how hackers use SQL Injection to dump out passwords?!
ฝัง
- เผยแพร่เมื่อ 19 ธ.ค. 2024
- // Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/...
Full Web Ethical Hacking Course: www.udemy.com/...
Full Mobile Hacking Course: www.udemy.com/...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangya...
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
What's a good password you recommend?
GnayGnailIoL*_!
Your previous metasploit video doesn't work lol. I tried it with myself but how do I find my own Rhost? Also, I tried my IP and it says that my RHOST denied it. I tried both my main gmail account and throwaway.
Loi could you explain how to open a mysql shell and create an exploit to gain administrator privileges? assuming you do the sql injection fine but you don't have enough permissions to make any changes to the server, thanks
Simple password like abc123 hashed in md5
e99a18c428cb38d5f260853678922e03
Paste it and you have secure password from easy-to-remember password
@@Cartiisthegoat29 RHOST is target host = target ip
I love your videos. I have barely dipped my toes into all this stuff, however, your videos are very informative and valuable information for myself, or anyone else who hasn't delved into the subject matter very much. Thank you
@Loi Liang Yang quick question would that process work for blind sql injection???
your biggest Fan is back 🙂
He knows what we want, whatever you do just never say you know who is hacker loi
Tonight, it is the second time my phone has got out of control, when i were surfing Facebook my phone suddenly quit Facebook and accessed Google. The first time is when i were learning foreign language in TH-cam, it comment a random and searched for something but i rapidly turned off my phone but tonight it seem to be more smart when it tried to prevent me shut down the system when i did it quickly quit out and did sth with volume, it took me as twice as the first. How should I do to prevent that
Sounds like maybe a reverse shell? I'm not a experienced hacker, but who knows.
Maybe try looking for open ports using ADB
You're a mad genius Hacker Loi
What if the saved passwords are encrypted by bcrypt? And is this method still work if I make my API for login to check first the username if it exist before going in to the SELECT statement of the actual login query? Like first check if username exist "SELECT * FROM users WHERE username=$1" if the select statement returns a data greater than 0 meaning username exist and only then the SELECT statement for login will run.
Hacker Loi strikes again! I love this channel. I have to admit I check everyday for a new video 😁
what executer do u use is it linux please reply
I really love your videos
Sir How Can I access Your Membership Videos
Does this method work for Complex passwords ?!
Yes. The complexity doesn’t matter with password hacking.
Mr Loi. Always love your contents. Please I do need your advice and help on an idea I got
Could be useful to pull data out tables … but what data admin saves passwords in plain text :o?
example, not real case
Sir, please make bug bounty complete course
Demo on exploiting multipart from data type ?
Why you are not active on twitter ??
Haha nice I am currently developing an Algorithm to detect SQLI and XSS
Only for GET? How to for POST request!
Love your videos❤️
Please make a video about rootless configure nethunter without errors for Android device
Check David bombal TH-cam
I have managed to install it but I had some problems with WiFi adapter not detected
Check David Bombal's latest videos
Are you able to help reverse a hacker? My friends grandad fb got fully hacked, would we have to hack it back? They've changed all log in info we can't get back in
Why is the syntax weird “+” ?
What if the passwords are encrypted?
Thats why it is highly recommended to encrypt the passwords before saving to db.
Yes! That’s why I’m here!
A friend once found a breakable radio station site. He added a div in the header telling them to be weary of donating bc the site wasn't secure enough.
Hi hacker loi my phone was factory reset an I lost the password to my acc do u have any advice on how I can get it back or hack it back pleas an thanks :(
Can you explain slowly
How hackers hack DNS ?
Pls how do hackers stay safe....
welcome hackerloi
We need something professional sir
Why does he have a black hat on? O-O
hey
I am first plz reply me
Make me the best hacker ever
hello Mr.hackeloi your website is not working could u please check once !
Yess
@hackerloi How often do you study hacking techniques?
I think there is no plain password in database nowadays
He did these things for tricking children.
Wooo, niiice!
Best password = no password, go password less!
Please Mr loi i need tutorial about android mobile hacking
1
Second to comment let’s go#
First
2 st