How Hackers Login To Any Websites Without Password?!

Поделиться
HTML-код
  • Опубликовано: 25 дек 2024

Комментарии • 521

  • @iqlessmemes4115
    @iqlessmemes4115 2 года назад +316

    It's a good day when hacker loi uploads.

  • @gauntletwielder6306
    @gauntletwielder6306 2 года назад +175

    Interesting video. However….
    1. The IP address used in the video, is PRIVATE. Which means the server is on the same private network and probably NOT behind a firewall… therefore unrealistically easy to access.
    2. Only completely incompetent people open up all ports to all IP addresses of a server facing the Internet. This is the kind of thing that would get someone fired immediately.
    3. Most user names and passwords ( actually hashed passwords ) are stored in databases. Storing plaintext or encrypted passwords, goes against best practices.
    4. Most password inputs check for the length ( is it too short or too long ) and content ( does it have numbers, lowercase, uppercase ) of the password BEFORE attempting to validate the password.
    Nice video, but too many red flags for me.

    • @kanister21
      @kanister21 2 года назад +7

      5. more and more websites forces user to use 2FA

    • @UnDarkVader
      @UnDarkVader 2 года назад +7

      6. The exploit is very old. Its very less probably that this service didn't update in many time.

    • @dev-debug
      @dev-debug 2 года назад

      The target was setup for the sake of the video but yeah on a modern server install most of what was running is off by default at install or firewalled. I haven't seen FTP enabled in a long long time, virtually everyone uses SFTP now. FTP and web apps like forum software had tons of security flaws in the past, they were the easy way in.

    • @epolpier
      @epolpier 2 года назад

      Red flags ? It's a pure bullshit...

    • @animalconsultant7796
      @animalconsultant7796 2 года назад

      Yeah basically all usernames and passwords are stored in a database and you’d need a lot of CPU power to crack anything

  • @theunveil8333
    @theunveil8333 2 года назад +22

    No trash talk, right into the topic nice vid man

  • @FRUITSparty
    @FRUITSparty 9 месяцев назад +4

    It's more complex than what he teach. Especially when you meet firewalls , other protection system timing.

  • @moabifokotsane
    @moabifokotsane 2 года назад +23

    THE REAL LESSON : Find the login access port , look for vulnerabilities (of overall system) , exploit the vulnerability, when shell runs move on dir to find the login access system, look for config file of the login system, get credentials, HACK COMPLETE. 😄
    NB : the system doesn't need to be running services you saw on the video only to be hackable, its a process learn and understand it, then apply steps on any machine. The lesson here is to understand the concept ((technical steps)) not to learn about a new vulnerability. Many systems have different services therefore the ((technical steps)) will remain the same but dealing with different machines, services and vulnerabilities.

    • @ufc786
      @ufc786 2 года назад

      Are most websites all hackable ? Like loi showed. Can all websites be hacked as admin ?

    • @Sp3cia1m4n
      @Sp3cia1m4n 2 года назад

      @@ufc786 all website are hackable but you have to find the right vulnerability for it, but you wanna hack web applications without any basic knowledge of programming language, Linux, windows, type of vulnerability, I guess go watch other channel this channel clearly don't explain what he's doing exactly.. Bottom line I came here to laugh at his stupidity and leave and found your comment thanks

  • @FzEdits
    @FzEdits 2 года назад +42

    Really enjoyed the shorter video format here. Keeps things simple

  • @alexanderohman1707
    @alexanderohman1707 2 года назад +10

    How many servers are inside your own firewall, has passwords stored in plain text and all ports open and would accept an the hash rather than the password?
    This is like "opening a door without a key" when the door is a shower curtain.

    • @Pinkyyybrainn
      @Pinkyyybrainn 2 года назад +1

      But, imagine you never knew how to open the shower curtain - that's where this video helps!

    • @Smiley957
      @Smiley957 2 года назад

      I think this video is meant for inexperienced web app developers who need to learn about these vulnerabilities.

    • @animalconsultant7796
      @animalconsultant7796 2 года назад +1

      But dude he hacked it dude, dude

  • @ronitdhase2511
    @ronitdhase2511 2 года назад +19

    You can never take a chance to skip loi's Video..!!!!!

    • @FunTime-qj9hn
      @FunTime-qj9hn 2 года назад +2

      yes i like it, every second is important.

  • @juliusrowe9374
    @juliusrowe9374 2 года назад +7

    Loi, thanks for another brilliant tutorial sir!

  • @tourreallen6872
    @tourreallen6872 2 года назад +10

    I wish you uploaded this two weeks ago. lol you taught me everything me prof did not in under 7 mins and he had a whole semester lol This is exactly what we did on the final even down to the elastics. makes me want to fire up Linux rn lol very informative thank you.

    • @momosayma6647
      @momosayma6647 2 года назад

      I need to find a login URL, can you find that please?

    • @Pinkyyybrainn
      @Pinkyyybrainn 2 года назад

      Just install linux and follow this guide man!

  • @Peppermint1
    @Peppermint1 8 месяцев назад

    Small tip: if you suspect a hacked page, enter a wrong password, if you get access then walk away

  • @U963gb
    @U963gb 2 года назад +2

    Love from India 🇮🇳🇮🇳❤️

  • @TruthSeeker12345
    @TruthSeeker12345 2 года назад +1

    Informative and brief...
    Well Done...

  • @prodky33
    @prodky33 2 года назад +1

    hacker loi why have you not been uploading 😭😭😭 my kali linux is running i have nothing to do

  • @MicahBell-j3f
    @MicahBell-j3f Год назад +45

    andrew tate?

  • @Deepu253
    @Deepu253 2 года назад +3

    help me( i stucked at Started reverse TCP handler in metasploit)help me

    • @onlyfuns7410
      @onlyfuns7410 2 года назад +2

      Same☹️

    • @Deepu253
      @Deepu253 2 года назад +1

      @@onlyfuns7410 how to get rid out of it

  • @Franciscolney
    @Franciscolney 2 года назад

    i watched many of your videos ,live demostrations,etc, i knew that you are an expert... Interesting...

  • @rupadas9040
    @rupadas9040 Год назад

    Wow so lovely vedio... Really amazing.. Well done thanks for sharing this vedio
    . 🙂🙂🙂

  • @Harshethical
    @Harshethical Месяц назад

    Bro! loved your content from India!

  • @whoami_parrot
    @whoami_parrot 3 месяца назад +3

    Dear FBI, I’m watching this for educational purposes only

  • @djvinesse1719
    @djvinesse1719 2 года назад

    Some Info here helped me! Thank you friend!

  • @seiv-
    @seiv- 2 года назад +1

    I mean, you got yourself a meterpreter shell on the server. Why tf you would after that need to login to a random whatever service that the server is hosting ?

  • @KeroZimerman
    @KeroZimerman 2 года назад +6

    I don’t get it. How is removing the “password” type from the password input field make the server accept the verbatim password hash instead? AFAIK, the only thing the “password” property does is display ‘*’s and deny copying its contents. Whatever the user enters *must* be converted to a hash (with salt added) before comparing it to the stored hash.

    • @telischrisos2628
      @telischrisos2628 2 года назад +2

      Haha indeed.

    • @CodrTV1
      @CodrTV1 2 года назад

      My guess is that is the vulnerability that’s being exploited here. Probably Glassfish is looking at the POST body and hashing anything with type password. Because the type was removed, the value of password wasn’t hashed server side and just compared against the stored hashed password.

    • @KeroZimerman
      @KeroZimerman 2 года назад +2

      @@CodrTV1 Yes, that is a plausible explanation. This would be *very* lazy programming, though. The server must *never* assume that the data provided by the client is benign.

    • @CodrTV1
      @CodrTV1 2 года назад

      @@KeroZimerman oh absolutely. But this is why vulnerabilities exist. Inexperienced developers making silly mistakes.

    • @daitedve1984
      @daitedve1984 2 года назад

      There is no need to remove "password" type - it's just for presentation. Actual trick is to prevent JS from hashing your ALREADY HASHED password and send this hash directly to the server (like it's done by JS). Nothing hard and done logical.

  • @pulverizecredibility
    @pulverizecredibility 2 года назад +1

    really nice camera and energy, love it

  • @Goldindollar
    @Goldindollar 2 года назад +2

    Your awesome!! Love the videos you make

  • @rikysharaya5110
    @rikysharaya5110 2 года назад

    thn u very much , even i tried it , it works 👍👍👍👍👍

  • @reinoob
    @reinoob 2 года назад +6

    What about just leaving port 80 open and proxy whatever you need to be open to the world?

    • @2Sor2Fig
      @2Sor2Fig 2 года назад +2

      Yeah, all those services should be running in dockerized containers without publicly exposed ports. Poor systems architecture seems to be 70% of getting hacked.

  • @JesusChrist-zt6rg
    @JesusChrist-zt6rg 2 года назад +4

    Oh God. I'm about to deploy a website all by my big boy self for the first time (meaning not a squares pace website but a website I hard coded **ahem with lots of open source help**). I'm worried it's gonna be vulnerable and now i'm really worried lol. But I'm gonna be much more careful now.

    • @god8774
      @god8774 2 года назад +4

      You called for me? lol jk have a nice day, son.

    • @randomletters1834
      @randomletters1834 2 года назад

      JESUS!!!!!!!!!

  • @essenceidentity
    @essenceidentity 2 года назад

    This was great very useful!!! 😃🤘

  • @alphalearninghub5237
    @alphalearninghub5237 2 года назад

    Thank you. Very good example 👍

  • @tanmoyrajtuhin8653
    @tanmoyrajtuhin8653 2 года назад +2

    Brother, how can I be a member of your youtube channel?

  • @basilbrian
    @basilbrian 2 года назад +1

    Wow! I've been waiting for you😂

  • @wahyono1739
    @wahyono1739 2 года назад +1

    Sudo msfconsole need a passwd and where we can find this passwd ?.if we target a machine is it posible that we know the msfconsole passwd ?

  • @EGTFROUDHACK
    @EGTFROUDHACK 2 года назад +3

    You need to be hiden once you do this, i think you forgot to specify this, any scan you do you're ip gets send to host, so you need to use proxychain

    • @nervonabliss
      @nervonabliss 2 года назад

      Anyone willing to do this should know that already

    • @HenryDamian-x9g
      @HenryDamian-x9g 9 месяцев назад

      Please does this work and have you tried it

  • @SamuraiXProGaming
    @SamuraiXProGaming 2 года назад

    just awesome nice bro just keep moving forward

  • @lauwer_v6504
    @lauwer_v6504 2 года назад +3

    Hello mr hackerloi
    i didn't understand why did u search the exploit elastic or how did you know that it was the exploit to use
    please do answer (love ur vids btw)
    Lauwer

    • @2Sor2Fig
      @2Sor2Fig 2 года назад +2

      Elastic is a common package used to enable search on many websites. He knew to use that exploit specifically because the nmap command returned it as one of the services running on an open port. Don't get too excited, though. There's almost no chance you'd find an open port to a service like that which wasn't password/IP address protected. This only works because the victim machine was intentionally very poorly designed.

    • @lauwer_v6504
      @lauwer_v6504 2 года назад +2

      @@2Sor2Fig Thanks for your answer,
      although i wasn't getting excited, i was just wondering why he did use this exploit other than a other (Thanks again for your answer)

    • @2Sor2Fig
      @2Sor2Fig 2 года назад +1

      @@lauwer_v6504 No probs

  • @adnansheikh4751
    @adnansheikh4751 Год назад

    Hii ,sir your video is great ! I LEARN ALOT OF haking from your channel

  • @hassanwandoow3999
    @hassanwandoow3999 2 года назад +1

    hello how are you i want to learn syp security i want to become syp security but i didn't get good website can your help me pleace am from uganda am waiting your answer and teel me the fees if i manech i learn it

  • @melbinalbert1525
    @melbinalbert1525 2 года назад +1

    Is there any way to track the live location of a mobile phone.

  • @techwithajak
    @techwithajak 2 года назад +1

    Your a best ethical Hacker sir

  • @smiley2827
    @smiley2827 2 года назад

    Thank you, really good example 💪

  • @Kiddie91
    @Kiddie91 2 года назад +1

    Sir, is the target from the AWS cloud?

  • @sadidas1
    @sadidas1 2 года назад

    Sir big fan please reply how to start with your "how to hack series".what shall I know or learn before starting before starting or algorithm of starting it

  • @Notthetylor
    @Notthetylor 2 года назад

    Hi. Is it save for me try to huck something for practice? 🤔

  • @sushant7906
    @sushant7906 2 года назад +2

    Hi , sir can you give us a road map in hacking field like what we learn first and how we become a successful hacker

  • @masterkeyplanolocksmith3674
    @masterkeyplanolocksmith3674 2 года назад +2

    Amazing, but could you please speak a little bit slower please🙏

  • @friendlyapk
    @friendlyapk 2 года назад +1

    I Use Email verification before entring to database! I use passwordless login! Tell what else can I DO?

    • @PraiseThaDon
      @PraiseThaDon 2 года назад

      You know how to hack?

    • @friendlyapk
      @friendlyapk 2 года назад +1

      @@PraiseThaDon i know some testing not a hacker!

  • @cameronrich2536
    @cameronrich2536 Год назад +1

    Only a mad lad would show how to hack their system. I've been telling you guys he's savage

  • @Filipino8729
    @Filipino8729 2 года назад

    hello, how are you. just want to ask how to recover social media got hack and they changed password, name and make it private. i still have my social media link that been hack.

  • @ltthepm
    @ltthepm 2 года назад

    Hello Loi I’m 17 years old starting out in the e-commerce, reselling business buying and selling items from thrift stores to Walmart and target. And throughout this since I can’t have my own debit card yet I have to buy visa gift cards and someone has stolen some of my info I’ve used to register those cards I’m pretty sure. They keep buying something from google play and stole about $150+ if I’m correct and even though that may not seem like a lot to you it’s a lot for me due to the current situation I’m in. what’s a way I can prevent this from happening again and if able to can you or your subs help me out? I wanna find out who the person behind this scam is so they can get justice but the visa website never has customer service available

  • @Dovydas_2024
    @Dovydas_2024 2 года назад

    whre can find this program?

  • @moacirschneider5096
    @moacirschneider5096 Год назад

    hi, i am from brasil, i learn to much from you

  • @Griff0617
    @Griff0617 2 года назад

    Hi Loi Liang Yang i have been hacked and can you pls help me if my pc is still hacked.

  • @BambiOnIce19
    @BambiOnIce19 Год назад

    Just hit 'ENTER' ????? lolol Yes, i've done it before.... But I DO behave these days, just staying out of trouble.... However, i find your videos so very delightful, you are very, very, VERY good. I cannot believe that they even let you publicise all this information - unbelievable

  • @SqurdTheOne
    @SqurdTheOne 2 года назад

    so, if a hacker hacks my outlook. changes its name. (wich i know) how can i hack it?

  • @Steve_Bloks
    @Steve_Bloks 2 года назад +1

    how to install metasploit? i tried sudo apt install metasploit but it didnt work

  • @JJs_playground
    @JJs_playground 2 года назад

    How secure are banking apps on an android phone, with fingerprint biometrics?

  • @tamaragraham8342
    @tamaragraham8342 Год назад

    If you guys want to log in on any websites then you guys should watch these videos about how hackers log in any websites.

  • @rosalindaantonio176
    @rosalindaantonio176 2 года назад

    can u help me about the website that scammed my money?

  • @burikat392
    @burikat392 2 года назад +1

    Hello sir. I have a friend scammed on intime tax refund website. He invested ₱50,000 and got scammed. Can you help my friend sir

  • @dvh3273
    @dvh3273 2 года назад

    Thanks!

  • @itsm3dud39
    @itsm3dud39 2 года назад

    so if we dont know about elastic search engine then game over right?

  • @fflecker
    @fflecker 2 года назад

    Can you realy use the hash in the glassfish config file as the password ?

  • @meysamamarlou7671
    @meysamamarlou7671 2 года назад +1

    why you are so fast😄 please make one video about how to find admin login page

  • @heybigjohnthakyouforsharin2399
    @heybigjohnthakyouforsharin2399 2 года назад

    How to hark awebform through user interface and make changes

  • @bilalkhan-gj5su
    @bilalkhan-gj5su 9 месяцев назад

    Hi Sir how i can change content of someone other website that i am not the owner because some website sharing my property personal information like cars pictures etc?

  • @Rendanik
    @Rendanik 2 года назад

    Is it possible to track a mobile if it's stolen and younonly have IMEI num

  • @iwasthererecording
    @iwasthererecording 2 года назад +1

    What if 2FA is enabled? 🤔

  • @katherinefiori
    @katherinefiori Год назад

    Is there any way I can see my gmail password whilst I am logged in on my pc? I don't remember the password and it is not saved in password manager. Please help 🙏🥺🥺

  • @deadbrad6041
    @deadbrad6041 2 года назад +1

    0:38 i love his threats ahhh like an anime villan!

  • @abiolamashood3829
    @abiolamashood3829 Год назад

    hey can you help get some credible details on how i can access the student portal of our school

  • @janthony824
    @janthony824 7 месяцев назад

    Hi I've been having a lot of issues with cellphone data and home Internet. In the first part of the video you said u know u would know if someone would hack you. Can you explain the process or tools you use for that??

  • @dietrichdietrich7763
    @dietrichdietrich7763 2 года назад

    Okay, how do I protect my WordPress site from this kind of attack?

    • @bluesquare23
      @bluesquare23 2 года назад

      Updates! Automatic updates!!! Get a plugin for it or put a wp-cli command on a cronjob. Always keep ya shit up to date!

  • @mitchellpullin4766
    @mitchellpullin4766 2 года назад

    what program are you using?

  • @AMI13554
    @AMI13554 Год назад

    Failed to resolve/decode supposed IPv4 source address "V": Temporary failure in name resolution

  • @mc.chandra1935
    @mc.chandra1935 2 года назад

    how long does it take time for the result nmap -sV -p1-65535 ipadd ?

  • @just_jc3
    @just_jc3 2 года назад

    Loooooved this video! Thank you Hacker Loi!!!

  • @chandudealer
    @chandudealer 2 года назад

    Sir can be hack betting I'd like casino
    I have a I'd and password now how can be increased point

  • @ibidokielekima2243
    @ibidokielekima2243 2 года назад

    is it possible to get back Facebook acct that has been hacked.username and password delete

  • @shvutami
    @shvutami 2 года назад +1

    What software do you work with? I would love to try weaknesses on my site

  • @nerdygeek9865
    @nerdygeek9865 2 года назад +3

    Let’s face it some of us are here to get revenge on someone

    • @3dsbros64
      @3dsbros64 2 года назад +1

      And let's be realistic for those who want that: You will not be able to hack that person. *cries*

    • @ep11-o7s
      @ep11-o7s 2 года назад

      @@3dsbros64 sadly 😢

    • @3dsbros64
      @3dsbros64 2 года назад

      @@ep11-o7s ye i know
      3dsbros64 0001

  • @vampiregoat69
    @vampiregoat69 2 года назад

    gotta love how hackers talk just as fast as they type none stop

  • @jacoblessard8213
    @jacoblessard8213 2 года назад +1

    Whatever you do, don't tell them you know who is Hacker Loi 👀

  • @thehippo_
    @thehippo_ Год назад

    Hacker loi, how do i use a video from a website without them noticing i am using their video on my own website? Thank you.

  • @dollymartin3035
    @dollymartin3035 2 года назад

    Good day sir please how can I become a member of this channel sir …

  • @exkpk4428
    @exkpk4428 2 года назад

    Bro please reply I need your help , when I type run then i got error and Java has not executed aborting
    , please help

  • @allaroundtworld
    @allaroundtworld Год назад

    Some sites ask for id number instead of username. Does this method work?

  • @ilanamper9436
    @ilanamper9436 2 года назад

    i tried the Metrix on a wix site and that doesn't work, any different attacks that works on wix servers ?

  • @mustaqimahmed3304
    @mustaqimahmed3304 2 года назад

    Can you show a video if some sites use vpn how to hack them;

  • @tusharchavan5315
    @tusharchavan5315 2 года назад

    can we get a link in description for that vulnerable machine

  • @Txhtluvr
    @Txhtluvr 2 года назад

    Hi sir, I need your help. Please

  • @vinothnatarajan9154
    @vinothnatarajan9154 2 года назад

    Hi,
    very interesting, i love this, how to connect you to learning.... pls help me out...

  • @miraubaidahmad...2317
    @miraubaidahmad...2317 2 года назад

    Sir how we can know that any upcoming pdf or image is containig payload

  • @desiremtetwa2410
    @desiremtetwa2410 2 года назад

    what is the programming language you are using

  • @pa32779
    @pa32779 2 года назад

    0:45
    *That crap scares me man, pls no evil laugh* XD

  • @javaplayer7011
    @javaplayer7011 2 года назад

    Hello i am new to your channel what you using? Windows terminal?

  • @jessearaiza
    @jessearaiza Год назад

    I think I met you in real life bro😁

  • @jackeyzhu3702
    @jackeyzhu3702 Год назад

    Sorry in advance for my noob question, but why were you able to get into the full file system just from one compromised port?

    • @CYBOXTOOLONINSTAGRAME
      @CYBOXTOOLONINSTAGRAME Год назад

      with his help🔝🔝 all account can be access and all password can be hacked. His the best

    • @ayylmao1558
      @ayylmao1558 Год назад

      He used a remote code execution vulnerability that created a shell on the server

    • @jackeyzhu3702
      @jackeyzhu3702 Год назад +1

      @@ayylmao1558 thank you for answer. Can you clarify a bit further what code was used and how did that help creating the shell?

  • @darkness8876
    @darkness8876 2 года назад +1

    Dude 😂 That greeting was off the charts hallarious!🤣🤣

  • @PrakashParu
    @PrakashParu 2 года назад

    Love from Nepal 🇳🇵🇳🇵