how hackers bypass login pages!
ฝัง
- เผยแพร่เมื่อ 9 ก.พ. 2025
- // Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/...
Full Web Ethical Hacking Course: www.udemy.com/...
Full Mobile Hacking Course: www.udemy.com/...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangya...
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
kids these days are sooo lucky having this content.. imagine i had this when i was 13 instead of lurking in irc's lmao
14 yo here
When you arr a kid at that time yang is also a kid
O@@agarthaclassic you no longer imlo or
I no longer 0
@@indianbeluga3596 holiday p0
Li with
@itzzabhiyoul of in loooool loooool ô ii of il lie IP is Elizabeth hope
Small remark: Most of modern Wordpress blogs are using the Wordfence plugin which will stop such attack quite fast. Or you need to change IP each time it's blocked.
that won't work either, they use more complex security
Use tor lol
Proxy lists, tor, ect
thst y you need tor proxychains socks5 etc
I remember bypassing this by writing a bash script that used cURL to send the requests using proxy chains and a custom word list for the passwords. It was fun.
He is planning us to get arrested 😂
Thanks for the video though ❤
Really appreciate that you manage Time for us 😊
😂😂😂
😂😂😂 damn right
obviously u r target and test #1 😛... highly appreciate the lessons they go a long way. especially in educating the general public on "WHAT NOT TO CLICK"
In ur videos "game over" seems very easy but in real world it's totally different.
He is not teaching, he is introducing techniques, it is up to your innovation and your skills to use these techniques in more complex attacks
Damn, I love this man's dry sense of humor😂
The man's hackerish humor is adorable, and the background beat is truly epic. 🕸🔓🔥
Thanks bro.. I am 10 yrs old .. from India and my friends take huge interest in your videos😊
Reported, you're 10, why are you on youtube? Go outside.
He's pretty good. I subscribe to his youtube channel. Password Managers are stopping dictionary and full out brute forcing attacks. If you use the password managers, password generator with every type of character set available with the option to have no repeating characters. And max out the password length for the password policy it can store on the login site. (You want no less then 18 characters today). And always adding some type of two factor authentication will slow a hacker down. Until it's figured out how to steal the credential of it, or bypass the second forum of authentication. I've been doing computer security 21 years now for just myself.
Why not make a tutorial man it would be very beneficial as well. Try it pls.
@@zakariatalukdar2552 I haven't posted a youtube video in years. I'm more a typing person then video.
Thank you for positivity mr.Loi.
Thank you for sharing some of your knowledge,skills and abilities... I appreciate what you do....
Love you man!! 🙌🏽
as usual, great content!
Not really.
How about you show how to use a data inspection tool ? Only have to convert 1 data packet to get accepted that’s is much easier ??
Can u add all steps and commands used on all ur videos please much love
Really appreciate it.
Bonjour, Je ne comprends pas une chose dans cette vidéo, est-ce que vous avez utilisé la version 2 de WordPress sortie en 2007 pour faire votre démonstration ?
Dang, only 3 tries for the police to come knocking 😂😂
I learn this 13 years ago when wordpress so many vulnerable😂😂😂😂 still funny if i remember it but not sure if this still work till now.
Not knocking your vid, it's really good. But I don't like how you didn't explain how you obtained the xml methodcall payload.
How to see your member only video.. How to be a member
Same thing on my college site 😂
I won't snitch out anything until they promise me i can watch Hacker Loi in prison.
great. pass simple and short though and already in the dictionary
Can you use this on social media websites
I really want to be an etichal hacker. But dont know where to start
I thought you were going to sing a song, until I read the title 😅
What website are you using?
Loi, Do you do BUGBOUNTY? On HackerOne or BugCrown?...
Is there any parts like this inn your video on Udem?master
good job man .need more subject how to find parameter hidden
Can you beat a ctf challenge example from htb??
Can you please make a video about how to be anonymous and hide yourself when hacking.
Thank you very much
great video as always! is it a similar process for API's which use JSON format?
Bless us with a pegasus tutorial please
Hello Mr
Loi Liang Yang, I have a problem concerning the recovery of my google account, I forgot my passwords so when I click on forgotten passwords I am told that they will send me a code to my number, then they say they will send me another validation code to my recovery Gmail address which is the same Gmail with the problem. I HOPE YOU CAN HELP
THANKS
Help with questions : when i download 30mb apk and in my fill manger data increase to 34 mb is it mitm attack redirect ?
Well, these 10 year old attacks probably won't work but nice to know anyway..
Please Mr Loi, i am a student... keylogger tutorial? Thanks 🤗
Good video Mr Loi
mentor i will try and see if can😂😂
we are not here for online shopping 😂😂😂
What if they don't have any common password. For example what if they have complex password then we can't use this method so whole point is to keep a complex password. OR am I missing something here?
sleep
can you explain bypass the login page in real world and use hashes code
Never give up!😅
Can you do a v-log to target a site or data base that uses VPN . If you get the VPN link
it's a good day when hacker loi uploads
How do i find the ip addres of a webside becuse some of them don't show it
But if i don't use WordPress but laravel or other framework . Is still possible?
Hi Mr hacker please can you make make a video on how to edit and manipulate the money in your bank account using burp suite
How can I get in contact with loi for a consultation? Or hire
I miss PHPNuke ❤😂
Love u loi ❤❤❤
thanks sir for making this
Anyone know what program he is using to hack?
Hey, I need a website's date of birth validation using js code to be bypassed... and continue submission of the form...., Among 3 pages details the first page includes the date of birth form, then it calculates the age at the present date then when i click on the next to go to the 3rd page then it shows a js alert of over age, i can handle this error disabling the js file, but when i try to submit the form in third page it shows the over age error again and prevent the submission and returns to the first page.
Now what i want is to bypass the date validation and submit the form normally.
How can i do that??
That sounds like a picoctf challenge, lol
Nice Loi :D
can u please make a video about bypassing cloudflare
Hello sir!
I've few queries regarding choosing hacking as a profession.
Can we please connect so that you can clear my doubts????🙏🙏🙏
Wordpress old version only available this technic. Updated version will not working 😅😅😅
No one is foolish and uses the password admin
Does anyone know what's wrong with my PC, so some time ago I was opening a telegram and suddenly something appeared like cmd and ran a program, at the top which usually says command prompt but at that time it wrote uefi windows
I want your help.
Reverse shelll with php ?
How can it be done if the website is logged in through OTP from Mobile Numbers.
All good websites use scanners to that already have all these public vulns. Your gonna need to find your own exploits youtube is no help unless you know nothing
Perfect could have explained a little slow
The only thing I need clarification is why do my metasploit fail to work online unless on local server just
Hello Sir, what should we do if our phone is hacked?
Voice is not in this video
We are love
Nice work
Is there any ip that offers free internet via vpn configuration?
Nice
cool. You're still not getting around the amount of entropy in my long-ass passwords and encryption keys. Try all you want.
Loi help me bypass pin password 4digit on android
Hello bro how can I contact you i need your help please
Great❤
you speak too fast in your videos here. I want to find out if that is the same way you speak in the course videos on udemy
You can't do SQL on anything after windows 7
Brother, how to find server seed game slot 😂
how to pentest AWS
how to crack passward which is set by dell
OMG UR VIDEOS ARE SO GOOD i learned hacking from you❤
Then you will likely end up in prison soon. Dont drop the soap.
How to bypass Snapchat suspicious login code thing without code?
On lnstagram
She can help you out
Deangelocrack
@@user-do7nm1sh4m who
Amazing
Now I can login to my boss bank accounts!!!
How I can disable a total control system(TCS)of feul Despenser so that I pull out feul without knowing mangment?😂
is it possible to hack gmail using burpsuite
Hi Sir I would to know where and what websites to learn hacking, ethical hacking and cybersecurity for free full course beginner to advance to professional start to finish I hope you find this comment question and answer this asap please
Theres no volume in your video
i need help please
Loi 🤩🤩
Plz brother I really need your help.
hi loi can you please teach how to get a websites ip adress
Hi Mr hackerloiii please 🙏 I need a vedio about covering tracks and clear logs
Do you have tiktok?
help Sir Loi my account just got hacked
Deangelocrack
On lnstagram
She can help you out
No sound 😥
Hi, meet my friends.
Whitelist IP and anti bruteforce.
I hate WordStress..... Absolutely loath it.....