Now many of the interviewer's after watching this, will ask this as question. And happily interviewee will answer the same..... Life goes on and hacks do work.❤️
Little correction in User.find({ ...logindetails }, function(err, users) ) explanation you are not passing values into the function(err, users), it a callback function that will return data after the database call is complete, in users named variable if successful(JavaScript is single threaded and its a async call that's why callback function is there), Find() query returns an array so that's why in if block its checking the array length.
Hi, would you be kind enough to let me know which Microphone you use for recordings as your voice is crystal clear and I would like to get one for my WFH meetings.
It's better to use $gte instead of $gt operator because even some database contains 'spaces' as passwords and also $gte operator gives specifications.
Now many of the interviewer's after watching this, will ask this as question. And happily interviewee will answer the same..... Life goes on and hacks do work.❤️
She is good but underrated.
It is very good topics, there are many benefits for those who are really starting their career in cyber security.
Great content, great explanation. Please make videos more frequent. We always wait to see new contents.
Great Farrah I have been following in insta great to see you are now active in yt as well
Little correction in User.find({ ...logindetails }, function(err, users) ) explanation you are not passing values into the function(err, users), it a callback function that will return data after the database call is complete, in users named variable if successful(JavaScript is single threaded and its a async call that's why callback function is there), Find() query returns an array so that's why in if block its checking the array length.
Thanks for awesome tutorial. Ma'am you should keep consistency
I will try my best!
@@FarahHawa Thanks again.
No SQL injection will work on mongo db or other dbs ?
Great explanation 👌
Good content sister ❤😍
Hi, would you be kind enough to let me know which Microphone you use for recordings as your voice is crystal clear and I would like to get one for my WFH meetings.
Was using the boya M1 for this video
Great content didi👍👍
Getting so many errors while installing goof vulnerable app. could you please do a video about how to install and configure goof
Beautiful explaination❣️
Can someone tell me how to run this goof application
Di kaha se start kare Cyber security me aur kaun sa first language sikhe
Loved it ❤️🥳🤩
Cool Voice 💕🌼🌿
i think this method will not work in hashed passwords, do they?
It still works
Mam, can u suggest a good laptop for both coding and pubg+ cod+ cyberpunk+ gta 5,plz plz plz plz
Very helpful mam 😊
Sis waiting for prototype pollution pls❤️❤️❤️❤️
Aap inspiration ho do🤗
Thank you ma'am ❤️
Here u know the source code.So u find attack vector but what about in real-time application.how I get this source code of real time Web app
we don't need to analyze the code to find the bug. I showed it in this video so we can understand why we used a certain payload.
@@FarahHawa in real-time app, whether we need to try with different payload using intruder
Thanku ma'am ❤️👍
Either I'm getting ridiculously old or pentesters are getting ridiculously young.
Great video, allways hack!!
I think if you chose some simple words instead of technical terms it will be easier to understand for us
That’s what I try to do as much as possible. But I’ll look into improving it for future videos!
Plzz reply
Could u please tell about that extention
Content Type Converter
8:45 minutes and 67 cuts 🤣
💘💘💘💘💘
Why are you so cute