
1,633©
Cash
0$
Greetings, World! Welcome to XIT. Recently, my handset was :( lost, so I decided to gather the IP address logs, login timestamps, geographic information, account activity, login history, and session data by accessing my email account. I attempted to log in from my desktop, but due to trust issues, the system prompted me to verify my phone number. Wait, what? The SIM card was still in the lost handset. Since I was unwilling to obtain a new SIM card for the same number, I employed some clever maneuvers to access my email account. In this blog, I’ll delve into the details and provide additional insights on bypassing device verification for emails and other login forms. Let’s get started.
13Ud kIxc26JCKgMrwiZZ2A

ahh! it sucks..
You might have noticed that login forms often prompt us to mark the device as trusted. Once marked, the system saves various details such as the device fingerprint, IP address, browser and version, operating system and version, location data (if enabled), device model, and the time and date of device trust establishment. However, in most cases, we can bypass this requirement by entering the same information details directly into the browser.

Understanding the Concept​

Start the process by clearing cookies associated with the specific page you’re attempting to bypass.
1HUFqsRcT4yItmL4xJ5VETw

1ROHggoRzOKQf93Hex5SjKg

1dsKP9jyfMhVzm7a  jim7w

Following this, carefully inspect the login page by right-clicking.
1dBxhihDXGn sgYjEhS5vSw

Once inspected, proceed by clicking on the settings icon located at the top of the page.
1v2xhZiPteF565FvQyjOrCg

Next, navigate to ‘Devices’ settings.
1zAJE1aVU Q5KtMi9Pp1HlQ

Select the option to add a custom device.
1JblEtBLh5E8mL nNx45BEg

Configure this device with identical specifications to the one currently logged into the email account. Include details such as Device Name, Width, Height, Device Pixel Ratio, User Agent String, Device Touch Capability, User Agent (Sec-CH-UA) Brand & Significant Version, Full Version List (Sec-CH-UA-Full-Version-List) Brand & Significant Version, Full Browser Version (Sec-CH-UA-Full-Browser-Version), Platform & Platform Version, Architecture, and Device Model. Save the configured settings.
1DAqgIqTurGMWo1AtWp0SUA

EXAMPLE (My Configuration)​

Device Name: “iPhone 13 Pro Max Custom”
Width: 1284 pixels / 400
Height: 2778 pixels / 800
Device Pixel Ratio: 3.0
User Agent String: Mozilla/5.0 (iPhone; CPU iPhone OS 15_0 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/15.0 Mobile/15E148 Safari/604.1
Device Touch Capability: Mobile — true
User Agent (Sec-CH-UA) Brand & Significant Version: “Apple”;v=”15.0", “Not A;Brand”;v=”99"
Full Version List (Sec-CH-UA-Full-Version-List) Brand & Significant Version: “Apple”;v=”15.0.0.0", “Not A;Brand”;v=”99.0.0.0"
Full Browser Version (Sec-CH-UA-Full-Browser-Version): Safari/15.0
Platform & Platform Version: iOS 15.0
Architecture: arm64
Device Model: iPhone14,2
1SuXzMau2z7bvmBTMLxq9Nw

Proceed to choose the newly configured device from the Dimensions menu. Afterward, clear the cookies once again and attempt to log in using the modified device settings.
10uyazymJJAgJk hi7UdvIg

For more success, consider the use of a proxy from the same datacenter as the target IP where the email is currently logged in. This can surely improve the likelihood of successful bypass.
Additionally, if the above measures do not provide the desired outcome, explore the option of using custom ‘Locations’ settings. To do this, go to location settings and add a custom location.
1tTyq3T82QxiNTe5rhASPuQ

1kma03XUbp3wm1ha4gpygeg

Enter details such as a custom location name, Latitude, Longitude, Timezone ID, and Locale, ensuring they align with the geographical data of the target device where the email is logged.
1mxb5fwSAxQ0QAh tE  7jg

EXAMPLE (My Configuration)​

Custom Location Name: “New York City Office”
Latitude: 40.7128
Longitude: -74.0060
Timezone ID: America/New_York
Locale: en_US
18w5KIiIuDLmKzmpvhzFCqg

Finally, clear the cookies once more and attempt to log in again, incorporating the newly added custom location settings. This comprehensive approach provides you with multiple strategies to overcome login restrictions on various sites.

Tada! I was able successfully bypassed the login restrictions using the configured device and custom location settings as outlined. Credits: ‘🧠’​

1U59HYq2D 6mJFKBecZDSNQ

1JY52ktvby6a6GJodc2DN w

1qXJxBF38T3YKJK5uUv YZA

If you learnt anything from this blog, we’d appreciate your engagement — give it a clap and consider sharing to help spread the knowledge. Also Follow XIT on medium & UglyCompany on Telegram. Your support means a lot to us!
 
  • Like
  • Worked
Reactions: MisterP, Faucet94 and fognayerku

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Similar threads

Top Bottom