How Hackers Bypass Two-Factor Authentication (2FA)?!

Поділитися
Вставка
  • Опубліковано 23 лют 2024
  • // Membership //
    Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
    // Courses //
    Full Ethical Hacking Course: www.udemy.com/course/full-web...
    Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
    Full Mobile Hacking Course: www.udemy.com/course/full-mob...
    // Books //
    Kali Linux Hacking: amzn.to/3IUXaJv
    Linux Basics for Hackers: amzn.to/3EzRPV6
    The Ultimate Kali Linux Book: amzn.to/3m7cutD
    // Social Links //
    Website: www.loiliangyang.com
    Facebook: / loiliangyang
    Instagram: / loiliangyang
    LinkedIn: / loiliangyang
    // Disclaimer //
    Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
  • Наука та технологія

КОМЕНТАРІ • 248

  • @Greyyyjohnson
    @Greyyyjohnson 2 місяці тому +386

    What side are you on as Metaspyclub divides the wealthy from the poor?

    • @NariahHart
      @NariahHart 2 місяці тому

      i just got my twitter back thanks to metaspyclub

    • @RamonaEvans-jx3pt
      @RamonaEvans-jx3pt 2 місяці тому

      if you need assistance just look up metaspyclub

    • @JushawnHarper
      @JushawnHarper 2 місяці тому

      i got back my Gmail thanks to metaspyclub

    • @yourbuddymrcoat5218
      @yourbuddymrcoat5218 2 місяці тому +1

      Wait, what is happening?

  • @VictorMartins239
    @VictorMartins239 2 місяці тому +123

    so at the end it was actually a sql injection

    • @hellamean
      @hellamean 2 місяці тому +1

      Exactly

    • @patwhocares7009
      @patwhocares7009 2 місяці тому +6

      Which is kind of an amateur move.

    • @BigTurtleMane
      @BigTurtleMane 2 місяці тому

      @@patwhocares7009”amateur” but effective, like keyloggers

    • @abdulrahmanfaisal5969
      @abdulrahmanfaisal5969 2 місяці тому

      @@patwhocares7009 exaclty cuz his channel is sh*t it just teaches some nonsense stuff for beginners additionally it won’t benefit anyone

    • @amanokinji6220
      @amanokinji6220 2 місяці тому +1

      Yeah, if we can execute this level of injection then, the company is a lost cause 😂, its always thing with WAF

  • @nuhuali8602
    @nuhuali8602 2 місяці тому +33

    This is a great example of how a vulnerable website can be compromised even when security controls are implemented. Interpreting query based information is a prominent skill, especially in a database that store large sets of data. 👏

    • @mattia222
      @mattia222 2 місяці тому +5

      security controls where not implemented. Sqlinjection is a very known issue.

    • @iamwitchergeraltofrivia9670
      @iamwitchergeraltofrivia9670 2 місяці тому

      I hate Security Control ob websites blocking Security Control for more malware Protection

  • @rabbitinnh
    @rabbitinnh 2 місяці тому +46

    It would be very unusual these days to find a front end application directly executing SQL against the back end database without going through some kind of API that abstracts and limits. This might have worked 15 years ago . .
    Essentially this has little to do with 2FA authentication and everything to do with hacking into a database.

    • @ysfchn
      @ysfchn 2 місяці тому +10

      100% agree, it is misleading.

    • @hardscope7744
      @hardscope7744 2 місяці тому +1

      Exactly what ever any of these hacker channels showing is all bullshit it might of worked 15 years ago like you said but not today and if this stuff was true do you really think UA-cam would let him post it I don’t think so 😂 not how this people can think that other people are so stupid is beyond me

    • @admiral44
      @admiral44 2 місяці тому +3

      I’m new into this field working on my certs and things and I appreciate y’all’s feedbacks on videos like these !

    • @kylelaker539
      @kylelaker539 2 місяці тому

      Some do have deprecated technology.😊

    • @portman8909
      @portman8909 2 місяці тому

      @@admiral44Enforce two step and put uBlock origin on every clients machine

  • @apristen
    @apristen 2 місяці тому +31

    nice video for children, man! really appreciated!
    but first, IRL on production u usually won't get so verbose 5xx errors (if devops/developers are not too crazy ofc to open bugs for end user :-))) so your SQLi will be "blind SQLi", LOL! ;-)
    second, more and more systems nowdays use "prepared statements" for SQL, reliably isolate query itself from query parameters, which gives backend's code immunity to SQLi, sad (for hackers) but true.

  • @et_matrix
    @et_matrix 2 місяці тому +43

    How can you store sensitive data without encrypted? As a backend developer, this doesn't make any sense.

    • @100gramsofdisapointment3
      @100gramsofdisapointment3 Місяць тому +1

      First, this is a lab and it is meant to be vulnerable. Secondly, most of the time you cannot encrypt the database itself, as this typically causes data corruption. You can store encrypted strings though and pass the encrypted strings with secure protocols (which is the safest bet). Even if it was a ciphered string, you can use tools like rainbow tables or john or even google-fu to decipher weak passwords like "password". The whole point of this is to show an example of a vulnerability. It is possible that an inexperienced developer, or recent update, broke encryption or stored the plain-text values. There are even more complicated versions of attacks but this is a good understanding of the basics of what a cyber security specialist looks for. Often times the puzzle is much more complicated and you really need to know your stuff in order to fully test something.

  • @HeyCossa
    @HeyCossa 2 місяці тому +3

    It’s funny to see how some people over think and over complicate what hackers are actually doing

  • @abhinavtiwari24
    @abhinavtiwari24 2 місяці тому

    Always ready for your video

  • @HackerCifish
    @HackerCifish 2 місяці тому +16

    Video Suggestions:
    1. Video About wireshark And wifite
    2. Video on how to hack any pdf's password with "rockyou" wordlist
    3. Make a video about anonymity with kali "whoami"
    4. A video on how to dual boot Kali Linux
    5. A video a on BYOB Botnet
    6. Full tutorial about Burpsuite

  • @spokentruth5909
    @spokentruth5909 2 місяці тому

    Are u just consistently pressing send in burp suite or a value then send?

  • @user-wn4dk1xc3c
    @user-wn4dk1xc3c 2 місяці тому

    very well from your good and nice techings Mr. loi can you tell we is there a way to download from payment websites without any paying thanks

  • @user-sp9kl4vq1j
    @user-sp9kl4vq1j 2 місяці тому

    Hi, Mr. Hackerloi! I am one of your UA-cam writings and I come to help your video and are very good. Congratulations to the stather. Have one of your video with the title: How Hackers Hack With An Image Trojan? I tested on my computer with your class cripto did not give enough to cost me a crypt base and how to set up

  • @randomando9953
    @randomando9953 2 місяці тому

    Look who raised him. I'm not surprised he's stuck like Chuck 😂😂

  • @davidlu1003
    @davidlu1003 2 місяці тому

    Very cool. Thanks.😁😁😁

  • @medslyhenuk1430
    @medslyhenuk1430 2 місяці тому

    thx for sharing information

  • @peterparker175
    @peterparker175 2 місяці тому +25

    if you have access to DB why you don't just turn off 2fa on the user account?

    • @Lamborghini35853
      @Lamborghini35853 2 місяці тому +7

      In my opinion, it will be suspicious for user, cause he previously has a protection and now It`s just disappear

    • @R3D_S3C
      @R3D_S3C 2 місяці тому +6

      Because the goal is to be as inconspicuous and effective as possible. Removing a gate entirely would raise red flags and call attention to the intrusion.

    • @hechter80
      @hechter80 2 місяці тому

      Because he can only read the database, not modify it.. I think

  • @pick_pick_pick
    @pick_pick_pick 2 місяці тому

    Amazing one 🥰

  • @Hello_-_-_-_
    @Hello_-_-_-_ 2 місяці тому

    Excelent police work and freedom you gave. That boy looks genuinely sorry and regrets what he did

  • @nieczerwony
    @nieczerwony 2 місяці тому +1

    This is probably outdated as most platforms now are using like separate app.
    For example in FB/Messenger if I have login credentials to lets say my brother FB account, but I am trying to log in from my PC/Phone, he will have to confirm on his device.
    So eve if he has to put some PIN/QR it will only be possible from his device.
    My bank is using similar approach. If I try to log in from any other device< i will get pop up on my phone where I have to confirm and allow new device to connect.

  • @AllINONE-yb2bo
    @AllINONE-yb2bo 2 місяці тому

    Can we see safe folders image after remote access by Kali Linux pls pls reply sir

  • @biggig8548
    @biggig8548 2 місяці тому

    Does this affect the use of hard tokens from a USB device and/or Yubikey etc? Are these stored in the same DB as well? I always thought hard tokens were the safer way to go instead of a google authenticator. Always enjoy and appreciate the videos!

    • @ysfchn
      @ysfchn 2 місяці тому

      It depends on what do you mean by "hard tokens". Specifically speaking of Yubikeys, it supports multiple type of authentication methods, so storing TOTP accounts on Yubikey is not that much different from Google Authenticator or any application authenticator, you would just have a physical presence of your 6-digit codes with Yubikey. But since Yubikey's storage is write-only, you can't see your secrets in plain form after it is imported to Yubikey, so you just see the 6-digit codes that the secret is corresponding to, which naturally makes Yubikey safer.
      However, Yubikeys also provides a hardware-based OTP (HOTP), so in that scenario, the server just "validates" the token generated by the Yubikey (instead of checking the same 6-digit value that the same secret stored in DB corresponding to, as in TOTP) which it makes the one of the most secure authentication methods as of today. Unfortunately, not all websites which supports 2FA allows registering a security key (or passwordless sign-in), they sometimes support TOTP as the only 2FA option as in the example website shown in this video.
      Also, even hardware authenticators are used, when the server's database is exposed once, it might be a risk still because since the database basically contains your user data, even if hacker couldn't sign in your account they can still access your leaked info without signing in, so I believe it doesn't even matter much anyway which 2FA method you choose in that scenario like this. Not saying that hardware authenticators doesn't change anything, they are obviously always more secure than other options!
      And since most-popular websites are protected enough to prevent easy attacks like SQL injection, getting full access to the database is very less likely in today (it probably would work in ancient websites like in 10+ years ago), so don't be confused by this video. Even with a time-based tokens (TOTP), you are usually still safer than having no 2FA, it is just not that super-safe when compared to hardware-based tokens.
      Hope this is helpful!

    • @valkaielod
      @valkaielod 2 місяці тому

      They work exactly the same way in case you use TOTP. You just store the shared key on the hardware instead of the phone.

  • @underndogx5346
    @underndogx5346 2 місяці тому +2

    Thank you so much Master

  • @pdebian
    @pdebian 2 місяці тому

    Por favor, adicione faixa de áudio nos seus vídeos. Vai ajudar muito a gente entender melhor.

  • @hellamean
    @hellamean 2 місяці тому +2

    Well, a replay attack can be used to login without password or 2FA as well.

  • @fairyroot1653
    @fairyroot1653 2 місяці тому +1

    I'm just interested in the py to extract the key from the QR code

  • @JimmyS2
    @JimmyS2 2 місяці тому

    I don't understand why the double )) in the union payload @5:54 ?

  • @jdbt7874
    @jdbt7874 2 місяці тому +1

    What if the valve is stored in the server's cache?

  • @gko_0844
    @gko_0844 2 місяці тому

    Dude how many camera you have?

  • @AliHussain-mt9vn
    @AliHussain-mt9vn 2 місяці тому

    Can make another video about android RAT because most of the old so they don't work

  • @ProfessorMoon6
    @ProfessorMoon6 2 місяці тому

    any promo code for your courses ? :)

  • @043-namanvora2
    @043-namanvora2 2 місяці тому

    thank you sensai

  • @hinoTheCatto
    @hinoTheCatto 2 місяці тому

    Learnings from this video:
    1. How to bypass 2fa
    2. hacker loi is very handsome

  • @MrDoesntUpload001
    @MrDoesntUpload001 2 місяці тому

    Thank you Mr. Hacker Loi.

  • @benardmumba3338
    @benardmumba3338 2 місяці тому +2

    And boom Harker loi...

  • @sharma_bhavishya
    @sharma_bhavishya 2 місяці тому +4

    Yo, you doing some crazy work ngl ☝️🔥

  • @invt.duanecage555
    @invt.duanecage555 2 місяці тому +2

    Some of y'all haven't even watched the video but already liking it

    • @Hello_-_-_-_
      @Hello_-_-_-_ 2 місяці тому +4

      Bc we know it's going to be quality content.

    • @abdou.the.heretic
      @abdou.the.heretic 2 місяці тому

      Freedom, funny how that works.

    • @invt.duanecage555
      @invt.duanecage555 2 місяці тому +1

      @Hello_-_-_-_ and indeed, it was great

    • @invt.duanecage555
      @invt.duanecage555 2 місяці тому

      @@abdou.the.heretic true talk

    • @gvagear
      @gvagear 2 місяці тому

      yes, you can like it, and after watching you can decide to keep it or revoke it. some ads and autoplay feature will navigate you elsewhere on video end, so it is a best practice to like earlier.

  • @garyng2000
    @garyng2000 2 місяці тому

    who would design a backend like that ? sounds like high school project to me :-)

  • @user-nh1en4cq3k
    @user-nh1en4cq3k 2 місяці тому +1

    The video is all over the place

  • @Sxhib_space
    @Sxhib_space 2 місяці тому

    Sir pls next video on how to find and bypass admin panel of any website.

    • @olabanjidavid2512
      @olabanjidavid2512 8 днів тому

      YOU CAN ONLY DO THAT FOR A WEBSITE WITH HTTP NOT HTTPS

  • @GAMEGLITCHER99
    @GAMEGLITCHER99 2 місяці тому

    damn i will be using this sometime

  • @gpppp910
    @gpppp910 2 місяці тому +1

    So to bypass 2fa you'd need a sql injection? That's not a 2fa bypass sir, that's just a misleading title. It's already game over when you can extract arbitrary data from the database.

  • @aburilusbroadcast
    @aburilusbroadcast 2 місяці тому +2

    Please make a video with how a hacker bypass my 2FA provided by my Yubikey. :) Thanks!

    • @valkaielod
      @valkaielod 2 місяці тому

      They do not need your Yubikey if they can get the TOTP key stored on it from the server.

    • @aburilusbroadcast
      @aburilusbroadcast 2 місяці тому

      @@valkaielod I don't talk about a TOTP code provided by Yubikey. I talk about 2FA provided by hardware key Yubikey itself (aka they need my key to plug in to their USB port and touch the key). How can they bypass this?

    • @valkaielod
      @valkaielod 2 місяці тому

      @@aburilusbroadcast That is FIDO2. They can't bypass it unless there is a vulnerability in the chip and they have access to it. Or they exploit the web application.

    • @valkaielod
      @valkaielod 2 місяці тому

      @@aburilusbroadcast It seems like YT ate my comment. Bypassing the FIDO2 auth used in that scenario is not trivial at all. You either need a vulnerability in the chip YK uses or compromising the server side.

  • @almoh
    @almoh 2 місяці тому

    To setup 2FA, first you need to have the password? if you already have the hackerwhateverpassword, the account is already compromised?

    • @killerfreefire3727
      @killerfreefire3727 2 місяці тому

      The first part of video was an example of how 2FA generally works. Qr code image gives us a secret token that we can use to bypass 2FA, then in the video shows that with SQL injection we get this token from the database

  • @discfree1
    @discfree1 2 місяці тому

    Hacking is not in it self not illegal, only when you do it in the wrong way. like destory stuff.

  • @user-ds7yp9yx8o
    @user-ds7yp9yx8o 2 місяці тому

    Please say more on /etc/apt/sources.list Unable to locate package Not even to update kali Linux download nothing in here seems working

  • @user-hg7xs5hv6j
    @user-hg7xs5hv6j 2 місяці тому

    wow got here 31min after posted

  • @tutacat
    @tutacat 2 місяці тому

    Actually, most TOTP implementations give you a few seconds leeway

  • @cookiigames
    @cookiigames 2 місяці тому

    That’s happening because the developer didn’t use an orm.

  • @DigitalFootprints117
    @DigitalFootprints117 2 місяці тому

    Can we do it for Gmail.

  • @godalfred2266
    @godalfred2266 2 місяці тому +3

    Question:-
    Is it possible to brute force the 6 digit authentication code with graphic cards or with anything else in Cybersecurity ?

    • @Kalreni
      @Kalreni 2 місяці тому

      @@yt_brij Proxies exists

    • @lainiw4kura
      @lainiw4kura 2 місяці тому +3

      usually the passcodes refresh and change every minute

    • @PCs454
      @PCs454 2 місяці тому +1

      yes you can but they expire after like 1 minute

  • @MesmerBaas
    @MesmerBaas 2 місяці тому

    This has nothing to do with 2FA, this is just sql injection. If the company is boneheaded enough to store sensitive information undirectly without hashing it you can query everything including yes 2FA. Enterprise setups are not as easy as this.

  • @Jig12693
    @Jig12693 2 місяці тому

    Helo sir I also want to learn programming and can u plz teach me plz sir I beg u.

  • @invt.duanecage555
    @invt.duanecage555 2 місяці тому +3

    Mind-blowing

  • @Prdimznova
    @Prdimznova 2 місяці тому

    what is a good countermeasure besides fixing vulnerabilities? Store TOTP in another DB or encrypt it?

    • @patwhocares7009
      @patwhocares7009 2 місяці тому +3

      Simple, do not send sql info and do not trust input from a user always sanitize so even if, for some reason, they tried sql injection, it will fail. This is amateur stuff when you know nothing about programming and just started. And this is just clickbait.

  • @Tatsujin-Senshi-Samuraibushid0
    @Tatsujin-Senshi-Samuraibushid0 2 місяці тому

    Your search parameter is vulnerable =) In other cases, you will bypass my socks :D Yeah, this is an example, sure. :)

  • @LOMOKA25
    @LOMOKA25 2 місяці тому

    hello can you help me skip the website

  • @Krmpfpks
    @Krmpfpks 2 місяці тому

    Newsflash: If you can access the database there is very little reason to even bother accessing the website frontend.

  • @GothSomnia
    @GothSomnia 2 місяці тому

    Hello, I'm seeking assistance with a matter of significance to me. I recently added an external hardware component to my motherboard known as a DMA (Direct Memory Access). In the device manager, it is listed as such. However, it is crucial for me to conceal and present it as a different device to appear legitimate. Specifically, I aim to mask it from the system.
    I'm in need of a firmware solution that can spoof this DMA card, essentially hiding it by integrating it into the firmware to mimic a standard PC component. The objective is to make the DMA indistinguishable from other regular hardware components Furthermore, I am looking for a firmware tailored uniquely for my use, ensuring exclusivity. Unfortunately, I lack experience in this domain, making comprehensive assistance invaluable to me.

  • @AbsoluteDegens
    @AbsoluteDegens 2 місяці тому +7

    In this example, you had the password and email, and the 2fa wasn't needed, you set up the 2fa after you had access to the account? Im confused.

    • @kibetandrew5622
      @kibetandrew5622 2 місяці тому +2

      😂

    • @ferasm96
      @ferasm96 2 місяці тому

      Because the whole video is about bypassing 2fa through extracting the token key

  • @cerealpeer
    @cerealpeer 2 місяці тому

    just strip and report with xss

  • @Live360bdTV
    @Live360bdTV 2 місяці тому

    I can't login my Facebook account due to , 2factor automatic app . Can you help me 😭

  • @Patheticus
    @Patheticus 2 місяці тому

    Your voice reminds me of the Yakuza missions from GTA III!
    It was just a joke, no hacking me! 😅

  • @patwhocares7009
    @patwhocares7009 2 місяці тому

    First thing you learn is never trust user input and never ever show the query (maybe in debug mode when you are the only one that can see it, but never ever in production) . What kind of losers programmed this and what idiots approved it for production? These are mistakes i did when i first started 25 years ago as a rookie.

  • @samsepiolz
    @samsepiolz 2 місяці тому +1

    how can this work on modern systems?

  • @vikinator5371
    @vikinator5371 2 місяці тому

    This works on ubisoft?

  • @user-nh1en4cq3k
    @user-nh1en4cq3k 2 місяці тому +1

    When you explain you assume we know some of the stuff …. You should explain like we never heard of it ……

  • @edwardstuart3207
    @edwardstuart3207 28 днів тому +1

    Hay I been watching you video all of them I just finished all your videos I love them great tips how do you bypass a text verification code if your number is candle when you switch providers because I can't get into my one app account without having my old phone number which I don't have

    • @anabella4266
      @anabella4266 13 днів тому

      Are you ready to get this situation solved right away ???…. I have an expert for it..😅

    • @anabella4266
      @anabella4266 13 днів тому

      I was also in similar situation but the same expert helped me out… He is *Tischler tech*

    • @anabella4266
      @anabella4266 13 днів тому

      This guy helped me get mine back. I never believed this could be possible but thanks a lot to him.. *Tischler tech* dedication and might in doing this looks unreal but it works🎉..

    • @anabella4266
      @anabella4266 13 днів тому

      *Tischler tech* is a cyber security expert. Only him can look into this situation and get it back…

    • @anabella4266
      @anabella4266 13 днів тому

      He has over 9k followers???.

  • @usr808
    @usr808 2 місяці тому +2

    has anyone ever tried to hack loi liang yang?

  • @MrColinTee1
    @MrColinTee1 Місяць тому

    Can you help me bypass my own 2FA for Facebook? I lost google authenticator when I had my mobile phone stolen.

    • @anabella4266
      @anabella4266 13 днів тому

      Are you ready to get this situation solved right away ???…. I have an expert for it..😅

    • @anabella4266
      @anabella4266 13 днів тому

      I was also in similar situation but the same expert helped me out… He is *Tischler tech*

    • @anabella4266
      @anabella4266 13 днів тому

      *Tischler tech* is a cyber security expert. Only him can look into this situation and get it back.

    • @anabella4266
      @anabella4266 13 днів тому

      He has over 9k followers???.

  • @nazarsukkar5809
    @nazarsukkar5809 2 місяці тому

    I wanna bypass my outlook email 2FA any suggestions?

  • @gomeztorricellygomez7808
    @gomeztorricellygomez7808 2 місяці тому

    All passwords in a database should be encrypted...

  • @codewithlaghari
    @codewithlaghari 2 місяці тому

    Title: Union based SQL Injection 😂

  • @DavidStringham
    @DavidStringham 2 місяці тому

    You're just making clickbait at this point, aren't you? Like websites with 2FA would have database vulnerabilities.

  • @imadlatch7206
    @imadlatch7206 2 місяці тому

    No encryptions, no email validations, no input validation, even my little boy can hack it

  • @lindozwane5929
    @lindozwane5929 2 місяці тому

    Cool

  • @PandorasBox2
    @PandorasBox2 2 місяці тому

    and thats why u have to encode important info on your database all the time

  • @shsh-xk4hi
    @shsh-xk4hi 2 місяці тому

    how to hack any bluetooth devices or speakers ?

  • @samuelogoti254
    @samuelogoti254 Місяць тому +1

    i got nothing here...i just watched

  • @cameronrich2536
    @cameronrich2536 2 місяці тому

    Dude is a legend. Like vid or be hack3d

  • @jagmarc
    @jagmarc 2 місяці тому

    Why is there a massive microphone

  • @AnimeEditsBeyond
    @AnimeEditsBeyond 2 місяці тому +45

    don't worry guyz it won't work on gmail😉

    • @elite_camper
      @elite_camper 2 місяці тому +1

      Why

    • @AnimeEditsBeyond
      @AnimeEditsBeyond 2 місяці тому

      @@elite_camper SQL injection exploits database vulnerabilities by inserting malicious SQL code; Gmail's 2FA, a user authentication method, operates independently of database interaction, rendering SQL injection ineffective.😭

    • @TheWunder
      @TheWunder 2 місяці тому +8

      Assword123

    • @professional.hacker.
      @professional.hacker. 2 місяці тому +9

      @@elite_camper You don't know why? Really you don't know?

    • @AnimeEditsBeyond
      @AnimeEditsBeyond 2 місяці тому

      @@elite_camper SQL injection exploits database vulnerabilities by inserting malicious SQL code; Gmail's 2FA, a user authentication method, operates independently of database interaction, rendering SQL injection ineffective.😭

  • @sunilgaikwad6335
    @sunilgaikwad6335 16 днів тому

    Bro please 🥲 next video make with social media 2 factor authentication bypass please 😢😭

    • @cashmoney1294
      @cashmoney1294 13 днів тому

      Are you ready to get this situation solved right away ???…. I have an expert for it..😅

    • @cashmoney1294
      @cashmoney1294 13 днів тому

      I was also in similar situation but the same expert helped me out… He is *Tischler tech*

    • @cashmoney1294
      @cashmoney1294 13 днів тому

      *Tischler tech* is a cyber security expert. Only him can look into this situation and get it back.

    • @cashmoney1294
      @cashmoney1294 13 днів тому

      He has over 9k followers???.

  • @te8-uf8el
    @te8-uf8el 2 місяці тому

    Just SQL inject? 😅

  • @user-mi8kr5xk2c
    @user-mi8kr5xk2c 2 місяці тому

    Bhai ye back hod hai gad uuu

  • @rajakeerti5675
    @rajakeerti5675 2 місяці тому

    I want to revoke the admin access in windows. And have a seperate profile where there is no business for admin. Help me find the how to guide

  • @EGM_7070
    @EGM_7070 2 місяці тому

    Use this💀

  • @saxtant
    @saxtant 2 місяці тому

    This guy thinks the codes exist in a db... All of this completely false. It's calculated, that's inherent to the security protocol that it be related to absolute time as a concept. You won't get anywhere near it, especially trying to pretend it's in a db. Not great for your hacker mojo.

  • @SagaraUrz
    @SagaraUrz 2 місяці тому

    I'm coming for you Hacker Loi

  • @Angry_Farmerz
    @Angry_Farmerz 2 місяці тому +1

    muhahahaha i will use this

  • @VulcanOnWheels
    @VulcanOnWheels 2 місяці тому

    4:28 Then you're into pretense? OK, I'm done with this video!

  • @cerealpeer
    @cerealpeer 2 місяці тому

    but here i am

  • @ljrouse5
    @ljrouse5 2 місяці тому

    Shit like this doesn't work these days lol any reputable website this wont work on. Maybe 10 years ago

  • @stephenu2352
    @stephenu2352 Місяць тому

    Promo SM 🌈

  • @emonahamed7278
    @emonahamed7278 2 місяці тому

    How to break iphone lock 🔐🔒😅

  • @brad6817
    @brad6817 2 місяці тому

    Use hardware keys. Problem solved.

  • @joekurt6558
    @joekurt6558 2 місяці тому

    Guys who have a solution to recovery a gmail password account , i need to make my gmail account back , if someone know how pls let me know , and thank you

  • @Adityamathur07
    @Adityamathur07 Місяць тому +2

    Please remove two factor in my Facebook account please 😢

    • @anabella4266
      @anabella4266 13 днів тому

      I was also in similar situation but the same expert helped me out… He is *Tischler tech*

    • @anabella4266
      @anabella4266 13 днів тому

      *Tischler tech* is a cyber security expert. Only him can look into this situation and get it back..

    • @anabella4266
      @anabella4266 13 днів тому

      Certified *Tischler tech* cyber security expert is the best 😊

    • @anabella4266
      @anabella4266 13 днів тому

      He has over 9k followers???.

  • @bertosudu9506
    @bertosudu9506 2 місяці тому

    👍👍👍👍👍👍👍👍👍👍👍👍

  • @user-bp3kc4gc7v
    @user-bp3kc4gc7v 2 місяці тому

    This guy is not a person it's CPu

  • @ZER0x824
    @ZER0x824 2 місяці тому

    Yo can you hack into my Gmail? I forgot the password and I literally can't get into it lmao 😅