multarncat November 17,2017 The quality of this video is much lower than the previous tutorials, making it difficult to read. This is useful during code development to test how secure your code is. As I mentioned in a previous comment, passwords should never be stored in cleartext and the authentication function should not be performed within the executable. I find it hard to believe that many developers still use such poor coding practices. No large software developer makes their keys this easily bypassable or discoverable, as many require online validation prior to usage and almost always require revalidation when performing updates.
mcarpiomat November 20,2017 I like that this video brings up the point about actually finding a good vs. bad message. It would be helpful if the explanation of the process was more specific and went further into details. Also, it was interesting to see how the username and password were obtained. While this tutorial gave me a great basis, I would like to see this technique on a more complex program that carries a more complex form of authentication in place and see how one would get around those obstacles.
secallahanat December 05,2017 I thought the other videos were more insightful than this one. It often seems like the narrator isn't completely sure what he's doing or trying to achieve.
ahmadh456at December 09,2017 Since each application is built using different languages and application development software, I can't imagine this working for majority of applications out there. It's a good tool to use to examine and analyze applications to see what it processes in the backend.
SarahDavisat December 12,2017 Even though this is very cool and it shows how to find the password, I feel like this video is repetitive of the past few in this series. I know the information is different, slightly, but it all just sounds very repetitive. But, I do like how this video shows you exactly how to find the password.