how hackers hack any websites in minutes?!

Поділитися
Вставка
  • Опубліковано 24 лис 2024

КОМЕНТАРІ • 349

  • @megatronskneecap
    @megatronskneecap Рік тому +113

    Hacker loi u sexy. EHEM anyways. As a web developer actively trying to create a social network on my own and release it to the public, it would be an understatement to say I'm frightened. But as long as Loi keeps producing these videos I can patch most of this stuff.

    • @Dahlah.FightMe
      @Dahlah.FightMe Рік тому +1

      .-.

    • @Namrec_955
      @Namrec_955 Рік тому +4

      I think thats the purpose anyways, not like teaching black hackers...

    • @hpi_anc
      @hpi_anc Рік тому

      Hacking is illegal but u r ligal 😅😅 so I learnt with u ❤️😎

    • @localhost69
      @localhost69 Рік тому

      i woukd edit that comment if i were u

    • @gabrielkenz
      @gabrielkenz Рік тому +2

      most of these vulnerabilities are already patched by default if you use up to date frameworks.

  • @rodrigodifederico
    @rodrigodifederico Рік тому +49

    As a developer for more than 25 years now, i always though that preventing these kind of "attacks" was basic web development. I never thought that in 2023, devs would still leave so many doors opened. I know it's just an example and dummy website, but if you used it like this, it's because you know devs do it LoL.

    • @horrorworld8251
      @horrorworld8251 Рік тому

      Sir can u help me please a little help

    • @luisfernando5998
      @luisfernando5998 Рік тому

      @@horrorworld8251u want me to hack Uranus ?

    • @andywest6062
      @andywest6062 Рік тому

      You certainly would be surprised. Doing a google search for something like "&id=" would list any websites who haven't had their urls rewritten. 5 minutes later and I can have database access for a super user if they've also not encrypted their passwords, which is the next blunder.

    • @MrRaja
      @MrRaja Рік тому

      @@horrorworld8251 Trust me when i say... Nobody can help you... but yourself.

    • @genjioto
      @genjioto Рік тому +1

      Welp, when companies are laying off more experienced developers in favor for young and cheap ones, this is what you get. 😅 and when there are no layoffs, developers are only interested in creating the minimum viable product and then moving on to the next job. Ofcourse this is the structure you end up with.

  • @willpape1625
    @willpape1625 Рік тому +26

    Excellent video. A 40-hour course on this topic and technique would be a big hit!

  • @risktakerrecordbreaker
    @risktakerrecordbreaker Рік тому +19

    The way of explaining things is great. Its like a friend is explaining to me. Thankyou for giving us content

    • @amongusboi2032
      @amongusboi2032 Рік тому

      Indeed, remote access to the victim computer is like holding remote searching through TV channels. Both are remotes.

  • @Ethical_Hacker216
    @Ethical_Hacker216 Рік тому +6

    You're the teacher, the rest is zero ❤️

  • @newyorkheart
    @newyorkheart Рік тому +5

    This sort of thing is super interesting. Definitely going to be coming back to this channel when I have time.

  • @StudioThirtyEight
    @StudioThirtyEight Місяць тому

    I don't even know anything about hacking, I just like listening to this ninja talk. I like how he says 'double-dash'. Just me?

  • @devilbawa0316
    @devilbawa0316 3 місяці тому

    CRYPTO SCAM VICTIM ? As a Retired combat Marine I want to tell you that as what you are doing is just as important as any warrior on the battlefield. You are waging warfare against these criminals and terrorists on the digital battlefield. You are defending and protecting the most vulnerable of our society against these predators. Keep up the good work *TECH SAFE GUARDIAN on the WEB*

  • @winstonpamela4161
    @winstonpamela4161 Рік тому +12

    Leaving a relationship you’re not happy in is much easier than emotionally damaging someone. But selfish people don’t get that

    • @KasraKlassics
      @KasraKlassics Рік тому +7

      Wrong video, ma’am

    • @KasraKlassics
      @KasraKlassics Рік тому +2

      That said, leaving a relationship, specially if it’s toxic, is probably the most difficult of all!
      Selfish people don’t have to put effort in hurting others. They naturally just do.

  • @ngs132
    @ngs132 Рік тому +7

    Very good video, but i hope that you remove the music in the backround in future videos because its very distracting and annoying. Thanks

  • @ferasm96
    @ferasm96 Рік тому +9

    Nice tutorial, but I would have done wget command to a php shell and done everything through it, much easier though..

    • @xt355
      @xt355 Рік тому +1

      explain please in detail if possible

  • @jefflucas_life
    @jefflucas_life 11 місяців тому +1

    13:43 Great example, thumbs up, subbed!!

  • @IqbalHatteea
    @IqbalHatteea Рік тому +1

    Hey Mr Loi. I really need your help. It’s very important for me. Thanking you in advance

  • @SixthGod
    @SixthGod Рік тому +5

    Great video. I will like to know how you trace someone via IP. Educational purpose

  • @ebohgoodness1302
    @ebohgoodness1302 Рік тому +3

    you're the best hacker loi I feel like you dont get much credit for your work I wish I could be home schooled like you

  • @craftcrew86.
    @craftcrew86. 3 місяці тому

    The way you approached this project added so much to it. It’s great to see how your unique perspective contributed to the outcome. The role you play on your job *Adrian hacks online on the WEB* is crucial. I really appreciate the constructive feedback you give to me regularly

  • @poupeuu
    @poupeuu Рік тому +96

    Scrolling trough these comments makes my brain rot

    • @Kirt44
      @Kirt44 Рік тому +2

      Mine too

    • @amongusboi2032
      @amongusboi2032 Рік тому +2

      You'll be fine, besides you don't have to read such brain-washing comment section.

    • @abeliscool7950
      @abeliscool7950 Рік тому

      Why lol

    • @moonselanac357
      @moonselanac357 Рік тому

      I'll take your word for it

    • @mileshall5795
      @mileshall5795 10 місяців тому

      ​@@amongusboi2032brainwashing?....Now I admit it's all connected, & 1/2 of these were not even submitted by a human being....but you are concerned about the comments section?!?😅😅 I would think that it was a given that brainwashing was the overall object of the entire platform....but that's just me

  • @Z10Nmap
    @Z10Nmap Рік тому +2

    That database picture looks juicy 😲😅

  • @brettnathan9971
    @brettnathan9971 Рік тому +54

    Bro someone is blackmailing my sister i
    want to hack his acc or just want to delete
    his acc nedd ur help plz help

  • @technicalcraftsman4021
    @technicalcraftsman4021 Рік тому

    Hacker kLi you are genuis. I am Linux administrator and your tutorials are fucking awesome. Please keep making these types of videos. Thanks to youtube algorithm which suggests your channel.

  • @Billy_1882
    @Billy_1882 11 місяців тому

    Great video! I just started your Udemy course and it's full of great information! Thank you for all you do!

  • @2684dennis
    @2684dennis 10 місяців тому

    Would you give online one on one lessons, i would love to learn from you via a stream room where i can share screan and learn ethical hacking.

  • @eshakumari-tl9dn
    @eshakumari-tl9dn 3 місяці тому

    Everyone should have a dedicated person like you *Adrian hacks online on the WEB* . People dream of hiring such a talented expert like you. Keep up the hard work.

  • @tebeckcollins9720
    @tebeckcollins9720 Рік тому +4

    You didn’t give recommendations/solutions on how to protect against these kinds of attacks

    • @ACasualCustomer
      @ACasualCustomer Рік тому

      I believe changing your website URLs to random strings of letter and numbers might help.

  • @MdRihan-ei4yz
    @MdRihan-ei4yz 3 місяці тому

    The efficiency of this *TECH SAFE GUARDIAN* is next level. To juggle walk throughs of various angles on the topic delivered to-camera, different content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense access like this so digestible is really something. Awesome work james!!

  • @DASLEVINFRMDAO
    @DASLEVINFRMDAO 10 місяців тому

    Ma G . Best teacher 😂❤❤

  • @f_gaming_killer_f
    @f_gaming_killer_f Рік тому +1

    Loi Liang Yang what is the name of the app you used for commanding injections

  • @zrizzy6958
    @zrizzy6958 Рік тому +2

    Liked the video, but how can you change the html?

  • @anonymous4298
    @anonymous4298 Рік тому +3

    15:15 Why cd into db then run ls? Wouldn’t it be easier to just run “ls db”?

  • @Skips456
    @Skips456 Рік тому +6

    bro is making us next him 💀💀

  • @geeksified
    @geeksified Рік тому +2

    Yow thanks. Can I have the link of this owaspb dummy project rather than git-ting it on my machine?

  • @toxic_me904
    @toxic_me904 Рік тому +4

    First download as usual❤😅

  • @iamagastya0
    @iamagastya0 Рік тому

    That's Amazing method

  • @juliusrowe9374
    @juliusrowe9374 Рік тому +3

    Awesome Tutorial Loi!

  • @AtharvAware-w8f
    @AtharvAware-w8f 3 місяці тому

    There is no doubt that you will rise fast at the apex of your career *TECH SAFE GUARDIAN* . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of Impossible by becoming PRO at tackling Problems. You Rock!

  • @ismail-devland
    @ismail-devland Рік тому

    Damn homie Loi, you made make IT shacking when you are around, thanks for you videos man, I'm a programmer and I 'm learning always great things to secure my apps, so thanks brother ! continue blowing our minds with your snacky methods of creating backdoors.

  • @johhnybrah3726
    @johhnybrah3726 Рік тому +4

    You should do a video on iPhone lockscreen bypass, and disabled iPhone removal. I've had found my old iPhone I lost years ago would be nice to open it! Thanks

    • @stefanjohansson2373
      @stefanjohansson2373 Рік тому

      There’s hundreds of programs that solves that easily (depending on iPhone model). Just find the latest version, otherwise Apple may have fixed the vulnerability.
      Google is your friend. 😂

  • @anonymous4298
    @anonymous4298 Рік тому

    19:50 WAF (Web Application Firewall)

  • @assasingaming3406
    @assasingaming3406 Рік тому +3

    Make a tutorial on kali Linux

    • @NekoLoliChan
      @NekoLoliChan 8 місяців тому

      My linux looks so different

  • @pppkenken6610
    @pppkenken6610 Рік тому

    Thanks

  • @Patinhow100
    @Patinhow100 Рік тому

    If you hadn't written on the screen, I wouldn't have understood.
    Thank you.

  • @mohammadaminhabib5269
    @mohammadaminhabib5269 Рік тому

    How to get membership, is there any channel link?

  • @Kapalatus
    @Kapalatus Рік тому +2

    I just subscribed and liked the video, just cause I’m scared of being hacked

  • @IIZPII
    @IIZPII Рік тому

    Love you Loi. your my best friend now bro.

  • @BlueSpirit_YT
    @BlueSpirit_YT Рік тому

    please show how to make undetectable metasploitable payload

  • @ishanahmed429
    @ishanahmed429 Рік тому +2

    What would be the technic in real site, cause its a demo website and it has no ssl also.😊

    • @amongusboi2032
      @amongusboi2032 Рік тому

      I believe more time and more repeatedly processes.

  • @rrrrq630
    @rrrrq630 Рік тому +2

    I love your videos 🇵🇭🇵🇭🇵🇭❤️

  • @victorpatrickgammon
    @victorpatrickgammon Рік тому

    My competitor has assigned him self as my developer and is merging and taking over my account and controlling my network messages and internet. What do I do for help ?

    • @elizabethwindley166
      @elizabethwindley166 Рік тому +1

      *Tracebackassets is an exceptional private investigator specializing in cryptocurrency theft cases. They have a team of highly skilled professionals who are dedicated to solving these types of crimes. With their expertise in blockchain technology, they can trace stolen funds and identify the culprits behind the theft.*

    • @John-zt6lc
      @John-zt6lc 5 місяців тому

      ur cooked lol

  • @nirbhaymishra4222
    @nirbhaymishra4222 Рік тому +2

    Thanks man
    Exciting to watch your videos

  • @DerMannmitdenvielenlegenden

    loi please u must learn better to draw, my engllish as german guy is not the yellow from the egg and when i must endkrypto ur Artwork it is very hard to learn from u, but i find u are a very good teacher... so please better draw in german we say du hast ne sauklaue die kein schwein lesen kann... thanks fpr teaching me loi

  • @adrianayuzaidi5216
    @adrianayuzaidi5216 Рік тому

    Hi, can you tell what's the coding for withdraw money from website account to another account. Please

  • @md.sohanurrahmanmirdha3911
    @md.sohanurrahmanmirdha3911 Рік тому

    Can I use these website for learning?

  • @RoyceAchilike
    @RoyceAchilike Рік тому +1

    Please sir, I can't run monitor mode and packet injection on my internal wireless card. I'm using Nexus 6p device. I've flashed the nexmon patch but doesn't work still.

  • @networkcandy12
    @networkcandy12 Рік тому

    Hi hacker Loi I love your work I just found your channel and all your videos are awesome!
    I'm using your videos and practiced myself for a security reasons of my new company.
    I'm stuck whit a problem and I would really like you to help me guide me through this problem so I can continue learning.
    Kind regards

  • @djremixlampung
    @djremixlampung Рік тому +1

    I want learn hacking for hack gambling site, but so hard to me

  • @gamer-xf1hf
    @gamer-xf1hf Рік тому

    iam also learing u r course

  • @cydream
    @cydream Рік тому +1

    DB in the Open_basedir ? Who does that ?

  • @manichand5556
    @manichand5556 Рік тому +2

    Sir,that page doesn't follow the DES algorithm so we can bypass that what if it follows DES algorithm?

    • @architech5940
      @architech5940 9 місяців тому +1

      These techniques don't actually work in practice. While these tools are rudimentary to understanding how common vulnerabilities work to exploit them, applying these concepts in the field requires proficiency in DevOps and programming.
      A proficiency in DevOps provides the necessary skills and knowledge required to understand these systems and their vulnerabilities at large. This includes how these servers are designed and maintained in production, and how the project/server files are structured and how they are accessible to different users. To gain proficiency in the skill, practice by building a simple chat client that utilizes a variety of protocols. Once you've done this, you need to host a Linux server on the cloud and deploy you client application to this server. Make sure to read documentation thoroughly to make sure you have everything running the way it should. Furthermore, you enable several protocols to your server for practice in hacking them, and securing them, then repeat.
      Programming proficiency is a critical step and is trivial to your success in penetrating any system "out in the wild" (uncontrolled environment). Although scripting with pre build tools on Kali can be effective in theory, any antivirus out there can detect these attempts to infiltrate their system with these common techniques and thus requires you to get creative with your own code to evade detection. Think of it like this: if team read has built it, team blue has reverse engineered it; if team red has seen it, so has team blue; if team red has updated OffSec tools, likewise team blue has updated antivirus.
      In conclusion, learn these prerequisites of engineering and become very familiar with these systems and how they are maintained, and you should be on your way to becoming a(n) "ethical" hacker.

  • @vialobo
    @vialobo Рік тому +1

    Im trying to replicate your OS command injection - how do you get the commands to execute from the file name? How does the filename have shell access?

  • @michaelreang2994
    @michaelreang2994 Рік тому

    Big bro till date you didn't teach me to hack by your termux videos. I need yours faithfully help

  • @sneha_234
    @sneha_234 Рік тому +3

    I need you help sir..😢😢😢😢

    • @tasharogers9141
      @tasharogers9141 Рік тому

      I need some help also

    • @abhigameryt4859
      @abhigameryt4859 Рік тому

      𝐇𝐞𝐥𝐥𝐨

    • @abhigameryt4859
      @abhigameryt4859 Рік тому

      𝐀𝐚𝐩 𝐦𝐮𝐣𝐡𝐞 𝐛𝐚𝐭𝐚𝐨 𝐤𝐲𝐚 𝐡𝐞𝐥𝐩 𝐤𝐚𝐫𝐧𝐢

  • @marat477
    @marat477 Рік тому

    trop bien mais trop vite... 😕 difficile à suivre le texte. dommage.

  • @defimine
    @defimine Рік тому

    Hi Shal we discuss about the defimine usdt jingchen now

  • @infinitybrutal
    @infinitybrutal Рік тому +1

    We need this

  • @Ethical_Hacker216
    @Ethical_Hacker216 Рік тому

    I have a question please 🙏 should my ip addres be the same as in the burp proxy settings?

  • @ajaykumar1
    @ajaykumar1 Рік тому +1

    Title should be "How hackers hack any website in 23 minutes ??"
    BTW informative Video man !!!!!!

  • @JohnDoe-l2m
    @JohnDoe-l2m Рік тому

    A lot of this is confusing. What terminal are you using? Is this terminal application an app, or can be? What Kali Linux app do you recommend downloading for Androids and Windows desktops, & laptops? Have a basics getting started playlist? Have a legend guide explaining what all these symbols mean and do, such as < or - or " or etc. ?

    • @orcundinlerr
      @orcundinlerr 11 місяців тому +1

      it is default terminal in kali linux. all apps in this video already satisfied in kali linux.

  • @asifjaved9844
    @asifjaved9844 Рік тому

    Great sir

  • @Ahmed95406
    @Ahmed95406 Рік тому

    Awesome 🤩🤩😍

  • @akhildubey8925
    @akhildubey8925 Рік тому +1

    How to recover Facebook id recover, and change password , hacker was set up a bot in id

  • @RamuKumar-fr2vy
    @RamuKumar-fr2vy 3 місяці тому

    Awesome work, *TECH SAFE GUARDIAN on the WEB* ! It's so satisfying to see you putting in the effort to stop those shady characters. Protecting the public, especially the elderly, from those despicable con artists is crucial. You truly deserve recognition and appreciation for keeping us secure. I'm thrilled for you because you're my sibling. Your accomplishments definitely make you a strong contender for the Nobel Peace Prize. Keep up the outstanding performance!!!!!

  • @christopherishaku5585
    @christopherishaku5585 Рік тому +1

    Awesome my mentor

  • @ateci0
    @ateci0 Рік тому

    Notifications = All

  • @stefanjohansson2373
    @stefanjohansson2373 Рік тому +1

    Question from a total newbie:
    Doesn’t the AIO security (WP plug-in) block these kind of attempts immediately? My thoughts are that this maybe was easier some years ago when many websites didn’t update their security automatically.
    Today a website in shared hosting often gets blocked automatically by the hosting company if the sites refusing to update WP theme, plugins, php and so on.
    Someone with skills that mind to inform this lost newbie soul?! 😂

    • @John-zt6lc
      @John-zt6lc 5 місяців тому

      wordpress is shit all the wafs fucking suck

  • @wildstorm74
    @wildstorm74 Рік тому +2

    I'll be honest, I'll say am still new the hacking world....and within that time, I would like to think that. Pretty much have a really good how hacking works.😅🤔 Like before I watched this video, had few ideas in mind. I just wasn't sure if my theory is possible/ if I had the right idea or not. This video just basically confirmed that I was right. I agree with you that...with great power, cames great responsibility.😎 Just because I have (new ideas) I can create something new with this information.😁

    • @wildstorm74
      @wildstorm74 Рік тому

      I'm probably going to get flagged for saying that, but it's too late now.😅😑

  • @yungx811
    @yungx811 Рік тому +1

    how to hack api's plz

  • @Sodaduhking
    @Sodaduhking Рік тому

    bros a network chuck rip off and i respect that

    • @John-zt6lc
      @John-zt6lc 5 місяців тому

      loi>networkchuck

  • @hakmat1769
    @hakmat1769 Рік тому

    if you forget your password you know where to find it

  • @ashu9334
    @ashu9334 Рік тому +2

    Great work!

  • @geoffreymushipi4458
    @geoffreymushipi4458 Рік тому

    Great Zambia

  • @L1Q8
    @L1Q8 Рік тому +2

    I love u bro ❤

  • @nasim993
    @nasim993 3 місяці тому

    Where should the such web page be found?

  • @FranklinFinds
    @FranklinFinds Рік тому

    What screen recorder do you use please

  • @lordofthegremlins
    @lordofthegremlins 8 місяців тому

    "Hacking is illegal. If you get caught hacking you'll never get to see Hacker Lois videos again." Then teach us how to not get tracked while hacking, mr Hacker Loi

  • @adnangraphicsjobsgroup455
    @adnangraphicsjobsgroup455 Рік тому

    Sir we hack any website database and inseart data How it is posibal, sir you should make a video for this topic. I request to you please make a video on this topic, How to hack a website database and inseart data.

  • @funstop6669
    @funstop6669 Рік тому +1

    How to bypass Snapchat suspicious login code thing without code?

  • @tefomodisagae4915
    @tefomodisagae4915 Рік тому +2

    How can i learn ethical hacking for free??

  • @mileshall5795
    @mileshall5795 10 місяців тому

    Dude...Hacker Loi....YOU are Super Cool. Just sayin.

  • @Schultz-wc6xy
    @Schultz-wc6xy Рік тому

    Good morning to you sir. Please my browser isn’t working in Kali Linus. Kindly help me

  • @alphazozo2260
    @alphazozo2260 Рік тому

    Hey, i have froxy poxy and burp suite, but how do i connect froxy to it?

  • @Grinwa
    @Grinwa Рік тому

    Awesome 😮

  • @YassenYasser-e1e
    @YassenYasser-e1e Рік тому

    i need your help immediately if you can plz !!

  • @shanmugamV-wp4lg
    @shanmugamV-wp4lg 3 місяці тому

    *TECH SAFE GUARDIAN* willingness to assist and offer valuable advice speaks volumes about your character and the supportive environment you cultivate. I’m incredibly grateful to have someone like you.

  • @NekuroMC
    @NekuroMC Рік тому

    im not even a newbie im just watching to recall my memory XD

  • @mdashifuzzamanshawon
    @mdashifuzzamanshawon Рік тому

    Awesome

  • @aothman979
    @aothman979 Рік тому

    Should you use any VPN so that they do not come to your home to discuss your level of intelligence?

    • @John-zt6lc
      @John-zt6lc 5 місяців тому

      no hit it home wifi and deface the site with ur addy like

  • @demotedc0der
    @demotedc0der Рік тому +1

    I'm really confused
    , because I see that beef cookie everywhere as well, and I don't know how to get rid of. Is there anyone who has sorted it out?

  • @Mortal_To_Immortal
    @Mortal_To_Immortal Рік тому +1

    @loi i have been reading n watching many hacking videos and none of them are useful
    they are bunch of view eater.
    In my case i have a normal target just to find about hostname n target machine ip.
    i had search there website and i got every details like ip dns email of the website
    in every video they just give little bit of information.
    They dont tell how to find about target machine ip n hostname from website

  • @Mikodo_games
    @Mikodo_games Рік тому +1

    Dwi mkad wla sir thwa

  • @BereteXY
    @BereteXY Рік тому +1

    Ce mec c'est un géni!!!!! 😭😭😭😭