-
multarnc
at November 17,2017
The quality of this video is much lower than the previous tutorials, making it difficult to read. This is useful during code development to test how secure your code is. As I mentioned in a previous comment, passwords should never be stored in cleartext and the authentication function should not be performed within the executable. I find it hard to believe that many developers still use such poor coding practices. No large software developer makes their keys this easily bypassable or discoverable, as many require online validation prior to usage and almost always require revalidation when performing updates.
-
mcarpiom
at November 20,2017
I like that this video brings up the point about actually finding a good vs. bad message. It would be helpful if the explanation of the process was more specific and went further into details. Also, it was interesting to see how the username and password were obtained. While this tutorial gave me a great basis, I would like to see this technique on a more complex program that carries a more complex form of authentication in place and see how one would get around those obstacles.
-
secallahan
at December 05,2017
I thought the other videos were more insightful than this one. It often seems like the narrator isn't completely sure what he's doing or trying to achieve.
-
ahmadh456
at December 09,2017
Since each application is built using different languages and application development software, I can't imagine this working for majority of applications out there. It's a good tool to use to examine and analyze applications to see what it processes in the backend.
-
SarahDavis
at December 12,2017
Even though this is very cool and it shows how to find the password, I feel like this video is repetitive of the past few in this series. I know the information is different, slightly, but it all just sounds very repetitive. But, I do like how this video shows you exactly how to find the password.