Hacker loi u sexy. EHEM anyways. As a web developer actively trying to create a social network on my own and release it to the public, it would be an understatement to say I'm frightened. But as long as Loi keeps producing these videos I can patch most of this stuff.
As a developer for more than 25 years now, i always though that preventing these kind of "attacks" was basic web development. I never thought that in 2023, devs would still leave so many doors opened. I know it's just an example and dummy website, but if you used it like this, it's because you know devs do it LoL.
You certainly would be surprised. Doing a google search for something like "&id=" would list any websites who haven't had their urls rewritten. 5 minutes later and I can have database access for a super user if they've also not encrypted their passwords, which is the next blunder.
Welp, when companies are laying off more experienced developers in favor for young and cheap ones, this is what you get. 😅 and when there are no layoffs, developers are only interested in creating the minimum viable product and then moving on to the next job. Ofcourse this is the structure you end up with.
CRYPTO SCAM VICTIM ? As a Retired combat Marine I want to tell you that as what you are doing is just as important as any warrior on the battlefield. You are waging warfare against these criminals and terrorists on the digital battlefield. You are defending and protecting the most vulnerable of our society against these predators. Keep up the good work *TECH SAFE GUARDIAN on the WEB*
That said, leaving a relationship, specially if it’s toxic, is probably the most difficult of all! Selfish people don’t have to put effort in hurting others. They naturally just do.
The way you approached this project added so much to it. It’s great to see how your unique perspective contributed to the outcome. The role you play on your job *Adrian hacks online on the WEB* is crucial. I really appreciate the constructive feedback you give to me regularly
@@amongusboi2032brainwashing?....Now I admit it's all connected, & 1/2 of these were not even submitted by a human being....but you are concerned about the comments section?!?😅😅 I would think that it was a given that brainwashing was the overall object of the entire platform....but that's just me
Hacker kLi you are genuis. I am Linux administrator and your tutorials are fucking awesome. Please keep making these types of videos. Thanks to youtube algorithm which suggests your channel.
Everyone should have a dedicated person like you *Adrian hacks online on the WEB* . People dream of hiring such a talented expert like you. Keep up the hard work.
The efficiency of this *TECH SAFE GUARDIAN* is next level. To juggle walk throughs of various angles on the topic delivered to-camera, different content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense access like this so digestible is really something. Awesome work james!!
There is no doubt that you will rise fast at the apex of your career *TECH SAFE GUARDIAN* . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of Impossible by becoming PRO at tackling Problems. You Rock!
Damn homie Loi, you made make IT shacking when you are around, thanks for you videos man, I'm a programmer and I 'm learning always great things to secure my apps, so thanks brother ! continue blowing our minds with your snacky methods of creating backdoors.
You should do a video on iPhone lockscreen bypass, and disabled iPhone removal. I've had found my old iPhone I lost years ago would be nice to open it! Thanks
There’s hundreds of programs that solves that easily (depending on iPhone model). Just find the latest version, otherwise Apple may have fixed the vulnerability. Google is your friend. 😂
My competitor has assigned him self as my developer and is merging and taking over my account and controlling my network messages and internet. What do I do for help ?
*Tracebackassets is an exceptional private investigator specializing in cryptocurrency theft cases. They have a team of highly skilled professionals who are dedicated to solving these types of crimes. With their expertise in blockchain technology, they can trace stolen funds and identify the culprits behind the theft.*
loi please u must learn better to draw, my engllish as german guy is not the yellow from the egg and when i must endkrypto ur Artwork it is very hard to learn from u, but i find u are a very good teacher... so please better draw in german we say du hast ne sauklaue die kein schwein lesen kann... thanks fpr teaching me loi
Please sir, I can't run monitor mode and packet injection on my internal wireless card. I'm using Nexus 6p device. I've flashed the nexmon patch but doesn't work still.
Hi hacker Loi I love your work I just found your channel and all your videos are awesome! I'm using your videos and practiced myself for a security reasons of my new company. I'm stuck whit a problem and I would really like you to help me guide me through this problem so I can continue learning. Kind regards
These techniques don't actually work in practice. While these tools are rudimentary to understanding how common vulnerabilities work to exploit them, applying these concepts in the field requires proficiency in DevOps and programming. A proficiency in DevOps provides the necessary skills and knowledge required to understand these systems and their vulnerabilities at large. This includes how these servers are designed and maintained in production, and how the project/server files are structured and how they are accessible to different users. To gain proficiency in the skill, practice by building a simple chat client that utilizes a variety of protocols. Once you've done this, you need to host a Linux server on the cloud and deploy you client application to this server. Make sure to read documentation thoroughly to make sure you have everything running the way it should. Furthermore, you enable several protocols to your server for practice in hacking them, and securing them, then repeat. Programming proficiency is a critical step and is trivial to your success in penetrating any system "out in the wild" (uncontrolled environment). Although scripting with pre build tools on Kali can be effective in theory, any antivirus out there can detect these attempts to infiltrate their system with these common techniques and thus requires you to get creative with your own code to evade detection. Think of it like this: if team read has built it, team blue has reverse engineered it; if team red has seen it, so has team blue; if team red has updated OffSec tools, likewise team blue has updated antivirus. In conclusion, learn these prerequisites of engineering and become very familiar with these systems and how they are maintained, and you should be on your way to becoming a(n) "ethical" hacker.
A lot of this is confusing. What terminal are you using? Is this terminal application an app, or can be? What Kali Linux app do you recommend downloading for Androids and Windows desktops, & laptops? Have a basics getting started playlist? Have a legend guide explaining what all these symbols mean and do, such as < or - or " or etc. ?
Awesome work, *TECH SAFE GUARDIAN on the WEB* ! It's so satisfying to see you putting in the effort to stop those shady characters. Protecting the public, especially the elderly, from those despicable con artists is crucial. You truly deserve recognition and appreciation for keeping us secure. I'm thrilled for you because you're my sibling. Your accomplishments definitely make you a strong contender for the Nobel Peace Prize. Keep up the outstanding performance!!!!!
Question from a total newbie: Doesn’t the AIO security (WP plug-in) block these kind of attempts immediately? My thoughts are that this maybe was easier some years ago when many websites didn’t update their security automatically. Today a website in shared hosting often gets blocked automatically by the hosting company if the sites refusing to update WP theme, plugins, php and so on. Someone with skills that mind to inform this lost newbie soul?! 😂
I'll be honest, I'll say am still new the hacking world....and within that time, I would like to think that. Pretty much have a really good how hacking works.😅🤔 Like before I watched this video, had few ideas in mind. I just wasn't sure if my theory is possible/ if I had the right idea or not. This video just basically confirmed that I was right. I agree with you that...with great power, cames great responsibility.😎 Just because I have (new ideas) I can create something new with this information.😁
"Hacking is illegal. If you get caught hacking you'll never get to see Hacker Lois videos again." Then teach us how to not get tracked while hacking, mr Hacker Loi
Sir we hack any website database and inseart data How it is posibal, sir you should make a video for this topic. I request to you please make a video on this topic, How to hack a website database and inseart data.
*TECH SAFE GUARDIAN* willingness to assist and offer valuable advice speaks volumes about your character and the supportive environment you cultivate. I’m incredibly grateful to have someone like you.
@loi i have been reading n watching many hacking videos and none of them are useful they are bunch of view eater. In my case i have a normal target just to find about hostname n target machine ip. i had search there website and i got every details like ip dns email of the website in every video they just give little bit of information. They dont tell how to find about target machine ip n hostname from website
Hacker loi u sexy. EHEM anyways. As a web developer actively trying to create a social network on my own and release it to the public, it would be an understatement to say I'm frightened. But as long as Loi keeps producing these videos I can patch most of this stuff.
.-.
I think thats the purpose anyways, not like teaching black hackers...
Hacking is illegal but u r ligal 😅😅 so I learnt with u ❤️😎
i woukd edit that comment if i were u
most of these vulnerabilities are already patched by default if you use up to date frameworks.
As a developer for more than 25 years now, i always though that preventing these kind of "attacks" was basic web development. I never thought that in 2023, devs would still leave so many doors opened. I know it's just an example and dummy website, but if you used it like this, it's because you know devs do it LoL.
Sir can u help me please a little help
@@horrorworld8251u want me to hack Uranus ?
You certainly would be surprised. Doing a google search for something like "&id=" would list any websites who haven't had their urls rewritten. 5 minutes later and I can have database access for a super user if they've also not encrypted their passwords, which is the next blunder.
@@horrorworld8251 Trust me when i say... Nobody can help you... but yourself.
Welp, when companies are laying off more experienced developers in favor for young and cheap ones, this is what you get. 😅 and when there are no layoffs, developers are only interested in creating the minimum viable product and then moving on to the next job. Ofcourse this is the structure you end up with.
Excellent video. A 40-hour course on this topic and technique would be a big hit!
Direct hit.
Get hide my ass
is it free
The way of explaining things is great. Its like a friend is explaining to me. Thankyou for giving us content
Indeed, remote access to the victim computer is like holding remote searching through TV channels. Both are remotes.
You're the teacher, the rest is zero ❤️
This sort of thing is super interesting. Definitely going to be coming back to this channel when I have time.
I don't even know anything about hacking, I just like listening to this ninja talk. I like how he says 'double-dash'. Just me?
CRYPTO SCAM VICTIM ? As a Retired combat Marine I want to tell you that as what you are doing is just as important as any warrior on the battlefield. You are waging warfare against these criminals and terrorists on the digital battlefield. You are defending and protecting the most vulnerable of our society against these predators. Keep up the good work *TECH SAFE GUARDIAN on the WEB*
Leaving a relationship you’re not happy in is much easier than emotionally damaging someone. But selfish people don’t get that
Wrong video, ma’am
That said, leaving a relationship, specially if it’s toxic, is probably the most difficult of all!
Selfish people don’t have to put effort in hurting others. They naturally just do.
Very good video, but i hope that you remove the music in the backround in future videos because its very distracting and annoying. Thanks
Nice tutorial, but I would have done wget command to a php shell and done everything through it, much easier though..
explain please in detail if possible
13:43 Great example, thumbs up, subbed!!
Hey Mr Loi. I really need your help. It’s very important for me. Thanking you in advance
0:09 Hey friend can you tell me what you need help with???
Great video. I will like to know how you trace someone via IP. Educational purpose
Elaborate on what you mean by "trace"?
Skiddie
Everyone wants to watch one video, and be an elite hacker.
😂
you're the best hacker loi I feel like you dont get much credit for your work I wish I could be home schooled like you
by**
The way you approached this project added so much to it. It’s great to see how your unique perspective contributed to the outcome. The role you play on your job *Adrian hacks online on the WEB* is crucial. I really appreciate the constructive feedback you give to me regularly
Scrolling trough these comments makes my brain rot
Mine too
You'll be fine, besides you don't have to read such brain-washing comment section.
Why lol
I'll take your word for it
@@amongusboi2032brainwashing?....Now I admit it's all connected, & 1/2 of these were not even submitted by a human being....but you are concerned about the comments section?!?😅😅 I would think that it was a given that brainwashing was the overall object of the entire platform....but that's just me
That database picture looks juicy 😲😅
Bro someone is blackmailing my sister i
want to hack his acc or just want to delete
his acc nedd ur help plz help
whatsap
+1
61
63
58
Hacker kLi you are genuis. I am Linux administrator and your tutorials are fucking awesome. Please keep making these types of videos. Thanks to youtube algorithm which suggests your channel.
Great video! I just started your Udemy course and it's full of great information! Thank you for all you do!
Would you give online one on one lessons, i would love to learn from you via a stream room where i can share screan and learn ethical hacking.
Everyone should have a dedicated person like you *Adrian hacks online on the WEB* . People dream of hiring such a talented expert like you. Keep up the hard work.
You didn’t give recommendations/solutions on how to protect against these kinds of attacks
I believe changing your website URLs to random strings of letter and numbers might help.
The efficiency of this *TECH SAFE GUARDIAN* is next level. To juggle walk throughs of various angles on the topic delivered to-camera, different content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense access like this so digestible is really something. Awesome work james!!
Ma G . Best teacher 😂❤❤
Loi Liang Yang what is the name of the app you used for commanding injections
Liked the video, but how can you change the html?
15:15 Why cd into db then run ls? Wouldn’t it be easier to just run “ls db”?
bro is making us next him 💀💀
Yow thanks. Can I have the link of this owaspb dummy project rather than git-ting it on my machine?
First download as usual❤😅
That's Amazing method
Awesome Tutorial Loi!
There is no doubt that you will rise fast at the apex of your career *TECH SAFE GUARDIAN* . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of Impossible by becoming PRO at tackling Problems. You Rock!
Damn homie Loi, you made make IT shacking when you are around, thanks for you videos man, I'm a programmer and I 'm learning always great things to secure my apps, so thanks brother ! continue blowing our minds with your snacky methods of creating backdoors.
You should do a video on iPhone lockscreen bypass, and disabled iPhone removal. I've had found my old iPhone I lost years ago would be nice to open it! Thanks
There’s hundreds of programs that solves that easily (depending on iPhone model). Just find the latest version, otherwise Apple may have fixed the vulnerability.
Google is your friend. 😂
19:50 WAF (Web Application Firewall)
Make a tutorial on kali Linux
My linux looks so different
Thanks
If you hadn't written on the screen, I wouldn't have understood.
Thank you.
How to get membership, is there any channel link?
I just subscribed and liked the video, just cause I’m scared of being hacked
Love you Loi. your my best friend now bro.
please show how to make undetectable metasploitable payload
What would be the technic in real site, cause its a demo website and it has no ssl also.😊
I believe more time and more repeatedly processes.
I love your videos 🇵🇭🇵🇭🇵🇭❤️
My competitor has assigned him self as my developer and is merging and taking over my account and controlling my network messages and internet. What do I do for help ?
*Tracebackassets is an exceptional private investigator specializing in cryptocurrency theft cases. They have a team of highly skilled professionals who are dedicated to solving these types of crimes. With their expertise in blockchain technology, they can trace stolen funds and identify the culprits behind the theft.*
ur cooked lol
Thanks man
Exciting to watch your videos
loi please u must learn better to draw, my engllish as german guy is not the yellow from the egg and when i must endkrypto ur Artwork it is very hard to learn from u, but i find u are a very good teacher... so please better draw in german we say du hast ne sauklaue die kein schwein lesen kann... thanks fpr teaching me loi
Hi, can you tell what's the coding for withdraw money from website account to another account. Please
Can I use these website for learning?
Please sir, I can't run monitor mode and packet injection on my internal wireless card. I'm using Nexus 6p device. I've flashed the nexmon patch but doesn't work still.
Deangelocrack.
On lnstagram
She can help you
Hi hacker Loi I love your work I just found your channel and all your videos are awesome!
I'm using your videos and practiced myself for a security reasons of my new company.
I'm stuck whit a problem and I would really like you to help me guide me through this problem so I can continue learning.
Kind regards
I want learn hacking for hack gambling site, but so hard to me
iam also learing u r course
DB in the Open_basedir ? Who does that ?
Sir,that page doesn't follow the DES algorithm so we can bypass that what if it follows DES algorithm?
These techniques don't actually work in practice. While these tools are rudimentary to understanding how common vulnerabilities work to exploit them, applying these concepts in the field requires proficiency in DevOps and programming.
A proficiency in DevOps provides the necessary skills and knowledge required to understand these systems and their vulnerabilities at large. This includes how these servers are designed and maintained in production, and how the project/server files are structured and how they are accessible to different users. To gain proficiency in the skill, practice by building a simple chat client that utilizes a variety of protocols. Once you've done this, you need to host a Linux server on the cloud and deploy you client application to this server. Make sure to read documentation thoroughly to make sure you have everything running the way it should. Furthermore, you enable several protocols to your server for practice in hacking them, and securing them, then repeat.
Programming proficiency is a critical step and is trivial to your success in penetrating any system "out in the wild" (uncontrolled environment). Although scripting with pre build tools on Kali can be effective in theory, any antivirus out there can detect these attempts to infiltrate their system with these common techniques and thus requires you to get creative with your own code to evade detection. Think of it like this: if team read has built it, team blue has reverse engineered it; if team red has seen it, so has team blue; if team red has updated OffSec tools, likewise team blue has updated antivirus.
In conclusion, learn these prerequisites of engineering and become very familiar with these systems and how they are maintained, and you should be on your way to becoming a(n) "ethical" hacker.
Im trying to replicate your OS command injection - how do you get the commands to execute from the file name? How does the filename have shell access?
Big bro till date you didn't teach me to hack by your termux videos. I need yours faithfully help
I need you help sir..😢😢😢😢
I need some help also
𝐇𝐞𝐥𝐥𝐨
𝐀𝐚𝐩 𝐦𝐮𝐣𝐡𝐞 𝐛𝐚𝐭𝐚𝐨 𝐤𝐲𝐚 𝐡𝐞𝐥𝐩 𝐤𝐚𝐫𝐧𝐢
trop bien mais trop vite... 😕 difficile à suivre le texte. dommage.
Hi Shal we discuss about the defimine usdt jingchen now
We need this
I have a question please 🙏 should my ip addres be the same as in the burp proxy settings?
Title should be "How hackers hack any website in 23 minutes ??"
BTW informative Video man !!!!!!
A lot of this is confusing. What terminal are you using? Is this terminal application an app, or can be? What Kali Linux app do you recommend downloading for Androids and Windows desktops, & laptops? Have a basics getting started playlist? Have a legend guide explaining what all these symbols mean and do, such as < or - or " or etc. ?
it is default terminal in kali linux. all apps in this video already satisfied in kali linux.
Great sir
Awesome 🤩🤩😍
How to recover Facebook id recover, and change password , hacker was set up a bot in id
Awesome work, *TECH SAFE GUARDIAN on the WEB* ! It's so satisfying to see you putting in the effort to stop those shady characters. Protecting the public, especially the elderly, from those despicable con artists is crucial. You truly deserve recognition and appreciation for keeping us secure. I'm thrilled for you because you're my sibling. Your accomplishments definitely make you a strong contender for the Nobel Peace Prize. Keep up the outstanding performance!!!!!
Awesome my mentor
what is NA doing here
@@mundi4great who are you???
Notifications = All
Question from a total newbie:
Doesn’t the AIO security (WP plug-in) block these kind of attempts immediately? My thoughts are that this maybe was easier some years ago when many websites didn’t update their security automatically.
Today a website in shared hosting often gets blocked automatically by the hosting company if the sites refusing to update WP theme, plugins, php and so on.
Someone with skills that mind to inform this lost newbie soul?! 😂
wordpress is shit all the wafs fucking suck
I'll be honest, I'll say am still new the hacking world....and within that time, I would like to think that. Pretty much have a really good how hacking works.😅🤔 Like before I watched this video, had few ideas in mind. I just wasn't sure if my theory is possible/ if I had the right idea or not. This video just basically confirmed that I was right. I agree with you that...with great power, cames great responsibility.😎 Just because I have (new ideas) I can create something new with this information.😁
I'm probably going to get flagged for saying that, but it's too late now.😅😑
how to hack api's plz
bros a network chuck rip off and i respect that
loi>networkchuck
if you forget your password you know where to find it
Great work!
Great Zambia
I love u bro ❤
The classic payed bot comment. 😂
Where should the such web page be found?
What screen recorder do you use please
"Hacking is illegal. If you get caught hacking you'll never get to see Hacker Lois videos again." Then teach us how to not get tracked while hacking, mr Hacker Loi
Sir we hack any website database and inseart data How it is posibal, sir you should make a video for this topic. I request to you please make a video on this topic, How to hack a website database and inseart data.
How to bypass Snapchat suspicious login code thing without code?
How can i learn ethical hacking for free??
Dude...Hacker Loi....YOU are Super Cool. Just sayin.
Good morning to you sir. Please my browser isn’t working in Kali Linus. Kindly help me
Hey, i have froxy poxy and burp suite, but how do i connect froxy to it?
Awesome 😮
i need your help immediately if you can plz !!
*TECH SAFE GUARDIAN* willingness to assist and offer valuable advice speaks volumes about your character and the supportive environment you cultivate. I’m incredibly grateful to have someone like you.
im not even a newbie im just watching to recall my memory XD
Awesome
Should you use any VPN so that they do not come to your home to discuss your level of intelligence?
no hit it home wifi and deface the site with ur addy like
I'm really confused
, because I see that beef cookie everywhere as well, and I don't know how to get rid of. Is there anyone who has sorted it out?
Are you talking about the cookie puller BeEf?
6:32 that BEEFHOOK:xxxxx
cookie I mean
only if Im on incognito ,its not there
@loi i have been reading n watching many hacking videos and none of them are useful
they are bunch of view eater.
In my case i have a normal target just to find about hostname n target machine ip.
i had search there website and i got every details like ip dns email of the website
in every video they just give little bit of information.
They dont tell how to find about target machine ip n hostname from website
Dwi mkad wla sir thwa
Ce mec c'est un géni!!!!! 😭😭😭😭