How Hackers Bypass Two-Factor Authentication (2FA)?!

Sdílet
Vložit
  • čas přidán 23. 02. 2024
  • // Membership //
    Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
    // Courses //
    Full Ethical Hacking Course: www.udemy.com/course/full-web...
    Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
    Full Mobile Hacking Course: www.udemy.com/course/full-mob...
    // Books //
    Kali Linux Hacking: amzn.to/3IUXaJv
    Linux Basics for Hackers: amzn.to/3EzRPV6
    The Ultimate Kali Linux Book: amzn.to/3m7cutD
    // Social Links //
    Website: www.loiliangyang.com
    Facebook: / loiliangyang
    Instagram: / loiliangyang
    LinkedIn: / loiliangyang
    // Disclaimer //
    Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
  • Věda a technologie

Komentáře • 299

  • @Ravigamer4
    @Ravigamer4 Před 2 dny +25

    Hey ppl, I'm a retired computer/IT person, Yet I still find Adrian Ruthnik so informative and straight forward. Thanks for your advise and helping the people...........Great work and love watching.

  • @PhulmoniMondal-cb2lq
    @PhulmoniMondal-cb2lq Před 2 dny +32

    Y’all should stop calling everything “the bare minimum” when it’s literally not. Respect is the bare minimum, actually going out of your way to comfort and have an open ear for someone isn’t. Doing something like this is truly very nice and a great thing of him to do. I hope shit gets better for you and I salute Adrian Ruthnik for being mature when it’s needed!

  • @banajkumarmohapatra6266
    @banajkumarmohapatra6266 Před 2 dny +27

    I'm a Maldives born and living in UK and I cannot express enough how much I despise these scumbags. Literally whenever people ask me my nationality I just tell them I'm British because idiots like these give us a horrendous reputation, not to also mention they scam other Europeans too. It warms my heart to see stuff like this, please Adrian Ruthnik keep up the great work destroying these scammers!!!

  • @AnnuRai-ft8xi
    @AnnuRai-ft8xi Před 2 dny +28

    Everyone should have a dedicated person like you Adrian Ruthnik .

  • @parthroy8579
    @parthroy8579 Před 2 dny +28

    Congratulations, Adrian Ruthnik I am relieved that you are out there fighting these thugs, We musttake every precaution to protect the elderly and the general public from these despicable con artists. Congratulations to You!! You deserve the Nobel Peace Prize for ensuring our security.

  • @MohitMishra-fn6cm
    @MohitMishra-fn6cm Před 2 dny +34

    The efficiency of this Adrian Ruthnik is next level. To juggle walk throughs of various angles on the topic delivered to-camera, differnet content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense taccess like this so digestible is really something. Awesome work jack!!

  • @ramjittudu7761
    @ramjittudu7761 Před 2 dny +21

    My account also got hacked and I followed the method as explained in this video but I'm unable to proceed after recording the selfie video. Thank you Adrian Ruthnik . I'm really happy seeing his name everywhere in the comment. It really says a lot about his good work.

  • @MallikarjunK-mp4fs
    @MallikarjunK-mp4fs Před 2 dny +30

    We need more immeasurably wise and compassionate humans like you on this planet. Thank you for sharing Adrian Ruthnik , Jon. I bet I'm not alone when I say this video found me at the perfect moment, and there are a lot of things here that I needed to hear right now.

  • @abishekabishek728
    @abishekabishek728 Před 2 dny +20

    Account of mine also got hacked and I followed the method as explained in this video but I'm unable to proceed after recording the selfie video. Thank you Adrian Ruthnik. It brings me immense joy to witness his name appearing frequently in comments, a clear indication of the commendable work he’s been doing.

  • @KrishnaBabuVishwKarma
    @KrishnaBabuVishwKarma Před 2 dny +28

    It just kept glitching on me when I tried this video tutorial so firstly I would say thank you for the video and secondly, thank you Adrian Ruthnik meeting you was a blessing in disguise keep up with the good work I'm sure a lot of people will be needing your assistance iin the nearest future after seeing this

  • @uzmaarshi481
    @uzmaarshi481 Před 2 dny +25

    Having someone like you who’s not only a great innovator but also pulls his best to get the work done so beautifully needs nothing but appreciation. Adrian Ruthnik Thanks for the well off work you consistently bring your all and I truly appreciate that. Thank you for making corporate life so smooth. Proud to have you on our team. Great work as always.

  • @Greyyyjohnson
    @Greyyyjohnson Před 2 měsíci +388

    What side are you on as Metaspyclub divides the wealthy from the poor?

  • @Satishkushwahs94
    @Satishkushwahs94 Před 2 dny +18

    Thank you, Adrian Ruthnik for consistently being so approachable and open-minded. Your friendly demeanor and willingness to listen and understand serve as a constant source of motivation. Your support and guidance have been especially meaningful to me during the recent account issue I encountered. Your willingness to assist and offer valuable advice speaks volumes about your character and the supportive environment you cultivate. I’m incredibly grateful to have someone like you. Your assistance played a crucial role in resolving the issue and getting my account back.

  • @VictorMartins239
    @VictorMartins239 Před 3 měsíci +124

    so at the end it was actually a sql injection

    • @hellamean
      @hellamean Před 3 měsíci +1

      Exactly

    • @patwhocares7009
      @patwhocares7009 Před 3 měsíci +6

      Which is kind of an amateur move.

    • @BigTurtleMane
      @BigTurtleMane Před 3 měsíci

      @@patwhocares7009”amateur” but effective, like keyloggers

    • @abdulrahmanfaisal5969
      @abdulrahmanfaisal5969 Před 2 měsíci

      @@patwhocares7009 exaclty cuz his channel is sh*t it just teaches some nonsense stuff for beginners additionally it won’t benefit anyone

    • @amanokinji6220
      @amanokinji6220 Před 2 měsíci +1

      Yeah, if we can execute this level of injection then, the company is a lost cause 😂, its always thing with WAF

  • @anmol_official1519
    @anmol_official1519 Před 2 dny +41

    It's amazing what you do Adrian Ruthnik We need a lot of people with your skills and set who have good intentions and spread love

  • @rabbitinnh
    @rabbitinnh Před 3 měsíci +47

    It would be very unusual these days to find a front end application directly executing SQL against the back end database without going through some kind of API that abstracts and limits. This might have worked 15 years ago . .
    Essentially this has little to do with 2FA authentication and everything to do with hacking into a database.

    • @ysfchn
      @ysfchn Před 3 měsíci +10

      100% agree, it is misleading.

    • @hardscope7744
      @hardscope7744 Před 3 měsíci +1

      Exactly what ever any of these hacker channels showing is all bullshit it might of worked 15 years ago like you said but not today and if this stuff was true do you really think CZcams would let him post it I don’t think so 😂 not how this people can think that other people are so stupid is beyond me

    • @admiral44
      @admiral44 Před 3 měsíci +3

      I’m new into this field working on my certs and things and I appreciate y’all’s feedbacks on videos like these !

    • @kylelaker539
      @kylelaker539 Před 3 měsíci

      Some do have deprecated technology.😊

    • @portman8909
      @portman8909 Před 3 měsíci

      @@admiral44Enforce two step and put uBlock origin on every clients machine

  • @nuhuali8602
    @nuhuali8602 Před 3 měsíci +33

    This is a great example of how a vulnerable website can be compromised even when security controls are implemented. Interpreting query based information is a prominent skill, especially in a database that store large sets of data. 👏

    • @mattia222
      @mattia222 Před 3 měsíci +5

      security controls where not implemented. Sqlinjection is a very known issue.

    • @iamwitchergeraltofrivia9670
      @iamwitchergeraltofrivia9670 Před 3 měsíci

      I hate Security Control ob websites blocking Security Control for more malware Protection

  • @apristen
    @apristen Před 3 měsíci +31

    nice video for children, man! really appreciated!
    but first, IRL on production u usually won't get so verbose 5xx errors (if devops/developers are not too crazy ofc to open bugs for end user :-))) so your SQLi will be "blind SQLi", LOL! ;-)
    second, more and more systems nowdays use "prepared statements" for SQL, reliably isolate query itself from query parameters, which gives backend's code immunity to SQLi, sad (for hackers) but true.

  • @et_matrix
    @et_matrix Před 3 měsíci +42

    How can you store sensitive data without encrypted? As a backend developer, this doesn't make any sense.

    • @100gramsofdisapointment3
      @100gramsofdisapointment3 Před měsícem +1

      First, this is a lab and it is meant to be vulnerable. Secondly, most of the time you cannot encrypt the database itself, as this typically causes data corruption. You can store encrypted strings though and pass the encrypted strings with secure protocols (which is the safest bet). Even if it was a ciphered string, you can use tools like rainbow tables or john or even google-fu to decipher weak passwords like "password". The whole point of this is to show an example of a vulnerability. It is possible that an inexperienced developer, or recent update, broke encryption or stored the plain-text values. There are even more complicated versions of attacks but this is a good understanding of the basics of what a cyber security specialist looks for. Often times the puzzle is much more complicated and you really need to know your stuff in order to fully test something.

    • @nulljeroka
      @nulljeroka Před 6 dny

      As a Backend it should.

  • @HeyCossa
    @HeyCossa Před 2 měsíci +3

    It’s funny to see how some people over think and over complicate what hackers are actually doing

  • @spokentruth5909
    @spokentruth5909 Před 2 měsíci

    Are u just consistently pressing send in burp suite or a value then send?

  • @abhinavtiwari24
    @abhinavtiwari24 Před 3 měsíci

    Always ready for your video

  • @HackerCifish
    @HackerCifish Před 3 měsíci +16

    Video Suggestions:
    1. Video About wireshark And wifite
    2. Video on how to hack any pdf's password with "rockyou" wordlist
    3. Make a video about anonymity with kali "whoami"
    4. A video on how to dual boot Kali Linux
    5. A video a on BYOB Botnet
    6. Full tutorial about Burpsuite

  • @randomando9953
    @randomando9953 Před 2 měsíci

    Look who raised him. I'm not surprised he's stuck like Chuck 😂😂

  • @nieczerwony
    @nieczerwony Před 2 měsíci +1

    This is probably outdated as most platforms now are using like separate app.
    For example in FB/Messenger if I have login credentials to lets say my brother FB account, but I am trying to log in from my PC/Phone, he will have to confirm on his device.
    So eve if he has to put some PIN/QR it will only be possible from his device.
    My bank is using similar approach. If I try to log in from any other device< i will get pop up on my phone where I have to confirm and allow new device to connect.

  • @peterparker175
    @peterparker175 Před 3 měsíci +25

    if you have access to DB why you don't just turn off 2fa on the user account?

    • @Lamborghini35853
      @Lamborghini35853 Před 3 měsíci +7

      In my opinion, it will be suspicious for user, cause he previously has a protection and now It`s just disappear

    • @R3D_S3C
      @R3D_S3C Před 3 měsíci +6

      Because the goal is to be as inconspicuous and effective as possible. Removing a gate entirely would raise red flags and call attention to the intrusion.

    • @hechter80
      @hechter80 Před 2 měsíci

      Because he can only read the database, not modify it.. I think

  • @davidlu1003
    @davidlu1003 Před 3 měsíci

    Very cool. Thanks.😁😁😁

  • @AllINONE-yb2bo
    @AllINONE-yb2bo Před 2 měsíci

    Can we see safe folders image after remote access by Kali Linux pls pls reply sir

  • @jdbt7874
    @jdbt7874 Před 2 měsíci +1

    What if the valve is stored in the server's cache?

  • @user-wn4dk1xc3c
    @user-wn4dk1xc3c Před 3 měsíci

    very well from your good and nice techings Mr. loi can you tell we is there a way to download from payment websites without any paying thanks

  • @fairyroot1653
    @fairyroot1653 Před 3 měsíci +1

    I'm just interested in the py to extract the key from the QR code

  • @hellamean
    @hellamean Před 3 měsíci +3

    Well, a replay attack can be used to login without password or 2FA as well.

  • @pick_pick_pick
    @pick_pick_pick Před 2 měsíci

    Amazing one 🥰

  • @hinoTheCatto
    @hinoTheCatto Před 3 měsíci

    Learnings from this video:
    1. How to bypass 2fa
    2. hacker loi is very handsome

  • @Hello_-_-_-_
    @Hello_-_-_-_ Před 3 měsíci

    Excelent police work and freedom you gave. That boy looks genuinely sorry and regrets what he did

  • @medslyhenuk1430
    @medslyhenuk1430 Před 3 měsíci

    thx for sharing information

  • @user-sp9kl4vq1j
    @user-sp9kl4vq1j Před 3 měsíci

    Hi, Mr. Hackerloi! I am one of your CZcams writings and I come to help your video and are very good. Congratulations to the stather. Have one of your video with the title: How Hackers Hack With An Image Trojan? I tested on my computer with your class cripto did not give enough to cost me a crypt base and how to set up

  • @JimmyS2
    @JimmyS2 Před 3 měsíci

    I don't understand why the double )) in the union payload @5:54 ?

  • @underndogx5346
    @underndogx5346 Před 3 měsíci +2

    Thank you so much Master

  • @biggig8548
    @biggig8548 Před 3 měsíci

    Does this affect the use of hard tokens from a USB device and/or Yubikey etc? Are these stored in the same DB as well? I always thought hard tokens were the safer way to go instead of a google authenticator. Always enjoy and appreciate the videos!

    • @ysfchn
      @ysfchn Před 3 měsíci

      It depends on what do you mean by "hard tokens". Specifically speaking of Yubikeys, it supports multiple type of authentication methods, so storing TOTP accounts on Yubikey is not that much different from Google Authenticator or any application authenticator, you would just have a physical presence of your 6-digit codes with Yubikey. But since Yubikey's storage is write-only, you can't see your secrets in plain form after it is imported to Yubikey, so you just see the 6-digit codes that the secret is corresponding to, which naturally makes Yubikey safer.
      However, Yubikeys also provides a hardware-based OTP (HOTP), so in that scenario, the server just "validates" the token generated by the Yubikey (instead of checking the same 6-digit value that the same secret stored in DB corresponding to, as in TOTP) which it makes the one of the most secure authentication methods as of today. Unfortunately, not all websites which supports 2FA allows registering a security key (or passwordless sign-in), they sometimes support TOTP as the only 2FA option as in the example website shown in this video.
      Also, even hardware authenticators are used, when the server's database is exposed once, it might be a risk still because since the database basically contains your user data, even if hacker couldn't sign in your account they can still access your leaked info without signing in, so I believe it doesn't even matter much anyway which 2FA method you choose in that scenario like this. Not saying that hardware authenticators doesn't change anything, they are obviously always more secure than other options!
      And since most-popular websites are protected enough to prevent easy attacks like SQL injection, getting full access to the database is very less likely in today (it probably would work in ancient websites like in 10+ years ago), so don't be confused by this video. Even with a time-based tokens (TOTP), you are usually still safer than having no 2FA, it is just not that super-safe when compared to hardware-based tokens.
      Hope this is helpful!

    • @valkaielod
      @valkaielod Před 2 měsíci

      They work exactly the same way in case you use TOTP. You just store the shared key on the hardware instead of the phone.

  • @pdebian
    @pdebian Před 2 měsíci

    Por favor, adicione faixa de áudio nos seus vídeos. Vai ajudar muito a gente entender melhor.

  • @043-namanvora2
    @043-namanvora2 Před 3 měsíci

    thank you sensai

  • @MrDoesntUpload001
    @MrDoesntUpload001 Před 2 měsíci

    Thank you Mr. Hacker Loi.

  • @gpppp910
    @gpppp910 Před 3 měsíci +1

    So to bypass 2fa you'd need a sql injection? That's not a 2fa bypass sir, that's just a misleading title. It's already game over when you can extract arbitrary data from the database.

  • @garyng2000
    @garyng2000 Před 2 měsíci

    who would design a backend like that ? sounds like high school project to me :-)

  • @almoh
    @almoh Před 2 měsíci

    To setup 2FA, first you need to have the password? if you already have the hackerwhateverpassword, the account is already compromised?

    • @killerfreefire3727
      @killerfreefire3727 Před 2 měsíci

      The first part of video was an example of how 2FA generally works. Qr code image gives us a secret token that we can use to bypass 2FA, then in the video shows that with SQL injection we get this token from the database

  • @gko_0844
    @gko_0844 Před 2 měsíci

    Dude how many camera you have?

  • @cookiigames
    @cookiigames Před 3 měsíci

    That’s happening because the developer didn’t use an orm.

  • @tutacat
    @tutacat Před 2 měsíci

    Actually, most TOTP implementations give you a few seconds leeway

  • @benardmumba3338
    @benardmumba3338 Před 3 měsíci +2

    And boom Harker loi...

  • @Sxhib_space
    @Sxhib_space Před 3 měsíci

    Sir pls next video on how to find and bypass admin panel of any website.

  • @sharma_bhavishya
    @sharma_bhavishya Před 3 měsíci +4

    Yo, you doing some crazy work ngl ☝️🔥

  • @discfree1
    @discfree1 Před 3 měsíci

    Hacking is not in it self not illegal, only when you do it in the wrong way. like destory stuff.

  • @aburilusbroadcast
    @aburilusbroadcast Před 3 měsíci +2

    Please make a video with how a hacker bypass my 2FA provided by my Yubikey. :) Thanks!

    • @valkaielod
      @valkaielod Před 2 měsíci

      They do not need your Yubikey if they can get the TOTP key stored on it from the server.

    • @aburilusbroadcast
      @aburilusbroadcast Před 2 měsíci

      @@valkaielod I don't talk about a TOTP code provided by Yubikey. I talk about 2FA provided by hardware key Yubikey itself (aka they need my key to plug in to their USB port and touch the key). How can they bypass this?

    • @valkaielod
      @valkaielod Před 2 měsíci

      @@aburilusbroadcast That is FIDO2. They can't bypass it unless there is a vulnerability in the chip and they have access to it. Or they exploit the web application.

    • @valkaielod
      @valkaielod Před 2 měsíci

      @@aburilusbroadcast It seems like YT ate my comment. Bypassing the FIDO2 auth used in that scenario is not trivial at all. You either need a vulnerability in the chip YK uses or compromising the server side.

  • @user-nh1en4cq3k
    @user-nh1en4cq3k Před 3 měsíci +1

    The video is all over the place

  • @godalfred2266
    @godalfred2266 Před 3 měsíci +3

    Question:-
    Is it possible to brute force the 6 digit authentication code with graphic cards or with anything else in Cybersecurity ?

    • @Kalreni
      @Kalreni Před 3 měsíci

      @@yt_brij Proxies exists

    • @lainiw4kura
      @lainiw4kura Před 3 měsíci +3

      usually the passcodes refresh and change every minute

    • @PCs454
      @PCs454 Před 3 měsíci +1

      yes you can but they expire after like 1 minute

  • @anitasaini527
    @anitasaini527 Před 2 dny

    Amazing job! Adrian Ruthnik I wasn’t able to see my account name at first because the name was changed. Also I really valued this information but thanks Jon even tho it showed a lots of error at my ends you still tried in helping fixing it. Happy I got it back y’all.

  • @AliHussain-mt9vn
    @AliHussain-mt9vn Před 3 měsíci

    Can make another video about android RAT because most of the old so they don't work

  • @harishverma6474
    @harishverma6474 Před 2 dny

    As a person and professional you couldn't get any better than Adrian Ruthnik is a very reliable person and an excellent professional in the IT field. He is the type of person you want to work that's passionate, hardworking and knowledgeable. You’re The Best 100%

  • @invt.duanecage555
    @invt.duanecage555 Před 3 měsíci +2

    Some of y'all haven't even watched the video but already liking it

    • @Hello_-_-_-_
      @Hello_-_-_-_ Před 3 měsíci +4

      Bc we know it's going to be quality content.

    • @abdou.the.heretic
      @abdou.the.heretic Před 3 měsíci

      Freedom, funny how that works.

    • @invt.duanecage555
      @invt.duanecage555 Před 3 měsíci +1

      @Hello_-_-_-_ and indeed, it was great

    • @invt.duanecage555
      @invt.duanecage555 Před 3 měsíci

      @@abdou.the.heretic true talk

    • @gvagear
      @gvagear Před 3 měsíci

      yes, you can like it, and after watching you can decide to keep it or revoke it. some ads and autoplay feature will navigate you elsewhere on video end, so it is a best practice to like earlier.

  • @user-fw2gu9rj3f
    @user-fw2gu9rj3f Před 2 dny

    Your work speaks volumes of the kind of man you are. efficient, organized and result oriented well done , Adrian Ruthnik you're soo good at what you do

  • @MesmerBaas
    @MesmerBaas Před 2 měsíci

    This has nothing to do with 2FA, this is just sql injection. If the company is boneheaded enough to store sensitive information undirectly without hashing it you can query everything including yes 2FA. Enterprise setups are not as easy as this.

  • @Krmpfpks
    @Krmpfpks Před 3 měsíci

    Newsflash: If you can access the database there is very little reason to even bother accessing the website frontend.

  • @LOMOKA25
    @LOMOKA25 Před 2 měsíci

    hello can you help me skip the website

  • @GothSomnia
    @GothSomnia Před 2 měsíci

    Hello, I'm seeking assistance with a matter of significance to me. I recently added an external hardware component to my motherboard known as a DMA (Direct Memory Access). In the device manager, it is listed as such. However, it is crucial for me to conceal and present it as a different device to appear legitimate. Specifically, I aim to mask it from the system.
    I'm in need of a firmware solution that can spoof this DMA card, essentially hiding it by integrating it into the firmware to mimic a standard PC component. The objective is to make the DMA indistinguishable from other regular hardware components Furthermore, I am looking for a firmware tailored uniquely for my use, ensuring exclusivity. Unfortunately, I lack experience in this domain, making comprehensive assistance invaluable to me.

  • @ProfessorMoon6
    @ProfessorMoon6 Před 2 měsíci

    any promo code for your courses ? :)

  • @PradeepVerma-zm8pp
    @PradeepVerma-zm8pp Před 2 dny

    Incredible efforts by Adrian Ruthnik I'll be transparent - distinguishing between legitimacy and legality can be tricky for many. Grateful for the assistance with my account - it's back in my hands. Keep up the commendable work, aiming to minimize the impact caused by the system. We could use more individuals like Jon in our world.

  • @patwhocares7009
    @patwhocares7009 Před 3 měsíci

    First thing you learn is never trust user input and never ever show the query (maybe in debug mode when you are the only one that can see it, but never ever in production) . What kind of losers programmed this and what idiots approved it for production? These are mistakes i did when i first started 25 years ago as a rookie.

  • @invt.duanecage555
    @invt.duanecage555 Před 3 měsíci +3

    Mind-blowing

  • @samsepiolz
    @samsepiolz Před 3 měsíci +1

    how can this work on modern systems?

  • @rajudebnath2039
    @rajudebnath2039 Před 2 dny

    Having you as my support has been one of the best things I’ve ever decided on, Adrian Ruthnik . Your assistance has made my tasks smoother and more manageable. I deeply appreciate the favor you’ve extended to me. Thank you, my friend. Your presence has made this entire process much more comfortable, and I am truly grateful for it. Working alongside you is a pleasure, and your dedication to your role serves as an inspiration to me. I will always remember the help and support you’ve provided me with.

  • @user-hg7xs5hv6j
    @user-hg7xs5hv6j Před 3 měsíci

    wow got here 31min after posted

  • @NaitikRoul-wj6vf
    @NaitikRoul-wj6vf Před 2 dny

    Big thanks Adrian Ruthnik for helping me out. God bless you brotha... I've tried following these steps from the device and location where the account was always logged into and I got a page that says we don't recognize your device. The tutorial video was not helpful tho but Big Ups Jon

  • @user-ds7yp9yx8o
    @user-ds7yp9yx8o Před 3 měsíci

    Please say more on /etc/apt/sources.list Unable to locate package Not even to update kali Linux download nothing in here seems working

  • @AbsoluteDegens
    @AbsoluteDegens Před 3 měsíci +7

    In this example, you had the password and email, and the 2fa wasn't needed, you set up the 2fa after you had access to the account? Im confused.

    • @kibetandrew5622
      @kibetandrew5622 Před 3 měsíci +2

      😂

    • @ferasm96
      @ferasm96 Před 3 měsíci

      Because the whole video is about bypassing 2fa through extracting the token key

  • @MalevolentJJK
    @MalevolentJJK Před 2 měsíci

    Can we do it for Gmail.

  • @usr808
    @usr808 Před 3 měsíci +2

    has anyone ever tried to hack loi liang yang?

  • @rajnisoni5815
    @rajnisoni5815 Před 2 dny

    People dream of hiring such a talented expert like you. Keep up the hard work. Thank you so much for your dedication in this process. Thank you for your commitment to your job. Your outstanding performance helped our me alot. Thank you once again for your hard work and dedication.

  • @Tatsujin-Senshi-Samuraibushid0

    Your search parameter is vulnerable =) In other cases, you will bypass my socks :D Yeah, this is an example, sure. :)

  • @Prdimznova
    @Prdimznova Před 3 měsíci

    what is a good countermeasure besides fixing vulnerabilities? Store TOTP in another DB or encrypt it?

    • @patwhocares7009
      @patwhocares7009 Před 3 měsíci +3

      Simple, do not send sql info and do not trust input from a user always sanitize so even if, for some reason, they tried sql injection, it will fail. This is amateur stuff when you know nothing about programming and just started. And this is just clickbait.

  • @user-nh1en4cq3k
    @user-nh1en4cq3k Před 3 měsíci +1

    When you explain you assume we know some of the stuff …. You should explain like we never heard of it ……

  • @vikinator5371
    @vikinator5371 Před 3 měsíci

    This works on ubisoft?

  • @Live360bdTV
    @Live360bdTV Před 3 měsíci

    I can't login my Facebook account due to , 2factor automatic app . Can you help me 😭

  • @GAMEGLITCHER99
    @GAMEGLITCHER99 Před 3 měsíci

    damn i will be using this sometime

  • @mit5478
    @mit5478 Před 2 dny

    Adrian Ruthnik . I really appreciate your efforts and dedication towards the work. May God bless you to keep showing your worth and skills like this in the future

  • @imadlatch7206
    @imadlatch7206 Před 2 měsíci

    No encryptions, no email validations, no input validation, even my little boy can hack it

  • @cerealpeer
    @cerealpeer Před 3 měsíci

    just strip and report with xss

  • @user-ir9el4be8v
    @user-ir9el4be8v Před 2 dny

    I'm just a simple person from Switzerland, but I want to know how awesome it is what you did and what you do Adrian Ruthnik . I found it difficult to do the steps by myself, thanks to you for being a life saver. I'm really happy seeing his name everywhere in the comments. It says a lot about his good work

  • @nazarsukkar5809
    @nazarsukkar5809 Před 3 měsíci

    I wanna bypass my outlook email 2FA any suggestions?

  • @Jig12693
    @Jig12693 Před 3 měsíci

    Helo sir I also want to learn programming and can u plz teach me plz sir I beg u.

  • @user-or4xz4jo9m
    @user-or4xz4jo9m Před 2 dny

    Honestly, Adrian Ruthnik I'm amazed by your consistent ability to deliver exceptional work every single time. Your willingness to lend a helping hand during my time of need is deeply appreciated. Thank you for your support and kindness.. I take pride in your capability to overcome any challenge and consistently achieve outstanding results regardless of the circumstances.

  • @Girdharisingh-lw5gk
    @Girdharisingh-lw5gk Před 2 dny

    In my case, I had no image of myself on it which clearly stated I am a step behind. Adrian Ruthnik was God’s sent. I appreciate your tireless efforts in assisting me with the account recovery. Your professionalism and commitment to finding a solution were evident at every step. Thank you for making the process efficient and effective.

  • @DavidStringham
    @DavidStringham Před 3 měsíci

    You're just making clickbait at this point, aren't you? Like websites with 2FA would have database vulnerabilities.

  • @MausamKumar-ui5bb
    @MausamKumar-ui5bb Před 2 dny

    I’ll forever be grateful to you for who you are, what you did. Thank you Adrian Ruthnik Thanking you for your support, love, and care to your duties. You are indeed a blessing me. Thank alot buddy i will always remember your good did towards me

  • @MrColinTee1
    @MrColinTee1 Před měsícem

    Can you help me bypass my own 2FA for Facebook? I lost google authenticator when I had my mobile phone stolen.

    • @anabella4266
      @anabella4266 Před 23 dny

      Are you ready to get this situation solved right away ???…. I have an expert for it..😅

    • @anabella4266
      @anabella4266 Před 23 dny

      I was also in similar situation but the same expert helped me out… He is *Tischler tech*

    • @anabella4266
      @anabella4266 Před 23 dny

      *Tischler tech* is a cyber security expert. Only him can look into this situation and get it back.

    • @anabella4266
      @anabella4266 Před 23 dny

      He has over 9k followers???.

  • @codewithlaghari
    @codewithlaghari Před 3 měsíci

    Title: Union based SQL Injection 😂

  • @shsh-xk4hi
    @shsh-xk4hi Před 2 měsíci

    how to hack any bluetooth devices or speakers ?

  • @samuelogoti254
    @samuelogoti254 Před měsícem +1

    i got nothing here...i just watched

  • @desibalakup86
    @desibalakup86 Před 2 dny

    Kindly let me to express my sincere gratitude for the exceptional support and dedication Adrian Ruthnik provided in helping me with business account. Your willingness to go above and beyond, investing additional time and effort, has been invaluable to me. The meticulous attention to detail and unwavering commitment you demonstrated throughout this process is truly commendable. Thank you from the bottom of my heart for your outstanding assistance.

  • @gomeztorricellygomez7808
    @gomeztorricellygomez7808 Před 2 měsíci

    All passwords in a database should be encrypted...