filter and protect data input from sql injection ,param statements - all user files with sens info stored remotely with file intrusion detection . turn error reporting off - use better hashing for passwords . firewall to block rogue and log sql attempts . it would be interesting to see you make a follow video to this and demo how to protect against each of the attacks/vuln etc
Depend what tools you used. That parameters can allow by admin without injector 'tol get permission and can come in by it self to get the password. If you used the injectors the security admin will rejected your flow into that systems. I already prove it by my own theories.
@@zeeniarrahpradipt7829 normally if a hacker is using the url in the browser to input sql injection or any text input field -i set a condition that sets a validation request to true in the database once a successful login is found when checking against users names/emails and passwords once the validation is set to true the browsers page will load its contents otherwise the page stops loading and nothings gets passed from db to the hacker
Hi everyone! Am extremely excited and feel blessed to click on this video. I know it super long, but so far....am loving every single second about it. I always wanted to do something in the IT filed, but with my busy schedule...I was always contempla
Great channel and very useful recommendation, many thanks for your efforts, may i ask when setting up the mirroring device you mentioned that it has to use the same Apple ID Account (child one), but does it need the same SIM card and number ? i.e. i have
Едет поезд "Москва-Харьков", проходит уборщица и спрашивает мужика: - Вы на харькiв? - да. - ну так иди и убирай.! PS: Народная мудрость - Без "агента" ни один цифровой упырь на носу не вскочит
Awesome as always, actually I want to say something, I know it not good to ask but, my family's financial condition got worse and i can't afford a laptop, I used to learn hacking from your channel and practice it on my friend's laptop, but he has moved away.I am very passionate about hacking and want to learn more, I can't do everything on termux, some tools require laptop,It would be a great help if I can get even a simple working laptop. I will pay you back, when I will start earning. I hope you understand my situation guys. Thanks❤
Hello Loi Liang Yang, I am under the impression that my TH-cam is hacked, my Playlists are being listed as "Updated today" or "Updated # days ago" without being logged in or adding/removing from these playlists. Is there any way to purge a session token on TH-cam and force all actors to log out of the account?
I don't think you understand what's happening here. The page will usually have encoding on the client side before even sending it. Ssl is transporting .. hashing is usually done to encode the information being sent. For example: you enter your name and password on the Web page, when you click log in that data is encoded then uses ssl to send it. Hope it helps ✌️
OH!! means i am just finding the username and password and after that login the username and password are encoded and then being send to the database for query?Am i right? @@macktheripper7454
Often the difference between whether a person is identified as a hacktivist (or Batman vigilante as described here) or a terrorist is whether the person describing the hacker agrees with their ideology or not. One of the reasons why doing real harm with h
“Jesus said to his disciples: “Things that cause people to stumble are bound to come, but woe to anyone THROUGH WHOM they come.” Luke 17:1 NIV
Hlo sir I want to learn for free with videos full ethical hacking , website hacking, andriod hacking also plz suggest me anyone where i get free videos
How to hack a website login page when it locks an account after a failed login attempt, like if you failed to login 3 or 5 times, then it has a timeout for 30 seconds or an account logout mechanism. Can you guide me about this?
Ok, so to be ethical hacker there is these certifications you need to pay for to take such as : EC Council start with cpent cert and make your way up to CEH cert
Not going to lie, but we are actually really proud to have an employee like you as part of our team. The job is done so gracefully and neatly. Very well done, dear *usespy online.* First of all. Thank you for making the work environment so friendly and ta
The efficiency of this *usespy online is next level.* To juggle walk throughs of various angles on the topic delivered to-camera, different content per topic from various folks underneath the umbrella of the track list of the larger big band concert itsel
*usespy online,* youre one of my favorite people on this planet.. (And I dont even know you personally). The way in which you present your work, the content and the access is just awesome. Thank you!! This project is unbelievably amazing and thanks for
filter and protect data input from sql injection ,param statements - all user files with sens info stored remotely with file intrusion detection . turn error reporting off - use better hashing for passwords . firewall to block rogue and log sql attempts . it would be interesting to see you make a follow video to this and demo how to protect against each of the attacks/vuln etc
Depend what tools you used. That parameters can allow by admin without injector 'tol get permission and can come in by it self to get the password. If you used the injectors the security admin will rejected your flow into that systems. I already prove it by my own theories.
@@zeeniarrahpradipt7829 normally if a hacker is using the url in the browser to input sql injection or any text input field -i set a condition that sets a validation request to true in the database once a successful login is found when checking against users names/emails and passwords once the validation is set to true the browsers page will load its contents otherwise the page stops loading and nothings gets passed from db to the hacker
Man,I love this guy❤❤
Hi everyone! Am extremely excited and feel blessed to click on this video. I know it super long, but so far....am loving every single second about it. I always wanted to do something in the IT filed, but with my busy schedule...I was always contempla
You are so brilliant . May God Bless you with good health , wealth and wisdom.
Great channel and very useful recommendation, many thanks for your efforts, may i ask when setting up the mirroring device you mentioned that it has to use the same Apple ID Account (child one), but does it need the same SIM card and number ? i.e. i have
Your knowledge is so helpful! Thank you
Your content is fantastic
Thank you for nice explanation! Do you have any ebooks or website that provide detailed explanations for all latest methods?
Hello Hacker Loi, I'm amused by the video. I do have one question though, how did you find the -T section at 9:33?
Nice video .😎🤘
This is a great attack....from 10 years ago when mfa wasn't in play and when 3 max attempts weren't a real thing..
Едет поезд "Москва-Харьков", проходит уборщица и спрашивает мужика:
- Вы на харькiв?
- да.
- ну так иди и убирай.!
PS: Народная мудрость - Без "агента" ни один цифровой упырь на носу не вскочит
Thanks for sharing your Great Knowledge !
Was waiting for this
road to 1 million loi sir 🤩
Awesome as always, actually I want to say something, I know it not good to ask but, my family's financial condition got worse and i can't afford a laptop, I used to learn hacking from your channel and practice it on my friend's laptop, but he has moved away.I am very passionate about hacking and want to learn more, I can't do everything on termux, some tools require laptop,It would be a great help if I can get even a simple working laptop. I will pay you back, when I will start earning. I hope you understand my situation guys.
Thanks❤
Is there a course orvideo on reverse shell from zero to hero
please make a video about how IDOS works
brute force sucks for large websites you would need a room full of super computures to accomplish this for say FB
Give me a hint what should be used instead
/noob
social engineering and hope they dont have 2-fa enabled. i would say phishing would be you best bet
I like your content but maybe you consider showing us new attacks like those of a real-world system rather than the same invented wheel
Hello.
How can i get your full course on Cyber security (Ethical hacking)?
could you please make a video about proxy chain once more???
What about the app download
i love your work sir
i fux with ya heavy broseph, keep slayin it king
Your Videos are amazing...
thank you
This attacks are deprecated 😅😂😊❤
lol its deprecated deprecated
😂😂
Just because its deprecated doesn't mean its not effective... IRL many people still use outdated tech
It's always nice to know windows xp tricks 🛜
Doesnt matter/ if u need to learn to protect yourself. Old techniques r better than not knowing any techniques
I was never able to Download..Kali Linux..can u do a video..and how do u check open port..on android..
Nice thanks 🥺
Good luck cracking a hash when salted lol
These techniques are decades old.
Hello guys I want to ask you all. Why we need as proxy foxy, because already we have browser incllude with proxy in the burb suite.
You can use the burp proxy if you want but foxy proxy works very well with burp
why?@@macktheripper7454
Y is his cat command and cd longer or different than default?
Is there such a thing as ethical intruder?
And that is provided you stay put as intruder and not advance to burglary and theft.
Kai linux vs parrot os?? Which should i prefer as a pro h@cker?
He is using kali linux
@@amongusboi2032 yeah, that i know, but i m asking for myself, and i dont know if he is a pro h@cker!!
Hello Loi Liang Yang, I am under the impression that my TH-cam is hacked, my Playlists are being listed as "Updated today" or "Updated # days ago" without being logged in or adding/removing from these playlists. Is there any way to purge a session token on TH-cam and force all actors to log out of the account?
Please a tutorial for WI-FI password🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏
good
👌
is there a way to do this on Mac?
I need help with a scammer that took 1.5k from me :/
If you have purchased the Burp Suite... Otherwise it will take 5 years 😂
Over 1 year u don't replay on udemy.
Replay us, we're ur student, we need ur help, we can be those who can destroy ur brand image.
i like your contents
Nice Sir Loi :D
it is impossible to hack social media?
hacker loi u r realy amazing
but nowadays websites are not vulnerable to sql injection
Right bro 😢
Bro it’s been a while since you posted 😢
burpsuite tutorial pls,,,,beacause browser request not show in burpsuite
how are you master loi
i think is good!
thid kali ferst 😊
I have watched this video in .75x
The use of the HTTP protocol on a website is insecure. If a website uses SSL encryption, can it still be intercepted in this way?
I don't think you understand what's happening here. The page will usually have encoding on the client side before even sending it. Ssl is transporting .. hashing is usually done to encode the information being sent. For example: you enter your name and password on the Web page, when you click log in that data is encoded then uses ssl to send it. Hope it helps ✌️
OH!! means i am just finding the username and password and after that login the username and password are encoded and then being send to the database for query?Am i right?
@@macktheripper7454
best❤
is it possible to trace the location of the stolen device using imei?
Deangelocrack
On lnstagram
She can help you
Ok so How to hack "strong 💪 password" and the encryption key web app???
Your comment makes no sense .. can you try again?
Deangelocrack.
On lnstagram
She can assist you
how to do the curisve thinggg in 2:14
Can you get the password to one of my old accounts please?
Seatoolx🤏🏾
Being a script kiddie, watching this video...
i am ethical hacker
Hey mister Loi is there any way i can send you my other email to get the password please thank you
Often the difference between whether a person is identified as a hacktivist (or Batman vigilante as described here) or a terrorist is whether the person describing the hacker agrees with their ideology or not. One of the reasons why doing real harm with h
What are you babbling on about?
Only mobile number se phone Ko hack kaise kare
Bang aku minta no wa nya bang....
Sir
Please can you create bug hunting video 😊 hackerone or any bughunding platform😊
No. he makes people script kiddies
“Jesus said to his disciples: “Things that cause people to stumble are bound to come, but woe to anyone THROUGH WHOM they come.”
Luke 17:1 NIV
Sir , can we crack WiFi password by using command prompt . If we can then plz make a video in it . Waiting for the video......!!!!!
😂lol
First???❤
Hlo sir I want to learn for free with videos full ethical hacking , website hacking, andriod hacking also
plz suggest me anyone where i get free videos
You really think this is useful for redteaming?
hey loi please answer
Hacking is legal man
Hacking is legal if you authorized to preform operations, know very well that law enforcement will question the host or the management.
Halo bro
sir, you are my idol. Siri can you help me... I am at beginner level.
Cool
🎉
can you teach me cuz i'm deaf🥺🥺🥺🥺🥺🥺🥺🥺 if yes then i'm over the moon
How to hack a website login page when it locks an account after a failed login attempt, like if you failed to login 3 or 5 times, then it has a timeout for 30 seconds or an account logout mechanism. Can you guide me about this?
Deangelocrack
On lnstagram
She can help you out
😍
Hi Bhai I am a 10 class student and I want to become a hacker how can I start my journey please tell
Ok, so to be ethical hacker there is these certifications you need to pay for to take such as : EC Council start with cpent cert and make your way up to CEH cert
Cpent is pen testing certification for those beginners to hacking.
There is also a website other then Ec council called offsec
There is comptia with pen test+
Hackthe box website
hello hackerloi
Hack Facebook
mera Facebook account hack Ho Gaya uska password phone number Dete Hain
On lnstagram
She can help you
Deangelocrack.
pin comment ^^)
You are teaching everything outdated
1#
Not going to lie, but we are actually really proud to have an employee like you as part of our team. The job is done so gracefully and neatly. Very well done, dear *usespy online.* First of all. Thank you for making the work environment so friendly and ta
First
The efficiency of this *usespy online is next level.* To juggle walk throughs of various angles on the topic delivered to-camera, different content per topic from various folks underneath the umbrella of the track list of the larger big band concert itsel
🫡🫡🫡🫡 respect ✊
*usespy online,* youre one of my favorite people on this planet.. (And I dont even know you personally). The way in which you present your work, the content and the access is just awesome. Thank you!! This project is unbelievably amazing and thanks for