4 Ways to Secure Websites & Apps from Hackers

Поделиться
HTML-код
  • Опубликовано: 28 сен 2024

Комментарии • 102

  • @deepeddyrecords5933
    @deepeddyrecords5933 3 года назад +7

    Excellent discussion! All valid points. Doing anything is better than doing nothing at all. Thanks for all you do, Zaid!

  • @praveenvishnu17
    @praveenvishnu17 3 года назад +17

    It's awesome, love from India 🇮🇳

  • @Emperor-no9fk
    @Emperor-no9fk 3 года назад +6

    I'm a student on your Learn Ethical Hacking From Scratch course. A question: it's possible to social engineering a social engineere? For example, it's possible to steal a hacker's credentials?

    • @umarmuzammil7332
      @umarmuzammil7332 3 года назад +3

      Yup try to put Linux payloads into hacking tool and social engineer a hacker or a script kiddie to check that tool target use the tool you will be getting a connection back🥰

    • @umarmuzammil7332
      @umarmuzammil7332 3 года назад +1

      For example use zphisher is a tool use to phish passwords tell the hacker tat the tool is a good phishing tool, it has many phishing sites in it, and blah blah blah .... add more 😂.... before sending it to the hacker create a Linux payload using empire tool, and copy the payload and add in the zphisher.sh file just paste anywhere in the code...don’t paste with the written code, and send it to the hacker...and once he execute the file you will be getting a connection🥰

    • @Emperor-no9fk
      @Emperor-no9fk 3 года назад +1

      @@umarmuzammil7332 Thank you so much

    • @khalidyoy142
      @khalidyoy142 3 года назад

      Yes I think
      But don’t take my words I’m not so professional at hacking I’m still learning
      Anyway, you can but you should be smarter and has more experience than the target

    • @willCX
      @willCX Год назад

      Nice! Thanks!

  • @freeguy37
    @freeguy37 3 года назад +4

    Perfect! Love from India!

  • @anonymousgamer7937
    @anonymousgamer7937 3 года назад +1

    how to remove write protection from usb ..? help me plz ? can we do from python ?

  • @codelover543
    @codelover543 Месяц назад

    found your channel recently. God bless you, thanks for sharing your knowledge!

  • @lav-m4a138
    @lav-m4a138 3 года назад +4

    As a web engineer, your knowledge is helpful.
    Thank you for uploading this video!!!

  • @morsalinpranto5860
    @morsalinpranto5860 3 года назад +3

    Waiting for your new course ❤

    • @umarmuzammil7332
      @umarmuzammil7332 3 года назад +1

      Me also he is not telling what type of course is it😂 he told ye will account it in the future still I am waiting😂🥺😎😎😎😎

  • @Ectos
    @Ectos 3 года назад +5

    Lets go, new video!!!

  • @jagadeeshbeesabathuni5946
    @jagadeeshbeesabathuni5946 3 года назад +1

    Hey bro, how are you doing man, how much of the time will be required to complete your course in udemy? I have enrolled in your course please do a video on settings and hardware requirements to start our progressive learning , practice like desktop or laptop better? I'm using lenovo thinkpad 4g.b ram x201 with win 8.1 pro os

  • @studious3711
    @studious3711 3 года назад +12

    ❣️from india😍

  • @amralifts
    @amralifts 3 года назад +7

    after watching this video, security system be like - "I am ironman..."

    • @umarmuzammil7332
      @umarmuzammil7332 3 года назад +3

      Hope there will be 0 day exploit 😂

    • @amralifts
      @amralifts 3 года назад +1

      @@umarmuzammil7332 lol

    • @Jawlaya
      @Jawlaya 3 года назад +1

      🤣🤣

  • @PeteMay71
    @PeteMay71 3 года назад

    Hey Zaid, can you do a video on installing and running Volatility please. Have your course and enjoying but, Im also trying new things and Volatility is a bit tricky. Cheers

  • @umarmuzammil7332
    @umarmuzammil7332 3 года назад +4

    Sir put a content on sms spoofing 🥺🥰

    • @umarmuzammil7332
      @umarmuzammil7332 3 года назад +1

      This is the best way to fool any one after email spoofing 😂🥰

  • @umarmuzammil7332
    @umarmuzammil7332 3 года назад +2

    Sir pls put a tutorial on how to make any Linux distro a hacking machine for example I started using arch Linux but I couldn’t download thing like zipalign and other stuffs, i mean I couldn’t find a way to download that on internet also...... put a content on making any Linux distro a hacking machine 🥰🥰🥰😘😘😘😘😎🤩

  • @derrickdabreo3
    @derrickdabreo3 3 года назад +1

    Which wireless wifi adapter should I use in 2021

    • @CyberSecLinux
      @CyberSecLinux 3 года назад

      Check david boombed

    • @zSecurity
      @zSecurity  3 года назад

      It depends on your usage. Check out this video: check out this video ruclips.net/video/0lqRZ3MWPXY/видео.html
      Also check out our shop from here: zsecurity.org/shop/

    • @willCX
      @willCX Год назад

      Check out the WiFi adapter videos

  • @sairamnaiduvvvs8028
    @sairamnaiduvvvs8028 3 года назад +2

    Sir make a video on how to root the phones and use the phones for ethical hacking as a pro

  • @SystemExploited
    @SystemExploited 3 года назад +6

    Ya follow these 4 approaches or your crush will approach you and reject you with no regret ! Follow what Zaid does !

  • @subham2593
    @subham2593 3 года назад +1

    😲😲Wow

  • @shreekitchen2003
    @shreekitchen2003 3 года назад

    Please bring a video in which we can learn how to inject TROJAN virus in undetectable backdoor that you had created in your old video........

  • @pppp9459
    @pppp9459 3 года назад

    Zain which laptop is good to have for hacking? I know you mentioned something in your courses but i still have not a clear answer

    • @willCX
      @willCX Год назад

      Well it doesn't need to be a super laptop but something that can handle many Apps at once. Example maybe a couple of VM at once running smoothly plus apps running in background too! I would say I5 should be more then enough but s higher spec one
      Ram I would recommend 16.because that's what I would go for too. 8 at the very very minimum

  • @HelgaZargarian-xr4xd
    @HelgaZargarian-xr4xd Год назад

    How do I remove every gadget attached to my belongings

  • @pratikgawande8736
    @pratikgawande8736 3 года назад

    Please make a video on andrax and kali nethunter which is best for mobile user who want to penetest using mobile

  • @youssefmohamedsariamohamed5687
    @youssefmohamedsariamohamed5687 3 года назад

    Hello zaid is there is any possibility to make a video about building hacking pc

  • @CyberSecLinux
    @CyberSecLinux 3 года назад

    Very Nice Bro

  • @subhambhadra1803
    @subhambhadra1803 3 года назад +2

    Why there is a spot on your face!!!!! What happened sir?

    • @umarmuzammil7332
      @umarmuzammil7332 3 года назад +1

      Bro man why this 😂 see his skill bro try to get study something from him, don’t see the face and stuffs 😂 however his face good🥰

    • @umarmuzammil7332
      @umarmuzammil7332 3 года назад +1

      Now only I saw 😂 hmm it seems serious hackers spot😎😎

    • @subhambhadra1803
      @subhambhadra1803 3 года назад

      You're obviously right 😃 I'm just little bit concerned 😞

    • @CyberSecLinux
      @CyberSecLinux 3 года назад

      hhhhhhh

  • @CyberSecLinux
    @CyberSecLinux 3 года назад

    Wow

  • @bibhashpodh1074
    @bibhashpodh1074 3 года назад

    Hey Zaid Kindly Please Pick my Comment🙏🙏
    How hackers can Hack Any Live Broadcast Television Channel And Stream there own Hackers Videos ...can you please make a complete basic to Advance videos about it because i Research whole internet but can not get any guide step by step...i will be waiting if you🙏🙏🙏🙏

    • @willCX
      @willCX Год назад +1

      Why stream ya own hacking video on LIVE TV. It goes back to ya. Just make ya own RUclips channel

    • @bibhashpodh1074
      @bibhashpodh1074 Год назад

      @@willCX Hey dude its about educational purpose even i wannaa lear how the hackers do this with livestream and play their own video as message to everyone...

  • @mrreddotyttanay3347
    @mrreddotyttanay3347 3 года назад

    What's there on your right cheek or left

  • @abduksam
    @abduksam 3 года назад +4

    First

    • @HeilJake
      @HeilJake 3 года назад +3

      Nope! 4 seconds later Whomp Whomp WHOMPPPP!

    • @umarmuzammil7332
      @umarmuzammil7332 3 года назад +1

      I there is no proud with it 😂

  • @mrdeath6769
    @mrdeath6769 3 года назад +4

    bonasera elliot 😂👏

  • @mayur-rathi
    @mayur-rathi 3 года назад +4

    Make video about reverse engineering

  • @afterdayz3757
    @afterdayz3757 3 года назад +8

    Hello Zaid this is totally random but u look fresh today lol

  • @nolemonscars8438
    @nolemonscars8438 3 года назад +3

    Amazing 🤗

  • @shreekitchen2003
    @shreekitchen2003 3 года назад +1

    Can we hack a wifi with beef????

    • @CyberSecLinux
      @CyberSecLinux 3 года назад

      No, but you can try it as a phishing

  • @mrfact3066
    @mrfact3066 3 года назад +2

    Thank bro you for this video you are awesome teach us more and we are really thankful to you

  • @umarmuzammil7332
    @umarmuzammil7332 3 года назад +3

    Nice video bro😘😘😘😘love you

  • @mrdeath6769
    @mrdeath6769 3 года назад +3

    Ipleas zaid i have an issue if i generate a backdoor and downladed from the target windows and run metasploit meterpreter i have issue session 1 closed please help me to fix this issue 😍❤

    • @umarmuzammil7332
      @umarmuzammil7332 3 года назад +2

      what type of payload you used I also had that issue if you let me know what payload you used i will try helping you to fix bro🥰

    • @mrdeath6769
      @mrdeath6769 3 года назад +2

      @@umarmuzammil7332 bro do you have instagram?

    • @mrdeath6769
      @mrdeath6769 3 года назад

      @@umarmuzammil7332 tnhx bro 😍

    • @umarmuzammil7332
      @umarmuzammil7332 3 года назад +2

      @@mrdeath6769 yup

    • @umarmuzammil7332
      @umarmuzammil7332 3 года назад +1

      Get me your Instagram I’d

  • @CyberSecLinux
    @CyberSecLinux 3 года назад +1

    But remember something "No System's Safe"

  • @omarbk25
    @omarbk25 3 года назад +2

    your videos always are so helpful , thanks zaid

  • @rohangore
    @rohangore 3 года назад

    I would like to see how to hack android phones how hackers hack somebody's wapp and fb chats

  • @umarmuzammil7332
    @umarmuzammil7332 3 года назад +2

    Any one know how to install zipalign n arch Linux?🥺🥺🥺🥺

  • @ActiveXSploit
    @ActiveXSploit 3 года назад +1

    Great video mate, but what happened to you? I see a scratch on your cheek? Take care man

  • @afterdayz3757
    @afterdayz3757 3 года назад +1

    Hello Zaid I am a student on your udemy courses and veil seems to be kind of outdated i have tried almost every possible combination an there always seems to be antiviruses that can detect them I even changed the source.code to different combinations. Thefatrat and empire also seem to be lacking so i would be interested in a new video on that topic i know that u made one just 6 months ago but i am just reccomendind video ideas Thanks

  • @poppynikhjo900
    @poppynikhjo900 3 года назад +1

    Hi Zaid! How do you do?

  • @anirudhdilli6250
    @anirudhdilli6250 3 года назад +1

    This video is just self promotion

    • @CyberSecLinux
      @CyberSecLinux 3 года назад

      No

    • @anirudhdilli6250
      @anirudhdilli6250 3 года назад

      @@CyberSecLinux Yes it is, didn't you see the whole video, they were just talking about how to secure a website in that most of the services are provided by zSecurity. Isn't it self promotion?

    • @zSecurity
      @zSecurity  3 года назад

      Yeah we provide all the mentioned services BUT we are not the only ones in the world that do that. You can get these services from any company you want.

    • @anirudhdilli6250
      @anirudhdilli6250 3 года назад

      @@zSecurity I was just pointing it out

    • @anirudhdilli6250
      @anirudhdilli6250 3 года назад

      @@zSecurity Is it wrong?

  • @ആദി-ഥ6ഠ
    @ആദി-ഥ6ഠ 3 года назад

    please make a video using esp32 as wifi adapter

  • @ആദി-ഥ6ഠ
    @ആദി-ഥ6ഠ 3 года назад

    i think most of your views are indians .

  • @afterdayz3757
    @afterdayz3757 3 года назад +2

    Greetings from Greece!

  • @gymaestheticmotivation988
    @gymaestheticmotivation988 3 года назад

    Make a video

  • @saikumar7605
    @saikumar7605 3 года назад +1

    ❤️ from India

  • @hackerstech4025
    @hackerstech4025 3 года назад

    Bring on Practicals

  • @rahulbose1089
    @rahulbose1089 3 года назад

    between alfa awus036ach and alfa awus1900 which is better ? please help. i am using kali linux 2021.

    • @zSecurity
      @zSecurity  3 года назад +1

      The awus036ach is a great choice.

    • @rahulbose1089
      @rahulbose1089 3 года назад

      @@zSecurity but can you tell me why is that ? sorry I maybe asking foolish questions. but I am new to this. please help.

  • @gymaestheticmotivation988
    @gymaestheticmotivation988 3 года назад

    Sir,how to hack a android phone with Android phone without sending any links ..
    Only by programming

  • @AwwadAlqadi
    @AwwadAlqadi 3 года назад

    From Yemen I love India if you have group to programmers can add me 🌚❤