SQL Injection Tutorial for Beginners
// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/...
Full Web Ethical Hacking Course: www.udemy.com/...
Full Mobile Hacking Course: www.udemy.com/...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangya...
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
Пікірлер: 156
filter and protect data input from sql injection ,param statements - all user files with sens info stored remotely with file intrusion detection . turn error reporting off - use better hashing for passwords . firewall to block rogue and log sql attempts . it would be interesting to see you make a follow video to this and demo how to protect against each of the attacks/vuln etc
@zeeniarrahpradipt7829
11 ай бұрын
Depend what tools you used. That parameters can allow by admin without injector 'tol get permission and can come in by it self to get the password. If you used the injectors the security admin will rejected your flow into that systems. I already prove it by my own theories.
@b3T4RIK
11 ай бұрын
@@zeeniarrahpradipt7829 normally if a hacker is using the url in the browser to input sql injection or any text input field -i set a condition that sets a validation request to true in the database once a successful login is found when checking against users names/emails and passwords once the validation is set to true the browsers page will load its contents otherwise the page stops loading and nothings gets passed from db to the hacker
This attacks are deprecated 😅😂😊❤
@lolwtf229
11 ай бұрын
lol its deprecated deprecated
@1mhell293
11 ай бұрын
😂😂
@jacesullivan4563
11 ай бұрын
Just because its deprecated doesn't mean its not effective... IRL many people still use outdated tech
@MikeBlackford
11 ай бұрын
It's always nice to know windows xp tricks 🛜
@calt03
10 ай бұрын
Doesnt matter/ if u need to learn to protect yourself. Old techniques r better than not knowing any techniques
Great channel and very useful recommendation, many thanks for your efforts, may i ask when setting up the mirroring device you mentioned that it has to use the same Apple ID Account (child one), but does it need the same SIM card and number ? i.e. i have
Hi everyone! Am extremely excited and feel blessed to click on this video. I know it super long, but so far....am loving every single second about it. I always wanted to do something in the IT filed, but with my busy schedule...I was always contempla
Man,I love this guy❤❤
You are so brilliant . May God Bless you with good health , wealth and wisdom.
Едет поезд "Москва-Харьков", проходит уборщица и спрашивает мужика: - Вы на харькiв? - да. - ну так иди и убирай.! PS: Народная мудрость - Без "агента" ни один цифровой упырь на носу не вскочит
This is a great attack....from 10 years ago when mfa wasn't in play and when 3 max attempts weren't a real thing..
Your knowledge is so helpful! Thank you
Your content is fantastic
Thank you for nice explanation! Do you have any ebooks or website that provide detailed explanations for all latest methods?
Hello Hacker Loi, I'm amused by the video. I do have one question though, how did you find the -T section at 9:33?
Good luck cracking a hash when salted lol
@macktheripper7454
11 ай бұрын
These techniques are decades old.
Was waiting for this
I was never able to Download..Kali Linux..can u do a video..and how do u check open port..on android..
Nice video .😎🤘
brute force sucks for large websites you would need a room full of super computures to accomplish this for say FB
@user-fl2ym8tm1m
6 ай бұрын
Give me a hint what should be used instead /noob
@anonymousandy2789
6 ай бұрын
social engineering and hope they dont have 2-fa enabled. i would say phishing would be you best bet
Awesome as always, actually I want to say something, I know it not good to ask but, my family's financial condition got worse and i can't afford a laptop, I used to learn hacking from your channel and practice it on my friend's laptop, but he has moved away.I am very passionate about hacking and want to learn more, I can't do everything on termux, some tools require laptop,It would be a great help if I can get even a simple working laptop. I will pay you back, when I will start earning. I hope you understand my situation guys. Thanks❤
I have watched this video in .75x
Is there a course orvideo on reverse shell from zero to hero
Thanks for sharing your Great Knowledge !
please make a video about how IDOS works
road to 1 million loi sir 🤩
I like your content but maybe you consider showing us new attacks like those of a real-world system rather than the same invented wheel
thank you
could you please make a video about proxy chain once more???
Hello. How can i get your full course on Cyber security (Ethical hacking)?
What about the app download
i fux with ya heavy broseph, keep slayin it king
i love your work sir
Please a tutorial for WI-FI password🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏
how are you master loi
Is there such a thing as ethical intruder? And that is provided you stay put as intruder and not advance to burglary and theft.
Y is his cat command and cd longer or different than default?
but nowadays websites are not vulnerable to sql injection
@Scorpion_Yug
8 ай бұрын
Right bro 😢
Kai linux vs parrot os?? Which should i prefer as a pro h@cker?
@amongusboi2032
11 ай бұрын
He is using kali linux
@Arceus948
11 ай бұрын
@@amongusboi2032 yeah, that i know, but i m asking for myself, and i dont know if he is a pro h@cker!!
Nice thanks 🥺
burpsuite tutorial pls,,,,beacause browser request not show in burpsuite
hacker loi u r realy amazing
is it possible to trace the location of the stolen device using imei?
@user-do7nm1sh4m
11 ай бұрын
Deangelocrack
@user-do7nm1sh4m
11 ай бұрын
On lnstagram
@user-do7nm1sh4m
11 ай бұрын
She can help you
i like your contents
it is impossible to hack social media?
Nice Sir Loi :D
Your Videos are amazing...
Hello guys I want to ask you all. Why we need as proxy foxy, because already we have browser incllude with proxy in the burb suite.
@macktheripper7454
11 ай бұрын
You can use the burp proxy if you want but foxy proxy works very well with burp
@ivandesiberia
11 ай бұрын
why?@@macktheripper7454
If you have purchased the Burp Suite... Otherwise it will take 5 years 😂
good 👌
is there a way to do this on Mac?
@Andres-mq1ye
10 ай бұрын
I need help with a scammer that took 1.5k from me :/
thid kali ferst 😊
Over 1 year u don't replay on udemy. Replay us, we're ur student, we need ur help, we can be those who can destroy ur brand image.
Bro it’s been a while since you posted 😢
i think is good!
Ok so How to hack "strong 💪 password" and the encryption key web app???
@macktheripper7454
11 ай бұрын
Your comment makes no sense .. can you try again?
@user-do7nm1sh4m
11 ай бұрын
Deangelocrack.
@user-do7nm1sh4m
11 ай бұрын
On lnstagram
@user-do7nm1sh4m
11 ай бұрын
She can assist you
Only mobile number se phone Ko hack kaise kare
how to do the curisve thinggg in 2:14
Hello Loi Liang Yang, I am under the impression that my KZread is hacked, my Playlists are being listed as "Updated today" or "Updated # days ago" without being logged in or adding/removing from these playlists. Is there any way to purge a session token on KZread and force all actors to log out of the account?
best❤
The use of the HTTP protocol on a website is insecure. If a website uses SSL encryption, can it still be intercepted in this way?
@macktheripper7454
11 ай бұрын
I don't think you understand what's happening here. The page will usually have encoding on the client side before even sending it. Ssl is transporting .. hashing is usually done to encode the information being sent. For example: you enter your name and password on the Web page, when you click log in that data is encoded then uses ssl to send it. Hope it helps ✌️
@bhattsmit2246
7 ай бұрын
OH!! means i am just finding the username and password and after that login the username and password are encoded and then being send to the database for query?Am i right? @@macktheripper7454
Can you get the password to one of my old accounts please?
@Visible534
10 ай бұрын
Seatoolx🤏🏾
i am ethical hacker
Hlo sir I want to learn for free with videos full ethical hacking , website hacking, andriod hacking also plz suggest me anyone where i get free videos
Hacking is legal man
@amongusboi2032
11 ай бұрын
Hacking is legal if you authorized to preform operations, know very well that law enforcement will question the host or the management.
Often the difference between whether a person is identified as a hacktivist (or Batman vigilante as described here) or a terrorist is whether the person describing the hacker agrees with their ideology or not. One of the reasons why doing real harm with h
@macktheripper7454
11 ай бұрын
What are you babbling on about?
hey loi please answer
You really think this is useful for redteaming?
Being a script kiddie, watching this video...
Cool
Bang aku minta no wa nya bang....
🎉
Sir , can we crack WiFi password by using command prompt . If we can then plz make a video in it . Waiting for the video......!!!!!
@eval_is_evil
7 ай бұрын
😂lol
sir, you are my idol. Siri can you help me... I am at beginner level.
hello hackerloi
How to hack a website login page when it locks an account after a failed login attempt, like if you failed to login 3 or 5 times, then it has a timeout for 30 seconds or an account logout mechanism. Can you guide me about this?
@user-do7nm1sh4m
11 ай бұрын
Deangelocrack
@user-do7nm1sh4m
11 ай бұрын
On lnstagram
@user-do7nm1sh4m
11 ай бұрын
She can help you out
Not going to lie, but we are actually really proud to have an employee like you as part of our team. The job is done so gracefully and neatly. Very well done, dear *usespy online.* First of all. Thank you for making the work environment so friendly and ta
Halo bro
Sir Please can you create bug hunting video 😊 hackerone or any bughunding platform😊
@CypherX-Sec
11 ай бұрын
No. he makes people script kiddies
😍
First???❤
Hi Bhai I am a 10 class student and I want to become a hacker how can I start my journey please tell
@amongusboi2032
11 ай бұрын
Ok, so to be ethical hacker there is these certifications you need to pay for to take such as : EC Council start with cpent cert and make your way up to CEH cert
@amongusboi2032
11 ай бұрын
Cpent is pen testing certification for those beginners to hacking.
@amongusboi2032
11 ай бұрын
There is also a website other then Ec council called offsec
@amongusboi2032
11 ай бұрын
There is comptia with pen test+
@amongusboi2032
11 ай бұрын
Hackthe box website
can you teach me cuz i'm deaf🥺🥺🥺🥺🥺🥺🥺🥺 if yes then i'm over the moon
mera Facebook account hack Ho Gaya uska password phone number Dete Hain
@user-do7nm1sh4m
11 ай бұрын
On lnstagram
@user-do7nm1sh4m
11 ай бұрын
She can help you
@user-do7nm1sh4m
11 ай бұрын
Deangelocrack.
“Jesus said to his disciples: “Things that cause people to stumble are bound to come, but woe to anyone THROUGH WHOM they come.” Luke 17:1 NIV
First
1#
Hack Facebook
pin comment ^^)
You are teaching everything outdated
Hey mister Loi is there any way i can send you my other email to get the password please thank you
The efficiency of this *usespy online is next level.* To juggle walk throughs of various angles on the topic delivered to-camera, different content per topic from various folks underneath the umbrella of the track list of the larger big band concert itsel
🫡🫡🫡🫡 respect ✊
*usespy online,* youre one of my favorite people on this planet.. (And I dont even know you personally). The way in which you present your work, the content and the access is just awesome. Thank you!! This project is unbelievably amazing and thanks for