Now many of the interviewer's after watching this, will ask this as question. And happily interviewee will answer the same..... Life goes on and hacks do work.❤️
Little correction in User.find({ ...logindetails }, function(err, users) ) explanation you are not passing values into the function(err, users), it a callback function that will return data after the database call is complete, in users named variable if successful(JavaScript is single threaded and its a async call that's why callback function is there), Find() query returns an array so that's why in if block its checking the array length.
Hi, would you be kind enough to let me know which Microphone you use for recordings as your voice is crystal clear and I would like to get one for my WFH meetings.
Now many of the interviewer's after watching this, will ask this as question. And happily interviewee will answer the same..... Life goes on and hacks do work.❤️
It's better to use $gte instead of $gt operator because even some database contains 'spaces' as passwords and also $gte operator gives specifications.
She is good but underrated.
It is very good topics, there are many benefits for those who are really starting their career in cyber security.
Great Farrah I have been following in insta great to see you are now active in yt as well
Great content, great explanation. Please make videos more frequent. We always wait to see new contents.
Great explanation 👌
Thanks for awesome tutorial. Ma'am you should keep consistency
I will try my best!
@@FarahHawa Thanks again.
Little correction in User.find({ ...logindetails }, function(err, users) ) explanation you are not passing values into the function(err, users), it a callback function that will return data after the database call is complete, in users named variable if successful(JavaScript is single threaded and its a async call that's why callback function is there), Find() query returns an array so that's why in if block its checking the array length.
Good content sister ❤😍
Great content didi👍👍
Thank you ma'am ❤️
Cool Voice 💕🌼🌿
Beautiful explaination❣️
Thanku ma'am ❤️👍
Loved it ❤️🥳🤩
Very helpful mam 😊
Getting so many errors while installing goof vulnerable app. could you please do a video about how to install and configure goof
Hi, would you be kind enough to let me know which Microphone you use for recordings as your voice is crystal clear and I would like to get one for my WFH meetings.
Was using the boya M1 for this video
Aap inspiration ho do🤗
No SQL injection will work on mongo db or other dbs ?
Sis waiting for prototype pollution pls❤️❤️❤️❤️
Di kaha se start kare Cyber security me aur kaun sa first language sikhe
Mam, can u suggest a good laptop for both coding and pubg+ cod+ cyberpunk+ gta 5,plz plz plz plz
Great video, allways hack!!
Either I'm getting ridiculously old or pentesters are getting ridiculously young.
Can someone tell me how to run this goof application
I think if you chose some simple words instead of technical terms it will be easier to understand for us
That’s what I try to do as much as possible. But I’ll look into improving it for future videos!
Here u know the source code.So u find attack vector but what about in real-time application.how I get this source code of real time Web app
we don't need to analyze the code to find the bug. I showed it in this video so we can understand why we used a certain payload.
@@FarahHawa in real-time app, whether we need to try with different payload using intruder
i think this method will not work in hashed passwords, do they?
It still works
💘💘💘💘💘
8:45 minutes and 67 cuts 🤣
Could u please tell about that extention
Content Type Converter
Plzz reply
Why are you so cute