u can deploy a RAT on the targets device and from there slowly change their linked emails and authentication methods, passwords etc to your own, log out of their account on their machine and log back in on yours
u can deploy a RAT on the targets device and from there slowly change their linked emails and authentication methods, passwords etc to your own, log out of their account on their machine and log back in on yours