how hackers use SQL Injection to dump out passwords?!
Vložit
- čas přidán 10. 08. 2022
- // Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/course/full-web...
Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
Full Mobile Hacking Course: www.udemy.com/course/full-mob...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangyang.com
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers. - Věda a technologie
What's a good password you recommend?
GnayGnailIoL*_!
Your previous metasploit video doesn't work lol. I tried it with myself but how do I find my own Rhost? Also, I tried my IP and it says that my RHOST denied it. I tried both my main gmail account and throwaway.
Loi could you explain how to open a mysql shell and create an exploit to gain administrator privileges? assuming you do the sql injection fine but you don't have enough permissions to make any changes to the server, thanks
Simple password like abc123 hashed in md5
e99a18c428cb38d5f260853678922e03
Paste it and you have secure password from easy-to-remember password
@@Cartiisthegoat29 RHOST is target host = target ip
I love your videos. I have barely dipped my toes into all this stuff, however, your videos are very informative and valuable information for myself, or anyone else who hasn't delved into the subject matter very much. Thank you
Thats why it is highly recommended to encrypt the passwords before saving to db.
You're a mad genius Hacker Loi
Hacker Loi strikes again! I love this channel. I have to admit I check everyday for a new video 😁
I really love your videos
Love your videos❤️
@Loi Liang Yang quick question would that process work for blind sql injection???
What if the saved passwords are encrypted by bcrypt? And is this method still work if I make my API for login to check first the username if it exist before going in to the SELECT statement of the actual login query? Like first check if username exist "SELECT * FROM users WHERE username=$1" if the select statement returns a data greater than 0 meaning username exist and only then the SELECT statement for login will run.
Yes! That’s why I’m here!
your biggest Fan is back 🙂
He knows what we want, whatever you do just never say you know who is hacker loi
Mr Loi. Always love your contents. Please I do need your advice and help on an idea I got
Sir, please make bug bounty complete course
Demo on exploiting multipart from data type ?
Haha nice I am currently developing an Algorithm to detect SQLI and XSS
what executer do u use is it linux please reply
Why is the syntax weird “+” ?
Sir How Can I access Your Membership Videos
Only for GET? How to for POST request!
Tonight, it is the second time my phone has got out of control, when i were surfing Facebook my phone suddenly quit Facebook and accessed Google. The first time is when i were learning foreign language in CZcams, it comment a random and searched for something but i rapidly turned off my phone but tonight it seem to be more smart when it tried to prevent me shut down the system when i did it quickly quit out and did sth with volume, it took me as twice as the first. How should I do to prevent that
Sounds like maybe a reverse shell? I'm not a experienced hacker, but who knows.
Maybe try looking for open ports using ADB
What if the passwords are encrypted?
Could be useful to pull data out tables … but what data admin saves passwords in plain text :o?
example, not real case
Why you are not active on twitter ??
Are you able to help reverse a hacker? My friends grandad fb got fully hacked, would we have to hack it back? They've changed all log in info we can't get back in
Does this method work for Complex passwords ?!
Yes. The complexity doesn’t matter with password hacking.
Please make a video about rootless configure nethunter without errors for Android device
Check David bombal CZcams
I have managed to install it but I had some problems with WiFi adapter not detected
Check David Bombal's latest videos
A friend once found a breakable radio station site. He added a div in the header telling them to be weary of donating bc the site wasn't secure enough.
Can you explain slowly
Pls how do hackers stay safe....
Hi hacker loi my phone was factory reset an I lost the password to my acc do u have any advice on how I can get it back or hack it back pleas an thanks :(
Wooo, niiice!
Yess
How hackers hack DNS ?
Why does he have a black hat on? O-O
hey
I am first plz reply me
welcome hackerloi
I think there is no plain password in database nowadays
He did these things for tricking children.
@hackerloi How often do you study hacking techniques?
hello Mr.hackeloi your website is not working could u please check once !
We need something professional sir
Make me the best hacker ever
Please Mr loi i need tutorial about android mobile hacking
Best password = no password, go password less!
1
First
Second to comment let’s go#
2 st