How Hackers Bypass Two-Factor Authentication (2FA)?!

  Рет қаралды 103,925

Loi Liang Yang

Loi Liang Yang

3 ай бұрын

// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/course/full-web...
Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
Full Mobile Hacking Course: www.udemy.com/course/full-mob...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangyang.com
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

Пікірлер: 306
@MohitMishra-fn6cm
@MohitMishra-fn6cm 10 күн бұрын
The efficiency of this Adrian Ruthnik is next level. To juggle walk throughs of various angles on the topic delivered to-camera, differnet content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense taccess like this so digestible is really something. Awesome work jack!!
@AnnuRai-ft8xi
@AnnuRai-ft8xi 10 күн бұрын
Everyone should have a dedicated person like you Adrian Ruthnik .
@parthroy8579
@parthroy8579 10 күн бұрын
Congratulations, Adrian Ruthnik I am relieved that you are out there fighting these thugs, We musttake every precaution to protect the elderly and the general public from these despicable con artists. Congratulations to You!! You deserve the Nobel Peace Prize for ensuring our security.
@Greyyyjohnson
@Greyyyjohnson 3 ай бұрын
What side are you on as Metaspyclub divides the wealthy from the poor?
@NariahHart
@NariahHart 3 ай бұрын
i just got my twitter back thanks to metaspyclub
@RamonaEvans-jx3pt
@RamonaEvans-jx3pt 3 ай бұрын
if you need assistance just look up metaspyclub
@JushawnHarper
@JushawnHarper 3 ай бұрын
i got back my Gmail thanks to metaspyclub
@YourBuddyMrcoat
@YourBuddyMrcoat 3 ай бұрын
Wait, what is happening?
@MallikarjunK-mp4fs
@MallikarjunK-mp4fs 10 күн бұрын
We need more immeasurably wise and compassionate humans like you on this planet. Thank you for sharing Adrian Ruthnik , Jon. I bet I'm not alone when I say this video found me at the perfect moment, and there are a lot of things here that I needed to hear right now.
@abishekabishek728
@abishekabishek728 10 күн бұрын
Account of mine also got hacked and I followed the method as explained in this video but I'm unable to proceed after recording the selfie video. Thank you Adrian Ruthnik. It brings me immense joy to witness his name appearing frequently in comments, a clear indication of the commendable work he’s been doing.
@ramjittudu7761
@ramjittudu7761 10 күн бұрын
My account also got hacked and I followed the method as explained in this video but I'm unable to proceed after recording the selfie video. Thank you Adrian Ruthnik . I'm really happy seeing his name everywhere in the comment. It really says a lot about his good work.
@banajkumarmohapatra6266
@banajkumarmohapatra6266 10 күн бұрын
I'm a Maldives born and living in UK and I cannot express enough how much I despise these scumbags. Literally whenever people ask me my nationality I just tell them I'm British because idiots like these give us a horrendous reputation, not to also mention they scam other Europeans too. It warms my heart to see stuff like this, please Adrian Ruthnik keep up the great work destroying these scammers!!!
@KrishnaBabuVishwKarma
@KrishnaBabuVishwKarma 10 күн бұрын
It just kept glitching on me when I tried this video tutorial so firstly I would say thank you for the video and secondly, thank you Adrian Ruthnik meeting you was a blessing in disguise keep up with the good work I'm sure a lot of people will be needing your assistance iin the nearest future after seeing this
@PhulmoniMondal-cb2lq
@PhulmoniMondal-cb2lq 10 күн бұрын
Y’all should stop calling everything “the bare minimum” when it’s literally not. Respect is the bare minimum, actually going out of your way to comfort and have an open ear for someone isn’t. Doing something like this is truly very nice and a great thing of him to do. I hope shit gets better for you and I salute Adrian Ruthnik for being mature when it’s needed!
@anmol_official1519
@anmol_official1519 10 күн бұрын
It's amazing what you do Adrian Ruthnik We need a lot of people with your skills and set who have good intentions and spread love
@Ravigamer4
@Ravigamer4 10 күн бұрын
Hey ppl, I'm a retired computer/IT person, Yet I still find Adrian Ruthnik so informative and straight forward. Thanks for your advise and helping the people...........Great work and love watching.
@uzmaarshi481
@uzmaarshi481 10 күн бұрын
Having someone like you who’s not only a great innovator but also pulls his best to get the work done so beautifully needs nothing but appreciation. Adrian Ruthnik Thanks for the well off work you consistently bring your all and I truly appreciate that. Thank you for making corporate life so smooth. Proud to have you on our team. Great work as always.
@Satishkushwahs94
@Satishkushwahs94 10 күн бұрын
Thank you, Adrian Ruthnik for consistently being so approachable and open-minded. Your friendly demeanor and willingness to listen and understand serve as a constant source of motivation. Your support and guidance have been especially meaningful to me during the recent account issue I encountered. Your willingness to assist and offer valuable advice speaks volumes about your character and the supportive environment you cultivate. I’m incredibly grateful to have someone like you. Your assistance played a crucial role in resolving the issue and getting my account back.
@VictorMartins239
@VictorMartins239 3 ай бұрын
so at the end it was actually a sql injection
@hellamean
@hellamean 3 ай бұрын
Exactly
@patwhocares7009
@patwhocares7009 3 ай бұрын
Which is kind of an amateur move.
@BigTurtleMane
@BigTurtleMane 3 ай бұрын
@@patwhocares7009”amateur” but effective, like keyloggers
@abdulrahmanfaisal5969
@abdulrahmanfaisal5969 3 ай бұрын
@@patwhocares7009 exaclty cuz his channel is sh*t it just teaches some nonsense stuff for beginners additionally it won’t benefit anyone
@amanokinji6220
@amanokinji6220 3 ай бұрын
Yeah, if we can execute this level of injection then, the company is a lost cause 😂, its always thing with WAF
@et_matrix
@et_matrix 3 ай бұрын
How can you store sensitive data without encrypted? As a backend developer, this doesn't make any sense.
@100gramsofdisapointment3
@100gramsofdisapointment3 2 ай бұрын
First, this is a lab and it is meant to be vulnerable. Secondly, most of the time you cannot encrypt the database itself, as this typically causes data corruption. You can store encrypted strings though and pass the encrypted strings with secure protocols (which is the safest bet). Even if it was a ciphered string, you can use tools like rainbow tables or john or even google-fu to decipher weak passwords like "password". The whole point of this is to show an example of a vulnerability. It is possible that an inexperienced developer, or recent update, broke encryption or stored the plain-text values. There are even more complicated versions of attacks but this is a good understanding of the basics of what a cyber security specialist looks for. Often times the puzzle is much more complicated and you really need to know your stuff in order to fully test something.
@nulljeroka
@nulljeroka 14 күн бұрын
As a Backend it should.
@rabbitinnh
@rabbitinnh 3 ай бұрын
It would be very unusual these days to find a front end application directly executing SQL against the back end database without going through some kind of API that abstracts and limits. This might have worked 15 years ago . . Essentially this has little to do with 2FA authentication and everything to do with hacking into a database.
@ysfchn
@ysfchn 3 ай бұрын
100% agree, it is misleading.
@hardscope7744
@hardscope7744 3 ай бұрын
Exactly what ever any of these hacker channels showing is all bullshit it might of worked 15 years ago like you said but not today and if this stuff was true do you really think KZbin would let him post it I don’t think so 😂 not how this people can think that other people are so stupid is beyond me
@admiral44
@admiral44 3 ай бұрын
I’m new into this field working on my certs and things and I appreciate y’all’s feedbacks on videos like these !
@kylelaker539
@kylelaker539 3 ай бұрын
Some do have deprecated technology.😊
@portman8909
@portman8909 3 ай бұрын
@@admiral44Enforce two step and put uBlock origin on every clients machine
@nuhuali8602
@nuhuali8602 3 ай бұрын
This is a great example of how a vulnerable website can be compromised even when security controls are implemented. Interpreting query based information is a prominent skill, especially in a database that store large sets of data. 👏
@mattia222
@mattia222 3 ай бұрын
security controls where not implemented. Sqlinjection is a very known issue.
@iamwitchergeraltofrivia9670
@iamwitchergeraltofrivia9670 3 ай бұрын
I hate Security Control ob websites blocking Security Control for more malware Protection
@apristen
@apristen 3 ай бұрын
nice video for children, man! really appreciated! but first, IRL on production u usually won't get so verbose 5xx errors (if devops/developers are not too crazy ofc to open bugs for end user :-))) so your SQLi will be "blind SQLi", LOL! ;-) second, more and more systems nowdays use "prepared statements" for SQL, reliably isolate query itself from query parameters, which gives backend's code immunity to SQLi, sad (for hackers) but true.
@peterparker175
@peterparker175 3 ай бұрын
if you have access to DB why you don't just turn off 2fa on the user account?
@Lamborghini35853
@Lamborghini35853 3 ай бұрын
In my opinion, it will be suspicious for user, cause he previously has a protection and now It`s just disappear
@R3D_S3C
@R3D_S3C 3 ай бұрын
Because the goal is to be as inconspicuous and effective as possible. Removing a gate entirely would raise red flags and call attention to the intrusion.
@hechter80
@hechter80 3 ай бұрын
Because he can only read the database, not modify it.. I think
@spokentruth5909
@spokentruth5909 2 ай бұрын
Are u just consistently pressing send in burp suite or a value then send?
@HeyCossa
@HeyCossa 3 ай бұрын
It’s funny to see how some people over think and over complicate what hackers are actually doing
@AllINONE-yb2bo
@AllINONE-yb2bo 3 ай бұрын
Can we see safe folders image after remote access by Kali Linux pls pls reply sir
@jdbt7874
@jdbt7874 3 ай бұрын
What if the valve is stored in the server's cache?
@HackerCifish
@HackerCifish 3 ай бұрын
Video Suggestions: 1. Video About wireshark And wifite 2. Video on how to hack any pdf's password with "rockyou" wordlist 3. Make a video about anonymity with kali "whoami" 4. A video on how to dual boot Kali Linux 5. A video a on BYOB Botnet 6. Full tutorial about Burpsuite
@user-ni5bp3sb7w
@user-ni5bp3sb7w 3 күн бұрын
I used to be so obsessed with learning.... ❤️Now i an professional and now i understand everything u say 🥺
@user-wn4dk1xc3c
@user-wn4dk1xc3c 3 ай бұрын
very well from your good and nice techings Mr. loi can you tell we is there a way to download from payment websites without any paying thanks
@fairyroot1653
@fairyroot1653 3 ай бұрын
I'm just interested in the py to extract the key from the QR code
@nieczerwony
@nieczerwony 2 ай бұрын
This is probably outdated as most platforms now are using like separate app. For example in FB/Messenger if I have login credentials to lets say my brother FB account, but I am trying to log in from my PC/Phone, he will have to confirm on his device. So eve if he has to put some PIN/QR it will only be possible from his device. My bank is using similar approach. If I try to log in from any other device< i will get pop up on my phone where I have to confirm and allow new device to connect.
@abhinavtiwari24
@abhinavtiwari24 3 ай бұрын
Always ready for your video
@JimmyS2
@JimmyS2 3 ай бұрын
I don't understand why the double )) in the union payload @5:54 ?
@almoh
@almoh 3 ай бұрын
To setup 2FA, first you need to have the password? if you already have the hackerwhateverpassword, the account is already compromised?
@killerfreefire3727
@killerfreefire3727 3 ай бұрын
The first part of video was an example of how 2FA generally works. Qr code image gives us a secret token that we can use to bypass 2FA, then in the video shows that with SQL injection we get this token from the database
@randomando9953
@randomando9953 3 ай бұрын
Look who raised him. I'm not surprised he's stuck like Chuck 😂😂
@hellamean
@hellamean 3 ай бұрын
Well, a replay attack can be used to login without password or 2FA as well.
@biggig8548
@biggig8548 3 ай бұрын
Does this affect the use of hard tokens from a USB device and/or Yubikey etc? Are these stored in the same DB as well? I always thought hard tokens were the safer way to go instead of a google authenticator. Always enjoy and appreciate the videos!
@ysfchn
@ysfchn 3 ай бұрын
It depends on what do you mean by "hard tokens". Specifically speaking of Yubikeys, it supports multiple type of authentication methods, so storing TOTP accounts on Yubikey is not that much different from Google Authenticator or any application authenticator, you would just have a physical presence of your 6-digit codes with Yubikey. But since Yubikey's storage is write-only, you can't see your secrets in plain form after it is imported to Yubikey, so you just see the 6-digit codes that the secret is corresponding to, which naturally makes Yubikey safer. However, Yubikeys also provides a hardware-based OTP (HOTP), so in that scenario, the server just "validates" the token generated by the Yubikey (instead of checking the same 6-digit value that the same secret stored in DB corresponding to, as in TOTP) which it makes the one of the most secure authentication methods as of today. Unfortunately, not all websites which supports 2FA allows registering a security key (or passwordless sign-in), they sometimes support TOTP as the only 2FA option as in the example website shown in this video. Also, even hardware authenticators are used, when the server's database is exposed once, it might be a risk still because since the database basically contains your user data, even if hacker couldn't sign in your account they can still access your leaked info without signing in, so I believe it doesn't even matter much anyway which 2FA method you choose in that scenario like this. Not saying that hardware authenticators doesn't change anything, they are obviously always more secure than other options! And since most-popular websites are protected enough to prevent easy attacks like SQL injection, getting full access to the database is very less likely in today (it probably would work in ancient websites like in 10+ years ago), so don't be confused by this video. Even with a time-based tokens (TOTP), you are usually still safer than having no 2FA, it is just not that super-safe when compared to hardware-based tokens. Hope this is helpful!
@valkaielod
@valkaielod 3 ай бұрын
They work exactly the same way in case you use TOTP. You just store the shared key on the hardware instead of the phone.
@MrColinTee1
@MrColinTee1 Ай бұрын
Can you help me bypass my own 2FA for Facebook? I lost google authenticator when I had my mobile phone stolen.
@gko_0844
@gko_0844 3 ай бұрын
Dude how many camera you have?
@davidlu1003
@davidlu1003 3 ай бұрын
Very cool. Thanks.😁😁😁
@godalfred2266
@godalfred2266 3 ай бұрын
Question:- Is it possible to brute force the 6 digit authentication code with graphic cards or with anything else in Cybersecurity ?
@Kalreni
@Kalreni 3 ай бұрын
@@yt_brij Proxies exists
@lainiw4kura
@lainiw4kura 3 ай бұрын
usually the passcodes refresh and change every minute
@PCs454
@PCs454 3 ай бұрын
yes you can but they expire after like 1 minute
@AliHussain-mt9vn
@AliHussain-mt9vn 3 ай бұрын
Can make another video about android RAT because most of the old so they don't work
@user-sp9kl4vq1j
@user-sp9kl4vq1j 3 ай бұрын
Hi, Mr. Hackerloi! I am one of your KZbin writings and I come to help your video and are very good. Congratulations to the stather. Have one of your video with the title: How Hackers Hack With An Image Trojan? I tested on my computer with your class cripto did not give enough to cost me a crypt base and how to set up
@LOMOKA25
@LOMOKA25 3 ай бұрын
hello can you help me skip the website
@pick_pick_pick
@pick_pick_pick 2 ай бұрын
Amazing one 🥰
@Live360bdTV
@Live360bdTV 3 ай бұрын
I can't login my Facebook account due to , 2factor automatic app . Can you help me 😭
@Hello_-_-_-_
@Hello_-_-_-_ 3 ай бұрын
Excelent police work and freedom you gave. That boy looks genuinely sorry and regrets what he did
@hinoTheCatto
@hinoTheCatto 3 ай бұрын
Learnings from this video: 1. How to bypass 2fa 2. hacker loi is very handsome
@gpppp910
@gpppp910 3 ай бұрын
So to bypass 2fa you'd need a sql injection? That's not a 2fa bypass sir, that's just a misleading title. It's already game over when you can extract arbitrary data from the database.
@medslyhenuk1430
@medslyhenuk1430 3 ай бұрын
thx for sharing information
@pdebian
@pdebian 2 ай бұрын
Por favor, adicione faixa de áudio nos seus vídeos. Vai ajudar muito a gente entender melhor.
@Sxhib_space
@Sxhib_space 3 ай бұрын
Sir pls next video on how to find and bypass admin panel of any website.
@olabanjidavid2512
@olabanjidavid2512 26 күн бұрын
YOU CAN ONLY DO THAT FOR A WEBSITE WITH HTTP NOT HTTPS
@ProfessorMoon6
@ProfessorMoon6 3 ай бұрын
any promo code for your courses ? :)
@AbsoluteDegens
@AbsoluteDegens 3 ай бұрын
In this example, you had the password and email, and the 2fa wasn't needed, you set up the 2fa after you had access to the account? Im confused.
@kibetandrew5622
@kibetandrew5622 3 ай бұрын
😂
@ferasm96
@ferasm96 3 ай бұрын
Because the whole video is about bypassing 2fa through extracting the token key
@user-nh1en4cq3k
@user-nh1en4cq3k 3 ай бұрын
The video is all over the place
@MrDoesntUpload001
@MrDoesntUpload001 3 ай бұрын
Thank you Mr. Hacker Loi.
@aburilusbroadcast
@aburilusbroadcast 3 ай бұрын
Please make a video with how a hacker bypass my 2FA provided by my Yubikey. :) Thanks!
@valkaielod
@valkaielod 3 ай бұрын
They do not need your Yubikey if they can get the TOTP key stored on it from the server.
@aburilusbroadcast
@aburilusbroadcast 3 ай бұрын
@@valkaielod I don't talk about a TOTP code provided by Yubikey. I talk about 2FA provided by hardware key Yubikey itself (aka they need my key to plug in to their USB port and touch the key). How can they bypass this?
@valkaielod
@valkaielod 3 ай бұрын
@@aburilusbroadcast That is FIDO2. They can't bypass it unless there is a vulnerability in the chip and they have access to it. Or they exploit the web application.
@valkaielod
@valkaielod 3 ай бұрын
@@aburilusbroadcast It seems like YT ate my comment. Bypassing the FIDO2 auth used in that scenario is not trivial at all. You either need a vulnerability in the chip YK uses or compromising the server side.
@invt.duanecage555
@invt.duanecage555 3 ай бұрын
Some of y'all haven't even watched the video but already liking it
@Hello_-_-_-_
@Hello_-_-_-_ 3 ай бұрын
Bc we know it's going to be quality content.
@abdou.the.heretic
@abdou.the.heretic 3 ай бұрын
Freedom, funny how that works.
@invt.duanecage555
@invt.duanecage555 3 ай бұрын
@Hello_-_-_-_ and indeed, it was great
@invt.duanecage555
@invt.duanecage555 3 ай бұрын
@@abdou.the.heretic true talk
@gvagear
@gvagear 3 ай бұрын
yes, you can like it, and after watching you can decide to keep it or revoke it. some ads and autoplay feature will navigate you elsewhere on video end, so it is a best practice to like earlier.
@samsepiolz
@samsepiolz 3 ай бұрын
how can this work on modern systems?
@timecop1983Two
@timecop1983Two 3 ай бұрын
This will not work unitl a 0day is found
@compton8301
@compton8301 3 ай бұрын
It'll never work.
@MalevolentJJK
@MalevolentJJK 3 ай бұрын
Can we do it for Gmail.
@MosesaAkawua-mj3bs
@MosesaAkawua-mj3bs 3 күн бұрын
Please sir can you help me with any of your remote desktop kali or windows to use for hacking
@heatherrose9197
@heatherrose9197 2 күн бұрын
I was also in similar situation but the same expert helped me out… He is *Tischler tech*
@heatherrose9197
@heatherrose9197 2 күн бұрын
This guy helped me get mine back. I never believed this could be possible but thanks a lot to him.. *Tischler tech* dedication and might in doing this looks unreal but it works🎉..
@heatherrose9197
@heatherrose9197 2 күн бұрын
*Tischler tech* is a cyber security expert. Only him can look into this situation and get it back.
@heatherrose9197
@heatherrose9197 2 күн бұрын
Certified *Tischler tech* cyber security expert is the best 😊
@heatherrose9197
@heatherrose9197 2 күн бұрын
He has over 9k followers???.
@user-ds7yp9yx8o
@user-ds7yp9yx8o 3 ай бұрын
Please say more on /etc/apt/sources.list Unable to locate package Not even to update kali Linux download nothing in here seems working
@garyng2000
@garyng2000 3 ай бұрын
who would design a backend like that ? sounds like high school project to me :-)
@cookiigames
@cookiigames 3 ай бұрын
That’s happening because the developer didn’t use an orm.
@discfree1
@discfree1 3 ай бұрын
Hacking is not in it self not illegal, only when you do it in the wrong way. like destory stuff.
@gemonearth4395
@gemonearth4395 6 күн бұрын
Is it possible to solicit help from you to get access to a specific account of mine? I am lost and have exhausted all of my options..
@elaineSereva
@elaineSereva 5 күн бұрын
I was also in similar situation but the same expert helped me out… He is *Tischler tech*
@elaineSereva
@elaineSereva 5 күн бұрын
This guy helped me get mine back. I never believed this could be possible but thanks a lot to him.. *Tischler tech* dedication and might in doing this looks unreal but it works🎉..
@elaineSereva
@elaineSereva 5 күн бұрын
*Tischler tech* is a cyber security expert. Only him can look into this situation and get it back.
@elaineSereva
@elaineSereva 5 күн бұрын
Certified *Tischler tech* cyber security expert is the best 😊
@elaineSereva
@elaineSereva 5 күн бұрын
He has over 9k followers???.
@underndogx5346
@underndogx5346 3 ай бұрын
Thank you so much Master
@benardmumba3338
@benardmumba3338 3 ай бұрын
And boom Harker loi...
@sharma_bhavishya
@sharma_bhavishya 3 ай бұрын
Yo, you doing some crazy work ngl ☝️🔥
@peterparker175
@peterparker175 3 ай бұрын
no
@sharma_bhavishya
@sharma_bhavishya 3 ай бұрын
@@peterparker175 cry more bruv
@GothSomnia
@GothSomnia 3 ай бұрын
Hello, I'm seeking assistance with a matter of significance to me. I recently added an external hardware component to my motherboard known as a DMA (Direct Memory Access). In the device manager, it is listed as such. However, it is crucial for me to conceal and present it as a different device to appear legitimate. Specifically, I aim to mask it from the system. I'm in need of a firmware solution that can spoof this DMA card, essentially hiding it by integrating it into the firmware to mimic a standard PC component. The objective is to make the DMA indistinguishable from other regular hardware components Furthermore, I am looking for a firmware tailored uniquely for my use, ensuring exclusivity. Unfortunately, I lack experience in this domain, making comprehensive assistance invaluable to me.
@043-namanvora2
@043-namanvora2 3 ай бұрын
thank you sensai
@tutacat
@tutacat 3 ай бұрын
Actually, most TOTP implementations give you a few seconds leeway
@user-hg7xs5hv6j
@user-hg7xs5hv6j 3 ай бұрын
wow got here 31min after posted
@Prdimznova
@Prdimznova 3 ай бұрын
what is a good countermeasure besides fixing vulnerabilities? Store TOTP in another DB or encrypt it?
@patwhocares7009
@patwhocares7009 3 ай бұрын
Simple, do not send sql info and do not trust input from a user always sanitize so even if, for some reason, they tried sql injection, it will fail. This is amateur stuff when you know nothing about programming and just started. And this is just clickbait.
@user-fw2gu9rj3f
@user-fw2gu9rj3f 10 күн бұрын
Your work speaks volumes of the kind of man you are. efficient, organized and result oriented well done , Adrian Ruthnik you're soo good at what you do
@nazarsukkar5809
@nazarsukkar5809 3 ай бұрын
I wanna bypass my outlook email 2FA any suggestions?
@timecop1983Two
@timecop1983Two 3 ай бұрын
Won't work this security is set to LOW
@vikinator5371
@vikinator5371 3 ай бұрын
This works on ubisoft?
@NaitikRoul-wj6vf
@NaitikRoul-wj6vf 10 күн бұрын
Big thanks Adrian Ruthnik for helping me out. God bless you brotha... I've tried following these steps from the device and location where the account was always logged into and I got a page that says we don't recognize your device. The tutorial video was not helpful tho but Big Ups Jon
@PradeepVerma-zm8pp
@PradeepVerma-zm8pp 10 күн бұрын
Incredible efforts by Adrian Ruthnik I'll be transparent - distinguishing between legitimacy and legality can be tricky for many. Grateful for the assistance with my account - it's back in my hands. Keep up the commendable work, aiming to minimize the impact caused by the system. We could use more individuals like Jon in our world.
@Krmpfpks
@Krmpfpks 3 ай бұрын
Newsflash: If you can access the database there is very little reason to even bother accessing the website frontend.
@richrice9218
@richrice9218 Күн бұрын
This happened to me 2 years ago and it made me mad 😡 my laptop was stolen and they got into every account I own
@Tatsujin-Senshi-Samuraibushid0
@Tatsujin-Senshi-Samuraibushid0 3 ай бұрын
Your search parameter is vulnerable =) In other cases, you will bypass my socks :D Yeah, this is an example, sure. :)
@usr808
@usr808 3 ай бұрын
has anyone ever tried to hack loi liang yang?
@edwardstuart3207
@edwardstuart3207 Ай бұрын
Hay I been watching you video all of them I just finished all your videos I love them great tips how do you bypass a text verification code if your number is candle when you switch providers because I can't get into my one app account without having my old phone number which I don't have
@AtifAslam-zv3ee
@AtifAslam-zv3ee 4 күн бұрын
How to check if any fb id has activated 2FA
@barkatali710
@barkatali710 3 күн бұрын
I was also in similar situation but the same expert helped me out… He is *Tischler tech*
@barkatali710
@barkatali710 3 күн бұрын
This guy helped me get mine back. I never believed this could be possible but thanks a lot to him.. *Tischler tech* dedication and might in doing this looks unreal but it works🎉..
@barkatali710
@barkatali710 3 күн бұрын
*Tischler tech* is a cyber security expert. Only him can look into this situation and get it back.
@barkatali710
@barkatali710 3 күн бұрын
Certified *Tischler tech* cyber security expert is the best 😊
@barkatali710
@barkatali710 3 күн бұрын
He has over 9k followers???.
@harishverma6474
@harishverma6474 10 күн бұрын
As a person and professional you couldn't get any better than Adrian Ruthnik is a very reliable person and an excellent professional in the IT field. He is the type of person you want to work that's passionate, hardworking and knowledgeable. You’re The Best 100%
@GAMEGLITCHER99
@GAMEGLITCHER99 3 ай бұрын
damn i will be using this sometime
@Jig12693
@Jig12693 3 ай бұрын
Helo sir I also want to learn programming and can u plz teach me plz sir I beg u.
@cerealpeer
@cerealpeer 3 ай бұрын
just strip and report with xss
@Patheticus
@Patheticus 3 ай бұрын
Your voice reminds me of the Yakuza missions from GTA III! It was just a joke, no hacking me! 😅
@mit5478
@mit5478 10 күн бұрын
Adrian Ruthnik . I really appreciate your efforts and dedication towards the work. May God bless you to keep showing your worth and skills like this in the future
@rajnisoni5815
@rajnisoni5815 10 күн бұрын
People dream of hiring such a talented expert like you. Keep up the hard work. Thank you so much for your dedication in this process. Thank you for your commitment to your job. Your outstanding performance helped our me alot. Thank you once again for your hard work and dedication.
@invt.duanecage555
@invt.duanecage555 3 ай бұрын
Mind-blowing
@peterparker175
@peterparker175 3 ай бұрын
no
@invt.duanecage555
@invt.duanecage555 3 ай бұрын
@@peterparker175 well I don't know about you. But it is to me
@user-nh1en4cq3k
@user-nh1en4cq3k 3 ай бұрын
When you explain you assume we know some of the stuff …. You should explain like we never heard of it ……
@theeverythingnew2497
@theeverythingnew2497 10 күн бұрын
I have my number and I can't access to my account Gmail because of google authenticater, can you help me to get back my account?
@patwhocares7009
@patwhocares7009 3 ай бұрын
First thing you learn is never trust user input and never ever show the query (maybe in debug mode when you are the only one that can see it, but never ever in production) . What kind of losers programmed this and what idiots approved it for production? These are mistakes i did when i first started 25 years ago as a rookie.
@codewithlaghari
@codewithlaghari 3 ай бұрын
Title: Union based SQL Injection 😂
@rajudebnath2039
@rajudebnath2039 10 күн бұрын
Having you as my support has been one of the best things I’ve ever decided on, Adrian Ruthnik . Your assistance has made my tasks smoother and more manageable. I deeply appreciate the favor you’ve extended to me. Thank you, my friend. Your presence has made this entire process much more comfortable, and I am truly grateful for it. Working alongside you is a pleasure, and your dedication to your role serves as an inspiration to me. I will always remember the help and support you’ve provided me with.
@shsh-xk4hi
@shsh-xk4hi 3 ай бұрын
how to hack any bluetooth devices or speakers ?
@anitasaini527
@anitasaini527 10 күн бұрын
Amazing job! Adrian Ruthnik I wasn’t able to see my account name at first because the name was changed. Also I really valued this information but thanks Jon even tho it showed a lots of error at my ends you still tried in helping fixing it. Happy I got it back y’all.
@PandorasBox2
@PandorasBox2 3 ай бұрын
and thats why u have to encode important info on your database all the time
@jagmarc
@jagmarc 3 ай бұрын
Why is there a massive microphone
Remotely Control Any Phone and PC with this Free tool!
17:15
Loi Liang Yang
Рет қаралды 737 М.
Hackers Bypass Google Two-Factor Authentication (2FA) SMS
12:47
John Hammond
Рет қаралды 979 М.
Ну Лилит))) прода в онк: завидные котики
00:51
Remotely Control Any PC with an image?!
12:42
Loi Liang Yang
Рет қаралды 45 М.
How hackers Bypass Multi Factor Authentication | Evilginx 2
8:14
Cyberlinx Security
Рет қаралды 73 М.
Python The Hacker's Secret Weapon | Importance Of Python in Hacking
11:06
How to Listen to Phone Calls in Wireshark
7:30
Plaintext Packets
Рет қаралды 129 М.
HOW TO RESET Administrator PASSWORD and Unlock any PCs?!
9:09
Loi Liang Yang
Рет қаралды 356 М.
How hackers hack with an image Trojan?!
7:39
Loi Liang Yang
Рет қаралды 117 М.
STOP Using Google Authenticator❗(here's why + secure 2FA alternatives)
6:55
how hackers hack any websites in minutes?!
23:17
Loi Liang Yang
Рет қаралды 218 М.
Дени против умной колонки😁
0:40
Deni & Mani
Рет қаралды 10 МЛН
keren sih #iphone #apple
0:16
Muhammad Arsyad
Рет қаралды 558 М.
5 НЕЛЕГАЛЬНЫХ гаджетов, за которые вас посадят
0:59
Кибер Андерсон
Рет қаралды 1,4 МЛН