How Hackers Bypass Two-Factor Authentication (2FA)?!

preview_player
Показать описание
// Membership //

// Courses //

// Books //

// Social Links //

// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
Рекомендации по теме
Комментарии
Автор

Hey ppl, I'm a retired computer/IT person, Yet I still find *Firm tech Recovery* so informative and straight forward. Thanks for your advise and helping the work and love watching.

_Jlou_DeDywKa_
Автор

What side are you on as Metaspyclub divides the wealthy from the poor?

Greyyyjohnson
Автор

There is no doubt that you will rise fast at the apex of your career *Firm tech Recovery* . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of IMpossible by becoming PRO at tackling PROblems. You Rock!

Olena
Автор

so at the end it was actually a sql injection

VictorMartins
Автор

I just wanted to say thank you for sharing this. Because you're right. The worst thing that you can feel is hopelessness. And I hope that someone who is on the verge of losing hope finds *firm tech recovery* and realizes that as long as you're still alive and breathing, there's a chance, there's HOPE that the future is brighter then the present day.

رناجاويش-هت
Автор

Came here after LinkedIn and Steam with 2FA got hacked. This is insightful, thank you

SakataSamig
Автор

Amazing job! *Firm tech Recovery* I wasn’t able to see my account name at first because the name was changed. Also I really valued this information but thanks Jon even tho it showed a lots of error at my ends you still tried in helping fixing it. Happy I got it back y’all.

lunamoon
Автор

Having you as my support has been one of the best things I’ve ever decided on, *Firm Tech Recovery* . Your assistance has made my tasks smoother and more manageable. I deeply appreciate the favor you’ve extended to me. Thank you, my friend. Your presence has made this entire process much more comfortable, and I am truly grateful for it. Working alongside you is a pleasure, and your dedication to your role serves as an inspiration to me. I will always remember the help and support you’ve provided me with.

neutralisland
Автор

It would be very unusual these days to find a front end application directly executing SQL against the back end database without going through some kind of API that abstracts and limits. This might have worked 15 years ago . .

Essentially this has little to do with 2FA authentication and everything to do with hacking into a database.

rabbitinnh
Автор

Video Suggestions:

1. Video About wireshark And wifite
2. Video on how to hack any pdf's password with "rockyou" wordlist
3. Make a video about anonymity with kali "whoami"
4. A video on how to dual boot Kali Linux
5. A video a on BYOB Botnet
6. Full tutorial about Burpsuite

HackerCifish
Автор

This is a great example of how a vulnerable website can be compromised even when security controls are implemented. Interpreting query based information is a prominent skill, especially in a database that store large sets of data. 👏

nuhuali
Автор

Hey ppl, I'm a retired computer/IT person, Yet I still find Adrian Ruthnik so informative and straight forward. Thanks for your advise and helping the work and love watching.

Ravigamer
Автор

How can you store sensitive data without encrypted? As a backend developer, this doesn't make any sense.

et_matrix
Автор

Hey ppl, I'm a retired computer/IT person, Yet I still find *sentinel Recover* so informative and straight forward. Thanks for your advise and helping the work and love watching.

Keshabchandrasahoo-hzqx
Автор

Hail the champion of professional decorum, whose unwavering attention to detail and commitment to excellence set the bar higher and higher. You helped me a lot *Firm tech Recovery* ... I got back my account that was hacked, if it wasn't for your help I wouldn't have succeeded... Thank you very much

АлексейИванов-уир
Автор

The efficiency of this Adrian Ruthnik is next level. To juggle walk throughs of various angles on the topic delivered to-camera, differnet content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense taccess like this so digestible is really something. Awesome work jack!!

MohitMishra-fncm
Автор

Congratulations, Adrian Ruthnik I am relieved that you are out there fighting these thugs, We musttake every precaution to protect the elderly and the general public from these despicable con artists. Congratulations to You!! You deserve the Nobel Peace Prize for ensuring our security.

parthroy
Автор

I’ll forever be grateful to you for who you are, what you did. Thank you *Firm tech Recovery* Thanking you for your support, love, and care to your duties. You are indeed a blessing me. Thank alot buddy i will always remember your good did towards me

Madistka
Автор

nice video for children, man! really appreciated!
but first, IRL on production u usually won't get so verbose 5xx errors (if devops/developers are not too crazy ofc to open bugs for end user :-))) so your SQLi will be "blind SQLi", LOL! ;-)
second, more and more systems nowdays use "prepared statements" for SQL, reliably isolate query itself from query parameters, which gives backend's code immunity to SQLi, sad (for hackers) but true.

apristen
Автор

My dear, *Firm tech recovery* I’m so impressed by your progress. I have faith in you, and I hope you’ll be able to do more and better quality job for others in the future. Keep it up! Jon All your hard work and dedication have paid off. You are an inspiration to other Expertise like you. Thanks for your great job. I’m proud of your achievement

ТатьянаКуренная-оз