It's better to use $gte instead of $gt operator because even some database contains 'spaces' as passwords and also $gte operator gives specifications.
@World_isfullof_toolkits3 жыл бұрын
Now many of the interviewer's after watching this, will ask this as question. And happily interviewee will answer the same..... Life goes on and hacks do work.❤️
@techietouche8772 жыл бұрын
She is good but underrated.
@gjsatru33833 жыл бұрын
Great Farrah I have been following in insta great to see you are now active in yt as well
@AyushKumar-hv2ww3 жыл бұрын
It is very good topics, there are many benefits for those who are really starting their career in cyber security.
@souvickdas55643 жыл бұрын
Great content, great explanation. Please make videos more frequent. We always wait to see new contents.
@cyberdragon93553 жыл бұрын
No SQL injection will work on mongo db or other dbs ?
@ushan_gunarathna2 жыл бұрын
Can someone tell me how to run this goof application
@akshaykumar-wd8jc2 жыл бұрын
Getting so many errors while installing goof vulnerable app. could you please do a video about how to install and configure goof
@mindreader39473 жыл бұрын
Thanks for awesome tutorial. Ma'am you should keep consistency
@FarahHawa3 жыл бұрын
I will try my best!
@mindreader39473 жыл бұрын
@@FarahHawa Thanks again.
@mrigakshigoel78133 жыл бұрын
Great explanation 👌
@urbancod3r3 жыл бұрын
Little correction in User.find({ ...logindetails }, function(err, users) ) explanation you are not passing values into the function(err, users), it a callback function that will return data after the database call is complete, in users named variable if successful(JavaScript is single threaded and its a async call that's why callback function is there), Find() query returns an array so that's why in if block its checking the array length.
@closed8483 жыл бұрын
Good content sister ❤😍
@pratiksingh44573 жыл бұрын
Great content didi👍👍
@tempestboya27833 жыл бұрын
Hi, would you be kind enough to let me know which Microphone you use for recordings as your voice is crystal clear and I would like to get one for my WFH meetings.
@FarahHawa2 жыл бұрын
Was using the boya M1 for this video
@krishnakumar-vl4qy3 жыл бұрын
Di kaha se start kare Cyber security me aur kaun sa first language sikhe
@Roney773 жыл бұрын
Beautiful explaination❣️
@johnwyck94823 жыл бұрын
Mam, can u suggest a good laptop for both coding and pubg+ cod+ cyberpunk+ gta 5,plz plz plz plz
@xxehacker3 жыл бұрын
Thank you ma'am ❤️
@ronit30143 жыл бұрын
Cool Voice 💕🌼🌿
@singerabantika20443 жыл бұрын
Loved it ❤️🥳🤩
@ajmaln733 жыл бұрын
i think this method will not work in hashed passwords, do they?
@akshaykumar-wd8jc2 жыл бұрын
It still works
@omjha903 жыл бұрын
Thanku ma'am ❤️👍
@masti2point03 жыл бұрын
Very helpful mam 😊
@balaamuthan64083 жыл бұрын
Here u know the source code.So u find attack vector but what about in real-time application.how I get this source code of real time Web app
@FarahHawa3 жыл бұрын
we don't need to analyze the code to find the bug. I showed it in this video so we can understand why we used a certain payload.
@balaamuthan64083 жыл бұрын
@@FarahHawa in real-time app, whether we need to try with different payload using intruder
@user-eh7wm2cz4m3 жыл бұрын
Aap inspiration ho do🤗
@cyrexplays50313 жыл бұрын
Sis waiting for prototype pollution pls❤️❤️❤️❤️
@lordsalisbury13 жыл бұрын
Either I'm getting ridiculously old or pentesters are getting ridiculously young.
@shelldreddTV3 жыл бұрын
Great video, allways hack!!
@tanmaydebnath69173 жыл бұрын
I think if you chose some simple words instead of technical terms it will be easier to understand for us
@FarahHawa3 жыл бұрын
That’s what I try to do as much as possible. But I’ll look into improving it for future videos!