Hacker loi u sexy. EHEM anyways. As a web developer actively trying to create a social network on my own and release it to the public, it would be an understatement to say I'm frightened. But as long as Loi keeps producing these videos I can patch most of this stuff.
As a developer for more than 25 years now, i always though that preventing these kind of "attacks" was basic web development. I never thought that in 2023, devs would still leave so many doors opened. I know it's just an example and dummy website, but if you used it like this, it's because you know devs do it LoL.
You certainly would be surprised. Doing a google search for something like "&id=" would list any websites who haven't had their urls rewritten. 5 minutes later and I can have database access for a super user if they've also not encrypted their passwords, which is the next blunder.
Welp, when companies are laying off more experienced developers in favor for young and cheap ones, this is what you get. 😅 and when there are no layoffs, developers are only interested in creating the minimum viable product and then moving on to the next job. Ofcourse this is the structure you end up with.
That said, leaving a relationship, specially if it’s toxic, is probably the most difficult of all! Selfish people don’t have to put effort in hurting others. They naturally just do.
CRYPTO SCAM VICTIM ? As a Retired combat Marine I want to tell you that as what you are doing is just as important as any warrior on the battlefield. You are waging warfare against these criminals and terrorists on the digital battlefield. You are defending and protecting the most vulnerable of our society against these predators. Keep up the good work *TECH SAFE GUARDIAN on the WEB*
@@amongusboi2032brainwashing?....Now I admit it's all connected, & 1/2 of these were not even submitted by a human being....but you are concerned about the comments section?!?😅😅 I would think that it was a given that brainwashing was the overall object of the entire platform....but that's just me
The way you approached this project added so much to it. It’s great to see how your unique perspective contributed to the outcome. The role you play on your job *Adrian hacks online on the WEB* is crucial. I really appreciate the constructive feedback you give to me regularly
Please sir, I can't run monitor mode and packet injection on my internal wireless card. I'm using Nexus 6p device. I've flashed the nexmon patch but doesn't work still.
These techniques don't actually work in practice. While these tools are rudimentary to understanding how common vulnerabilities work to exploit them, applying these concepts in the field requires proficiency in DevOps and programming. A proficiency in DevOps provides the necessary skills and knowledge required to understand these systems and their vulnerabilities at large. This includes how these servers are designed and maintained in production, and how the project/server files are structured and how they are accessible to different users. To gain proficiency in the skill, practice by building a simple chat client that utilizes a variety of protocols. Once you've done this, you need to host a Linux server on the cloud and deploy you client application to this server. Make sure to read documentation thoroughly to make sure you have everything running the way it should. Furthermore, you enable several protocols to your server for practice in hacking them, and securing them, then repeat. Programming proficiency is a critical step and is trivial to your success in penetrating any system "out in the wild" (uncontrolled environment). Although scripting with pre build tools on Kali can be effective in theory, any antivirus out there can detect these attempts to infiltrate their system with these common techniques and thus requires you to get creative with your own code to evade detection. Think of it like this: if team read has built it, team blue has reverse engineered it; if team red has seen it, so has team blue; if team red has updated OffSec tools, likewise team blue has updated antivirus. In conclusion, learn these prerequisites of engineering and become very familiar with these systems and how they are maintained, and you should be on your way to becoming a(n) "ethical" hacker.
Hacker kLi you are genuis. I am Linux administrator and your tutorials are fucking awesome. Please keep making these types of videos. Thanks to youtube algorithm which suggests your channel.
My competitor has assigned him self as my developer and is merging and taking over my account and controlling my network messages and internet. What do I do for help ?
*Tracebackassets is an exceptional private investigator specializing in cryptocurrency theft cases. They have a team of highly skilled professionals who are dedicated to solving these types of crimes. With their expertise in blockchain technology, they can trace stolen funds and identify the culprits behind the theft.*
Everyone should have a dedicated person like you *Adrian hacks online on the WEB* . People dream of hiring such a talented expert like you. Keep up the hard work.
The efficiency of this *TECH SAFE GUARDIAN* is next level. To juggle walk throughs of various angles on the topic delivered to-camera, different content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense access like this so digestible is really something. Awesome work james!!
Damn homie Loi, you made make IT shacking when you are around, thanks for you videos man, I'm a programmer and I 'm learning always great things to secure my apps, so thanks brother ! continue blowing our minds with your snacky methods of creating backdoors.
You should do a video on iPhone lockscreen bypass, and disabled iPhone removal. I've had found my old iPhone I lost years ago would be nice to open it! Thanks
There’s hundreds of programs that solves that easily (depending on iPhone model). Just find the latest version, otherwise Apple may have fixed the vulnerability. Google is your friend. 😂
may i ask is there someway to get or legally hack my steam account back as someone hacked it and changed the password email and phone do u have any tips as steam support aint very helpful
If ur sure there’s no way to recover ur account as the rightful owner then contact support. If they’re no help then oh well. try to be more careful online so it doesn’t happen again
@loi i have been reading n watching many hacking videos and none of them are useful they are bunch of view eater. In my case i have a normal target just to find about hostname n target machine ip. i had search there website and i got every details like ip dns email of the website in every video they just give little bit of information. They dont tell how to find about target machine ip n hostname from website
There is no doubt that you will rise fast at the apex of your career *TECH SAFE GUARDIAN* . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of Impossible by becoming PRO at tackling Problems. You Rock!
loi please u must learn better to draw, my engllish as german guy is not the yellow from the egg and when i must endkrypto ur Artwork it is very hard to learn from u, but i find u are a very good teacher... so please better draw in german we say du hast ne sauklaue die kein schwein lesen kann... thanks fpr teaching me loi
Question from a total newbie: Doesn’t the AIO security (WP plug-in) block these kind of attempts immediately? My thoughts are that this maybe was easier some years ago when many websites didn’t update their security automatically. Today a website in shared hosting often gets blocked automatically by the hosting company if the sites refusing to update WP theme, plugins, php and so on. Someone with skills that mind to inform this lost newbie soul?! 😂
Bro... user ids in url? That s the dumbest thing I have ever seen and still people are using these things. In my university for example in their site there was a few years ago this issue.
Yeah. One secure way is to use the auth token after login to get data for a specific user. Tho if the site has some XSS problems you could get the session id and replicate the session of others or make sql injection that will get you the user data. Sessions must have a timespan of 30 min or less to be harder to break.
A lot of this is confusing. What terminal are you using? Is this terminal application an app, or can be? What Kali Linux app do you recommend downloading for Androids and Windows desktops, & laptops? Have a basics getting started playlist? Have a legend guide explaining what all these symbols mean and do, such as < or - or " or etc. ?
Sir we hack any website database and inseart data How it is posibal, sir you should make a video for this topic. I request to you please make a video on this topic, How to hack a website database and inseart data.
Hacker loi u sexy. EHEM anyways. As a web developer actively trying to create a social network on my own and release it to the public, it would be an understatement to say I'm frightened. But as long as Loi keeps producing these videos I can patch most of this stuff.
.-.
I think thats the purpose anyways, not like teaching black hackers...
Hacking is illegal but u r ligal 😅😅 so I learnt with u ❤️😎
i woukd edit that comment if i were u
most of these vulnerabilities are already patched by default if you use up to date frameworks.
As a developer for more than 25 years now, i always though that preventing these kind of "attacks" was basic web development. I never thought that in 2023, devs would still leave so many doors opened. I know it's just an example and dummy website, but if you used it like this, it's because you know devs do it LoL.
Sir can u help me please a little help
@@Devilofthenightsu want me to hack Uranus ?
You certainly would be surprised. Doing a google search for something like "&id=" would list any websites who haven't had their urls rewritten. 5 minutes later and I can have database access for a super user if they've also not encrypted their passwords, which is the next blunder.
@@Devilofthenights Trust me when i say... Nobody can help you... but yourself.
Welp, when companies are laying off more experienced developers in favor for young and cheap ones, this is what you get. 😅 and when there are no layoffs, developers are only interested in creating the minimum viable product and then moving on to the next job. Ofcourse this is the structure you end up with.
Excellent video. A 40-hour course on this topic and technique would be a big hit!
Direct hit.
Get hide my ass
is it free
You're the teacher, the rest is zero ❤️
The way of explaining things is great. Its like a friend is explaining to me. Thankyou for giving us content
Indeed, remote access to the victim computer is like holding remote searching through TV channels. Both are remotes.
This sort of thing is super interesting. Definitely going to be coming back to this channel when I have time.
Bro someone is blackmailing my sister i
want to hack his acc or just want to delete
his acc nedd ur help plz help
whatsap
+1
61
63
58
15:15 Why cd into db then run ls? Wouldn’t it be easier to just run “ls db”?
I don't even know anything about hacking, I just like listening to this ninja talk. I like how he says 'double-dash'. Just me?
Leaving a relationship you’re not happy in is much easier than emotionally damaging someone. But selfish people don’t get that
Wrong video, ma’am
That said, leaving a relationship, specially if it’s toxic, is probably the most difficult of all!
Selfish people don’t have to put effort in hurting others. They naturally just do.
13:43 Great example, thumbs up, subbed!!
Nice tutorial, but I would have done wget command to a php shell and done everything through it, much easier though..
explain please in detail if possible
CRYPTO SCAM VICTIM ? As a Retired combat Marine I want to tell you that as what you are doing is just as important as any warrior on the battlefield. You are waging warfare against these criminals and terrorists on the digital battlefield. You are defending and protecting the most vulnerable of our society against these predators. Keep up the good work *TECH SAFE GUARDIAN on the WEB*
Very good video, but i hope that you remove the music in the backround in future videos because its very distracting and annoying. Thanks
Great video. I will like to know how you trace someone via IP. Educational purpose
Elaborate on what you mean by "trace"?
Skiddie
Everyone wants to watch one video, and be an elite hacker.
😂
That database picture looks juicy 😲😅
you're the best hacker loi I feel like you dont get much credit for your work I wish I could be home schooled like you
by**
I have a question please 🙏 should my ip addres be the same as in the burp proxy settings?
Loi Liang Yang what is the name of the app you used for commanding injections
Scrolling trough these comments makes my brain rot
Mine too
You'll be fine, besides you don't have to read such brain-washing comment section.
Why lol
I'll take your word for it
@@amongusboi2032brainwashing?....Now I admit it's all connected, & 1/2 of these were not even submitted by a human being....but you are concerned about the comments section?!?😅😅 I would think that it was a given that brainwashing was the overall object of the entire platform....but that's just me
Hey Mr Loi. I really need your help. It’s very important for me. Thanking you in advance
You didn’t give recommendations/solutions on how to protect against these kinds of attacks
I believe changing your website URLs to random strings of letter and numbers might help.
The way you approached this project added so much to it. It’s great to see how your unique perspective contributed to the outcome. The role you play on your job *Adrian hacks online on the WEB* is crucial. I really appreciate the constructive feedback you give to me regularly
Would you give online one on one lessons, i would love to learn from you via a stream room where i can share screan and learn ethical hacking.
First download as usual❤😅
Please sir, I can't run monitor mode and packet injection on my internal wireless card. I'm using Nexus 6p device. I've flashed the nexmon patch but doesn't work still.
Deangelocrack.
On lnstagram
She can help you
bro is making us next him 💀💀
Liked the video, but how can you change the html?
Ma G . Best teacher 😂❤❤
Great video! I just started your Udemy course and it's full of great information! Thank you for all you do!
Hi, can you tell what's the coding for withdraw money from website account to another account. Please
DB in the Open_basedir ? Who does that ?
What would be the technic in real site, cause its a demo website and it has no ssl also.😊
I believe more time and more repeatedly processes.
Yow thanks. Can I have the link of this owaspb dummy project rather than git-ting it on my machine?
Im trying to replicate your OS command injection - how do you get the commands to execute from the file name? How does the filename have shell access?
Sir,that page doesn't follow the DES algorithm so we can bypass that what if it follows DES algorithm?
These techniques don't actually work in practice. While these tools are rudimentary to understanding how common vulnerabilities work to exploit them, applying these concepts in the field requires proficiency in DevOps and programming.
A proficiency in DevOps provides the necessary skills and knowledge required to understand these systems and their vulnerabilities at large. This includes how these servers are designed and maintained in production, and how the project/server files are structured and how they are accessible to different users. To gain proficiency in the skill, practice by building a simple chat client that utilizes a variety of protocols. Once you've done this, you need to host a Linux server on the cloud and deploy you client application to this server. Make sure to read documentation thoroughly to make sure you have everything running the way it should. Furthermore, you enable several protocols to your server for practice in hacking them, and securing them, then repeat.
Programming proficiency is a critical step and is trivial to your success in penetrating any system "out in the wild" (uncontrolled environment). Although scripting with pre build tools on Kali can be effective in theory, any antivirus out there can detect these attempts to infiltrate their system with these common techniques and thus requires you to get creative with your own code to evade detection. Think of it like this: if team read has built it, team blue has reverse engineered it; if team red has seen it, so has team blue; if team red has updated OffSec tools, likewise team blue has updated antivirus.
In conclusion, learn these prerequisites of engineering and become very familiar with these systems and how they are maintained, and you should be on your way to becoming a(n) "ethical" hacker.
Where should the such web page be found?
Hacker kLi you are genuis. I am Linux administrator and your tutorials are fucking awesome. Please keep making these types of videos. Thanks to youtube algorithm which suggests your channel.
Make a tutorial on kali Linux
My linux looks so different
My competitor has assigned him self as my developer and is merging and taking over my account and controlling my network messages and internet. What do I do for help ?
*Tracebackassets is an exceptional private investigator specializing in cryptocurrency theft cases. They have a team of highly skilled professionals who are dedicated to solving these types of crimes. With their expertise in blockchain technology, they can trace stolen funds and identify the culprits behind the theft.*
ur cooked lol
I love your videos 🇵🇭🇵🇭🇵🇭❤️
I want learn hacking for hack gambling site, but so hard to me
Can I use these website for learning?
please kindly make repoting template video on how to document findings
I need you help sir..😢😢😢😢
I need some help also
𝐇𝐞𝐥𝐥𝐨
𝐀𝐚𝐩 𝐦𝐮𝐣𝐡𝐞 𝐛𝐚𝐭𝐚𝐨 𝐤𝐲𝐚 𝐡𝐞𝐥𝐩 𝐤𝐚𝐫𝐧𝐢
What screen recorder do you use please
Hey, i have froxy poxy and burp suite, but how do i connect froxy to it?
19:50 WAF (Web Application Firewall)
How to get membership, is there any channel link?
I just subscribed and liked the video, just cause I’m scared of being hacked
please show how to make undetectable metasploitable payload
How to recover Facebook id recover, and change password , hacker was set up a bot in id
Everyone should have a dedicated person like you *Adrian hacks online on the WEB* . People dream of hiring such a talented expert like you. Keep up the hard work.
Awesome Tutorial Loi!
If you hadn't written on the screen, I wouldn't have understood.
Thank you.
The efficiency of this *TECH SAFE GUARDIAN* is next level. To juggle walk throughs of various angles on the topic delivered to-camera, different content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense access like this so digestible is really something. Awesome work james!!
Damn homie Loi, you made make IT shacking when you are around, thanks for you videos man, I'm a programmer and I 'm learning always great things to secure my apps, so thanks brother ! continue blowing our minds with your snacky methods of creating backdoors.
Awesome 🤩🤩😍
Good morning to you sir. Please my browser isn’t working in Kali Linus. Kindly help me
When I send the request for the listener in burpsuite, i get a error of 413 entity too large to execute please help
You should do a video on iPhone lockscreen bypass, and disabled iPhone removal. I've had found my old iPhone I lost years ago would be nice to open it! Thanks
There’s hundreds of programs that solves that easily (depending on iPhone model). Just find the latest version, otherwise Apple may have fixed the vulnerability.
Google is your friend. 😂
may i ask is there someway to get or legally hack my steam account back as someone hacked it and changed the password email and phone do u have any tips as steam support aint very helpful
If ur sure there’s no way to recover ur account as the rightful owner then contact support. If they’re no help then oh well. try to be more careful online so it doesn’t happen again
Is it possible to block a video using cmd
im not even a newbie im just watching to recall my memory XD
That's Amazing method
How to bypass Snapchat suspicious login code thing without code?
Love you Loi. your my best friend now bro.
trop bien mais trop vite... 😕 difficile à suivre le texte. dommage.
How can i learn ethical hacking for free??
I love u bro ❤
The classic payed bot comment. 😂
Title should be "How hackers hack any website in 23 minutes ??"
BTW informative Video man !!!!!!
Big bro till date you didn't teach me to hack by your termux videos. I need yours faithfully help
@loi i have been reading n watching many hacking videos and none of them are useful
they are bunch of view eater.
In my case i have a normal target just to find about hostname n target machine ip.
i had search there website and i got every details like ip dns email of the website
in every video they just give little bit of information.
They dont tell how to find about target machine ip n hostname from website
Hi, how to root android phone?
I think you misclicked a video
this link is not working
Can we use dev tool instead of burpsuit?
I dont think so. I mean maybe through a lot of coding know how and make it harder for you but burp makes it easy
does it work on windows11?
There is no doubt that you will rise fast at the apex of your career *TECH SAFE GUARDIAN* . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of Impossible by becoming PRO at tackling Problems. You Rock!
loi please u must learn better to draw, my engllish as german guy is not the yellow from the egg and when i must endkrypto ur Artwork it is very hard to learn from u, but i find u are a very good teacher... so please better draw in german we say du hast ne sauklaue die kein schwein lesen kann... thanks fpr teaching me loi
How did you do the lookz like an 8 but not how 5:49
if you forget your password you know where to find it
Question from a total newbie:
Doesn’t the AIO security (WP plug-in) block these kind of attempts immediately? My thoughts are that this maybe was easier some years ago when many websites didn’t update their security automatically.
Today a website in shared hosting often gets blocked automatically by the hosting company if the sites refusing to update WP theme, plugins, php and so on.
Someone with skills that mind to inform this lost newbie soul?! 😂
wordpress is shit all the wafs fucking suck
What need hacker to hack laptop or desktop?
Hi Shal we discuss about the defimine usdt jingchen now
We need this
Bro... user ids in url? That s the dumbest thing I have ever seen and still people are using these things. In my university for example in their site there was a few years ago this issue.
Now we have slugs in the place of user I'd
I think developer income is less that's why he is using I'd instant of slugs
Yeah. One secure way is to use the auth token after login to get data for a specific user. Tho if the site has some XSS problems you could get the session id and replicate the session of others or make sql injection that will get you the user data. Sessions must have a timespan of 30 min or less to be harder to break.
Thanks man
Exciting to watch your videos
how to hack api's plz
Should you use any VPN so that they do not come to your home to discuss your level of intelligence?
no hit it home wifi and deface the site with ur addy like
A lot of this is confusing. What terminal are you using? Is this terminal application an app, or can be? What Kali Linux app do you recommend downloading for Androids and Windows desktops, & laptops? Have a basics getting started playlist? Have a legend guide explaining what all these symbols mean and do, such as < or - or " or etc. ?
it is default terminal in kali linux. all apps in this video already satisfied in kali linux.
Thanks
bros a network chuck rip off and i respect that
loi>networkchuck
Only mobile number se phone Ko all control kaise kare?
Deangelocrack..
On lnstagram
She can help you out
I'm really confused
, because I see that beef cookie everywhere as well, and I don't know how to get rid of. Is there anyone who has sorted it out?
Are you talking about the cookie puller BeEf?
6:32 that BEEFHOOK:xxxxx
cookie I mean
only if Im on incognito ,its not there
Great sir
Sir we hack any website database and inseart data How it is posibal, sir you should make a video for this topic. I request to you please make a video on this topic, How to hack a website database and inseart data.
iam also learing u r course
why your last name is Yang , are you hmong or not
Dwi mkad wla sir thwa
Bhai jab hackers ek min mae bhi website hack kar sakte hae to tu 1 min ki hi video banata 😊