Комментарии:
Is it possible to perform cybersecurity tasks without relying on third-party tools like Burp Suite or similar software? I'm transitioning from software engineering to the cybersecurity field, with experience in programming and Linux. What I've observed is that many professionals heavily rely on specific tools, which are essentially third-party software. However, my aim is to grasp the underlying concepts rather than becoming dependent on a particular tool from a specific company or organization.
For instance, in software development, I can write programs using various languages like Python, Java, Ruby, C#, Rust, Golang, and even learn new languages because I understand the fundamentals of how software works. Similarly, in cybersecurity, I want to understand the core principles behind tasks like SQL injection rather than simply using a tool that facilitates it. While tools like Burp Suite provide a user-friendly interface, they essentially automate tasks that can also be done manually.
My concern is that if a company were to cease providing a particular tool, would I still be capable of performing the tasks using only terminal commands or writing my own scripts? I want to develop the ability to conduct penetration testing and other cybersecurity tasks without relying solely on such tools. What if the company I get the job don't wanna use external tools like that? You know what I mean?
Essentially, I'm seeking guidance on how to study and improve in this field while minimizing dependency on specific software tools.
anyone from Nigeria??
Ответитьsir y dont you do bug bounty ? i think ya method of teaching is better understandable , can you do a vid for us on bug bounty ????
ОтветитьOk Full Control windows security eset have trash web Protection no Problem
ОтветитьDude, I love your personality! I just found you and your awesome! Subscribing now!
Ответитьthanks boss
ОтветитьHow to unlock a stolen iphone lock 😊😅
ОтветитьBurpSuite our savior
Ответитьfrom where do u find these payloads? @Loi Liang Yang
ОтветитьThanks for uploading videos Loi, I have been watching your videos for the last 1.5 years and learn from nothing to a looooot!
Ответитьok why we cant use axios in NodeJS instead of all of this and NodeJS can run in many OS??
2- and if we have a proxy server mange this between the site and the server and SQL DB u cant its impossible I think that
How can chat whit you
Ответитьcreate it to open a locked Facebook session❤
ОтветитьBikin cara hack game slot suhu
Ответить👏
ОтветитьI need help
ОтветитьLoi how i can become a Member plz😢
Ответитьkeep up
Ответитьcool 😅
Ответитьthis looks amazing. looking forward to start learning! subbed btw
ОтветитьCan you please make a video of how to track your lost phone with the IMEI number on kali
ОтветитьMr. loi, can you help me to recover my hacked discord account? :(
ОтветитьWow, handsome uncle Loi
ОтветитьJust amazing... Thank for the full content
Ответить:3 You know what would be cool, a transparent, wedged design of a barrier around files and folders, which would be an alternative to just using a folder. I just thought of it. Haha
Ответить:3 I don't know how people do that. Haha. They're not even organized by types. Haha. I prefer more folders, and better yet, just the garbage bin on my desktop. Lol. That's why I have a toolbar with pinned software for.
Ответитьsell another course man already
ОтветитьBro you just hack my country 😂
Ответить👏 🍿
ОтветитьMy brain 😭🔥
ОтветитьDestul de bun. xD
ОтветитьCan u hack my likes ?? Make it say 1.2 million. A challenge for a hacker ❤
ОтветитьPress like if u have read this👍
ОтветитьBeing an apprentice of @hackerloi would boost your career swiftly! ☺️
Ответитьmake a video how to hack with windows....(no linux)
ОтветитьYou need a hoody.
ОтветитьThank you Mr hackerloi from the Philippines.
Ответитьdude make a vdo on hacking into non ssl protected wordpress website
Ответитьyou are a genius man, but how do you make it?
Ответитьhey loi please make videos on parrot os
ОтветитьWhat about learning how to defend ourselves from hackers. I am a targeted individual and being a victim of cyber criminals is NOT fun
ОтветитьWhat I'm curious about is if, while you are doing this, are u visible to the website you are testing?
ОтветитьBest Kali Linux tutorials on the web.
ОтветитьLoi's desktop is a mess, just like his life choices. ✌️😅
ОтветитьBoom 😅
ОтветитьCOOL!
ОтветитьWho tf will include their sql error in the error response? The custom error usually is implemented to resolve these low-level exceptions
Ответить