How Hackers Login To Any Websites Without Password?!

preview_player
Показать описание
// Membership //

// Courses //

// Books //

// Social Links //

// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
Рекомендации по теме
Комментарии
Автор

It's a good day when hacker loi uploads.

iqlessmemes
Автор

Interesting video. However….

1. The IP address used in the video, is PRIVATE. Which means the server is on the same private network and probably NOT behind a firewall… therefore unrealistically easy to access.

2. Only completely incompetent people open up all ports to all IP addresses of a server facing the Internet. This is the kind of thing that would get someone fired immediately.

3. Most user names and passwords ( actually hashed passwords ) are stored in databases. Storing plaintext or encrypted passwords, goes against best practices.

4. Most password inputs check for the length ( is it too short or too long ) and content ( does it have numbers, lowercase, uppercase ) of the password BEFORE attempting to validate the password.


Nice video, but too many red flags for me.

gauntletwielder
Автор

No trash talk, right into the topic nice vid man

theunveil
Автор

It's more complex than what he teach. Especially when you meet firewalls, other protection system timing.

FRUITSparty
Автор

THE REAL LESSON : Find the login access port, look for vulnerabilities (of overall system), exploit the vulnerability, when shell runs move on dir to find the login access system, look for config file of the login system, get credentials, HACK COMPLETE. 😄

NB : the system doesn't need to be running services you saw on the video only to be hackable, its a process learn and understand it, then apply steps on any machine. The lesson here is to understand the concept ((technical steps)) not to learn about a new vulnerability. Many systems have different services therefore the ((technical steps)) will remain the same but dealing with different machines, services and vulnerabilities.

moabifokotsane
Автор

How many servers are inside your own firewall, has passwords stored in plain text and all ports open and would accept an the hash rather than the password?

This is like "opening a door without a key" when the door is a shower curtain.

alexanderohman
Автор

Loi, thanks for another brilliant tutorial sir!

juliusrowe
Автор

I wish you uploaded this two weeks ago. lol you taught me everything me prof did not in under 7 mins and he had a whole semester lol This is exactly what we did on the final even down to the elastics. makes me want to fire up Linux rn lol very informative thank you.

tourreallen
Автор

Really enjoyed the shorter video format here. Keeps things simple

FzEdits
Автор

i watched many of your videos, live demostrations, etc, i knew that you are an expert... Interesting...

Franciscolney
Автор

Downloading this video so by chance if YouTube delete it I can watch again 😆🤣

zengsk
Автор

No Firewalls and no IP Tables setup on the servers, interesting.

gesnow
Автор

help me( i stucked at Started reverse TCP handler in metasploit)help me

Deepu
Автор

Your awesome!! Love the videos you make

Goldindollar
Автор

I mean, you got yourself a meterpreter shell on the server. Why tf you would after that need to login to a random whatever service that the server is hosting ?

seiv-
Автор

hacker loi why have you not been uploading 😭😭😭 my kali linux is running i have nothing to do

kamraman
Автор

Informative and brief...

Well Done...

TruthSeeker
Автор

You can never take a chance to skip loi's

ronitdhase
Автор

Hi, sir can you give us a road map in hacking field like what we learn first and how we become a successful hacker

sushant
Автор

Sudo msfconsole need a passwd and where we can find this passwd ?.if we target a machine is it posible that we know the msfconsole passwd ?

wahyono