Broken authentication: 7 Advanced ways of bypassing insecure 2-FA implementations

https://blog.intigriti.com/hacking-tools/broken-authentication-7-advanced-ways-of-bypassing-insecure-2-fa-implementations