how hackers hack any websites in minutes?!
Ғылым және технология
// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/course/full-web...
Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
Full Mobile Hacking Course: www.udemy.com/course/full-mob...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangyang.com
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
Пікірлер: 296
Hacker loi u sexy. EHEM anyways. As a web developer actively trying to create a social network on my own and release it to the public, it would be an understatement to say I'm frightened. But as long as Loi keeps producing these videos I can patch most of this stuff.
@Dahlah.FightMe
10 ай бұрын
.-.
@Namrec_Molai
10 ай бұрын
I think thats the purpose anyways, not like teaching black hackers...
@hpi_anc
10 ай бұрын
Hacking is illegal but u r ligal 😅😅 so I learnt with u ❤️😎
@localhost69
10 ай бұрын
i woukd edit that comment if i were u
@gabrielkenz
10 ай бұрын
most of these vulnerabilities are already patched by default if you use up to date frameworks.
As a developer for more than 25 years now, i always though that preventing these kind of "attacks" was basic web development. I never thought that in 2023, devs would still leave so many doors opened. I know it's just an example and dummy website, but if you used it like this, it's because you know devs do it LoL.
@horrorworld8251
9 ай бұрын
Sir can u help me please a little help
@luisfernando5998
9 ай бұрын
@@horrorworld8251u want me to hack Uranus ?
@andywest6062
8 ай бұрын
You certainly would be surprised. Doing a google search for something like "&id=" would list any websites who haven't had their urls rewritten. 5 minutes later and I can have database access for a super user if they've also not encrypted their passwords, which is the next blunder.
@MrRaja
8 ай бұрын
@@horrorworld8251 Trust me when i say... Nobody can help you... but yourself.
@genjimccorkle5518
7 ай бұрын
Welp, when companies are laying off more experienced developers in favor for young and cheap ones, this is what you get. 😅 and when there are no layoffs, developers are only interested in creating the minimum viable product and then moving on to the next job. Ofcourse this is the structure you end up with.
This sort of thing is super interesting. Definitely going to be coming back to this channel when I have time.
The way of explaining things is great. Its like a friend is explaining to me. Thankyou for giving us content
@amongusboi2032
10 ай бұрын
Indeed, remote access to the victim computer is like holding remote searching through TV channels. Both are remotes.
Excellent video. A 40-hour course on this topic and technique would be a big hit!
@amongusboi2032
10 ай бұрын
Direct hit.
@ImraneMokhtari-wi4hq
9 ай бұрын
Get hide my ass
@user-ng6xe6pb9b
9 ай бұрын
is it free
You're the teacher, the rest is zero ❤️
Bro someone is blackmailing my sister i want to hack his acc or just want to delete his acc nedd ur help plz help
@patrickpatty1
9 ай бұрын
whatsap
@patrickpatty1
9 ай бұрын
+1
@patrickpatty1
9 ай бұрын
61
@patrickpatty1
9 ай бұрын
63
@patrickpatty1
9 ай бұрын
58
Great video! I just started your Udemy course and it's full of great information! Thank you for all you do!
15:15 Why cd into db then run ls? Wouldn’t it be easier to just run “ls db”?
Nice tutorial, but I would have done wget command to a php shell and done everything through it, much easier though..
@xt355
10 ай бұрын
explain please in detail if possible
13:43 Great example, thumbs up, subbed!!
Loi Liang Yang what is the name of the app you used for commanding injections
Very good video, but i hope that you remove the music in the backround in future videos because its very distracting and annoying. Thanks
Great video. I will like to know how you trace someone via IP. Educational purpose
@user-rn7bz4wj6v
10 ай бұрын
Elaborate on what you mean by "trace"?
@weirdlyelectric7332
10 ай бұрын
Skiddie
@joshmarkovich4608
7 ай бұрын
Everyone wants to watch one video, and be an elite hacker. 😂
Would you give online one on one lessons, i would love to learn from you via a stream room where i can share screan and learn ethical hacking.
Hey Mr Loi. I really need your help. It’s very important for me. Thanking you in advance
That database picture looks juicy 😲😅
Yow thanks. Can I have the link of this owaspb dummy project rather than git-ting it on my machine?
Hacker kLi you are genuis. I am Linux administrator and your tutorials are fucking awesome. Please keep making these types of videos. Thanks to youtube algorithm which suggests your channel.
I have a question please 🙏 should my ip addres be the same as in the burp proxy settings?
Liked the video, but how can you change the html?
Damn homie Loi, you made make IT shacking when you are around, thanks for you videos man, I'm a programmer and I 'm learning always great things to secure my apps, so thanks brother ! continue blowing our minds with your snacky methods of creating backdoors.
Awesome Tutorial Loi!
How to get membership, is there any channel link?
Can I use these website for learning?
Hi, can you tell what's the coding for withdraw money from website account to another account. Please
you're the best hacker loi I feel like you dont get much credit for your work I wish I could be home schooled like you
@ebohgoodness1302
10 ай бұрын
by**
Scrolling trough these comments makes my brain rot
@Kirt44
10 ай бұрын
Mine too
@amongusboi2032
10 ай бұрын
You'll be fine, besides you don't have to read such brain-washing comment section.
@abeliscool7950
9 ай бұрын
Why lol
@moonselanac357
8 ай бұрын
I'll take your word for it
@mileshall5795
5 ай бұрын
@@amongusboi2032brainwashing?....Now I admit it's all connected, & 1/2 of these were not even submitted by a human being....but you are concerned about the comments section?!?😅😅 I would think that it was a given that brainwashing was the overall object of the entire platform....but that's just me
Question from a total newbie: Doesn’t the AIO security (WP plug-in) block these kind of attempts immediately? My thoughts are that this maybe was easier some years ago when many websites didn’t update their security automatically. Today a website in shared hosting often gets blocked automatically by the hosting company if the sites refusing to update WP theme, plugins, php and so on. Someone with skills that mind to inform this lost newbie soul?! 😂
What screen recorder do you use please
First download as usual❤😅
Im trying to replicate your OS command injection - how do you get the commands to execute from the file name? How does the filename have shell access?
Sir,that page doesn't follow the DES algorithm so we can bypass that what if it follows DES algorithm?
@architech5940
4 ай бұрын
These techniques don't actually work in practice. While these tools are rudimentary to understanding how common vulnerabilities work to exploit them, applying these concepts in the field requires proficiency in DevOps and programming. A proficiency in DevOps provides the necessary skills and knowledge required to understand these systems and their vulnerabilities at large. This includes how these servers are designed and maintained in production, and how the project/server files are structured and how they are accessible to different users. To gain proficiency in the skill, practice by building a simple chat client that utilizes a variety of protocols. Once you've done this, you need to host a Linux server on the cloud and deploy you client application to this server. Make sure to read documentation thoroughly to make sure you have everything running the way it should. Furthermore, you enable several protocols to your server for practice in hacking them, and securing them, then repeat. Programming proficiency is a critical step and is trivial to your success in penetrating any system "out in the wild" (uncontrolled environment). Although scripting with pre build tools on Kali can be effective in theory, any antivirus out there can detect these attempts to infiltrate their system with these common techniques and thus requires you to get creative with your own code to evade detection. Think of it like this: if team read has built it, team blue has reverse engineered it; if team red has seen it, so has team blue; if team red has updated OffSec tools, likewise team blue has updated antivirus. In conclusion, learn these prerequisites of engineering and become very familiar with these systems and how they are maintained, and you should be on your way to becoming a(n) "ethical" hacker.
please show how to make undetectable metasploitable payload
DB in the Open_basedir ? Who does that ?
That's Amazing method
Hi Shal we discuss about the defimine usdt jingchen now
You didn’t give recommendations/solutions on how to protect against these kinds of attacks
@PressKevinToContinue
8 ай бұрын
I believe changing your website URLs to random strings of letter and numbers might help.
bro is making us next him 💀💀
Big bro till date you didn't teach me to hack by your termux videos. I need yours faithfully help
Thanks
I just subscribed and liked the video, just cause I’m scared of being hacked
Leaving a relationship you’re not happy in is much easier than emotionally damaging someone. But selfish people don’t get that
@KasraKlassics
10 ай бұрын
Wrong video, ma’am
@KasraKlassics
10 ай бұрын
That said, leaving a relationship, specially if it’s toxic, is probably the most difficult of all! Selfish people don’t have to put effort in hurting others. They naturally just do.
Hey, i have froxy poxy and burp suite, but how do i connect froxy to it?
We need this
Love you Loi. your my best friend now bro.
If you hadn't written on the screen, I wouldn't have understood. Thank you.
What would be the technic in real site, cause its a demo website and it has no ssl also.😊
@amongusboi2032
10 ай бұрын
I believe more time and more repeatedly processes.
Ma G . Best teacher 😂❤❤
Great sir
Thanks man Exciting to watch your videos
Good morning to you sir. Please my browser isn’t working in Kali Linus. Kindly help me
I love your videos 🇵🇭🇵🇭🇵🇭❤️
Please sir, I can't run monitor mode and packet injection on my internal wireless card. I'm using Nexus 6p device. I've flashed the nexmon patch but doesn't work still.
@user-do7nm1sh4m
9 ай бұрын
Deangelocrack.
@user-do7nm1sh4m
9 ай бұрын
On lnstagram
@user-do7nm1sh4m
9 ай бұрын
She can help you
Awesome 🤩🤩😍
I'll be honest, I'll say am still new the hacking world....and within that time, I would like to think that. Pretty much have a really good how hacking works.😅🤔 Like before I watched this video, had few ideas in mind. I just wasn't sure if my theory is possible/ if I had the right idea or not. This video just basically confirmed that I was right. I agree with you that...with great power, cames great responsibility.😎 Just because I have (new ideas) I can create something new with this information.😁
@wildstorm74
9 ай бұрын
I'm probably going to get flagged for saying that, but it's too late now.😅😑
iam also learing u r course
Make a tutorial on kali Linux
@NekoLoliChan
3 ай бұрын
My linux looks so different
My competitor has assigned him self as my developer and is merging and taking over my account and controlling my network messages and internet. What do I do for help ?
@elizabethwindley166
7 ай бұрын
*Tracebackassets is an exceptional private investigator specializing in cryptocurrency theft cases. They have a team of highly skilled professionals who are dedicated to solving these types of crimes. With their expertise in blockchain technology, they can trace stolen funds and identify the culprits behind the theft.*
loi please u must learn better to draw, my engllish as german guy is not the yellow from the egg and when i must endkrypto ur Artwork it is very hard to learn from u, but i find u are a very good teacher... so please better draw in german we say du hast ne sauklaue die kein schwein lesen kann... thanks fpr teaching me loi
You should do a video on iPhone lockscreen bypass, and disabled iPhone removal. I've had found my old iPhone I lost years ago would be nice to open it! Thanks
@stefanjohansson2373
9 ай бұрын
There’s hundreds of programs that solves that easily (depending on iPhone model). Just find the latest version, otherwise Apple may have fixed the vulnerability. Google is your friend. 😂
im not even a newbie im just watching to recall my memory XD
Is it possible to block a video using cmd
GG , loi posted again
Should you use any VPN so that they do not come to your home to discuss your level of intelligence?
may i ask is there someway to get or legally hack my steam account back as someone hacked it and changed the password email and phone do u have any tips as steam support aint very helpful
@PulseVC
9 ай бұрын
If ur sure there’s no way to recover ur account as the rightful owner then contact support. If they’re no help then oh well. try to be more careful online so it doesn’t happen again
does it work on windows11?
What need hacker to hack laptop or desktop?
how to hack api's plz
19:50 WAF (Web Application Firewall)
How to recover Facebook id recover, and change password , hacker was set up a bot in id
I want learn hacking for hack gambling site, but so hard to me
Great Zambia
@loi i have been reading n watching many hacking videos and none of them are useful they are bunch of view eater. In my case i have a normal target just to find about hostname n target machine ip. i had search there website and i got every details like ip dns email of the website in every video they just give little bit of information. They dont tell how to find about target machine ip n hostname from website
Can we use dev tool instead of burpsuit?
@NekoLoliChan
3 ай бұрын
I dont think so. I mean maybe through a lot of coding know how and make it harder for you but burp makes it easy
How to bypass Snapchat suspicious login code thing without code?
Sir we hack any website database and inseart data How it is posibal, sir you should make a video for this topic. I request to you please make a video on this topic, How to hack a website database and inseart data.
When I send the request for the listener in burpsuite, i get a error of 413 entity too large to execute please help
Title should be "How hackers hack any website in 23 minutes ??" BTW informative Video man !!!!!!
Great work!
Awesome
bros a network chuck rip off and i respect that
Awesome 😮
why did u learn these stuffs Mr.loi liang yang
A lot of this is confusing. What terminal are you using? Is this terminal application an app, or can be? What Kali Linux app do you recommend downloading for Androids and Windows desktops, & laptops? Have a basics getting started playlist? Have a legend guide explaining what all these symbols mean and do, such as < or - or " or etc. ?
@orcundinlerr
6 ай бұрын
it is default terminal in kali linux. all apps in this video already satisfied in kali linux.
I love u bro ❤
@stefanjohansson2373
9 ай бұрын
The classic payed bot comment. 😂
I need you help sir..😢😢😢😢
@tasharogers9141
9 ай бұрын
I need some help also
@abhigameryt4859
9 ай бұрын
𝐇𝐞𝐥𝐥𝐨
@abhigameryt4859
9 ай бұрын
𝐀𝐚𝐩 𝐦𝐮𝐣𝐡𝐞 𝐛𝐚𝐭𝐚𝐨 𝐤𝐲𝐚 𝐡𝐞𝐥𝐩 𝐤𝐚𝐫𝐧𝐢
can i hire you?
How can i learn ethical hacking for free??
trop bien mais trop vite... 😕 difficile à suivre le texte. dommage.
Bro... user ids in url? That s the dumbest thing I have ever seen and still people are using these things. In my university for example in their site there was a few years ago this issue.
@user-lg4wl5tk4f
9 ай бұрын
Now we have slugs in the place of user I'd
@user-lg4wl5tk4f
9 ай бұрын
I think developer income is less that's why he is using I'd instant of slugs
@dany2685
9 ай бұрын
Yeah. One secure way is to use the auth token after login to get data for a specific user. Tho if the site has some XSS problems you could get the session id and replicate the session of others or make sql injection that will get you the user data. Sessions must have a timespan of 30 min or less to be harder to break.
Notifications = All
hey loi can u do little bit of discount i wanted to join ur channel but i cant afford it. as a college student i dont have any source of income.
Hi hacker Loi I love your work I just found your channel and all your videos are awesome! I'm using your videos and practiced myself for a security reasons of my new company. I'm stuck whit a problem and I would really like you to help me guide me through this problem so I can continue learning. Kind regards
Dude...Hacker Loi....YOU are Super Cool. Just sayin.
Awesome my mentor
@mundi4great
10 ай бұрын
what is NA doing here
@christopherishaku5585
10 ай бұрын
@@mundi4great who are you???
I'm really confused , because I see that beef cookie everywhere as well, and I don't know how to get rid of. Is there anyone who has sorted it out?
@weirdlyelectric7332
10 ай бұрын
Are you talking about the cookie puller BeEf?
@demotedc0der
10 ай бұрын
6:32 that BEEFHOOK:xxxxx cookie I mean
@demotedc0der
10 ай бұрын
only if Im on incognito ,its not there
Hi, how to root android phone?
@NekoLoliChan
3 ай бұрын
I think you misclicked a video
Nice :D
i need your help immediately if you can plz !!