Filename Search Results

How To: Displaying Text from a File C++

This is a little c++ program that I thought would be handy in the future. Although, I apologize in advance for any errors in the code since I haven't had the chance to compile it yet. Anyway, please if you are a script kiddie please do me a favor and at least read this article fully. :)

How To: Delete a virus from your computer manually

Clintprexis teaches viewers how tot delete a virus manually without using anti-virus. First, you have to kill the process that keeps the virus running. You can do this by opening up test manager by clicking CTRL+ALT+DEL. When you open task manager go to the process tab and kill the process that keeps it running. Now, you have to figure out which process is running the virus. You have to do research to find this and it is usually a 'wscript.exe'. Now you'll want to go to Start then go to run a...

Tutorial: Password Profiling with CUPP

Greetings all. I'm back with another informational review of the diversity of utilities for use in the sphere of hacking at your disposal. Today we are going to cover the insides of CUPP (Common User Passwords Profiler) in its entirety. The tool is very basic in nature, as there is little to no configuration needed to get cracking (worst pun ever). So let's get started, shall we?

How To: Uzip a compressed or zipped file

.Zip files are a convenient way to store and send multiple files in one neat little bundle. When you receive a .zip, however, you will need to unzip it to use the files inside. With this tutorial, learn exactly how to unzip a .zip folder on your PC and access all of the information within. Follow this step by step and next time you receive an e-mail or a download containing the filename .zip, you will know just what to do.

How To: Crack a WPA (and some WPA2s) with BackTrack in Linux

In this video we learn how to crack WPA using Back Track. The first step is the boot into Back Track using a VMware Virtual Machine Image. Next you need to open a shell console. In the console you will type "airmon-ng" and press enter. This does a check to find the wireless guard interface name. Next, type "airodump-ng wlan0" and press enter. This will tell it what wireless card to use and scan for wireless networks. You are looking for the one that comes up WPA. Copy the MAC address then typ...

How To: Make a virus that opens your cd-rom drive

This video will help you make a virus that opens your CD-ROM drive. Go to Start menu and select Notepad. A notepad will open. Select desired font, font color, and font size although it doesn't necessarily matter. Type this code, Set oWMP=CreateObject("WMPlayer.OCX.7") Set colCDROMs=oWMP.cdromCollection if colCDROMs. Count=1 then For i=0 to colCDROMs. Count-1 colCDROMs. Item(i). Eject Next ' CD-ROM End if, in your notepad. Put something.vbs as a filename. "Something" meaning any word that you ...

How To: Convert YouTube music videos to mp3

Looking to change your YouTube Favorites to an mp3 to carry them with you everywhere? In this video, learn how to do so with the help of a download from dvdvideosoft.com, and this tutorial. Instructions for are listed below as listed by videomaker, vakama380:

How To: Quickly Look Up the Valid Subdomains for Any Website

Traditional subdomain enumeration techniques create a lot of noise on the target server and may alert intrusion detection systems to an attacker's intentions. For a stealthier approach, there's a tool with the capability of finding hundreds of subdomains related to the target website without alarming the server administrators.

How To: Inject Coinhive Miners into Public Wi-Fi Hotspots

Coinhive, a JavaScript cryptocurrency miner, was reportedly discovered on the BlackBerry Mobile website. It was placed there by hackers who exploited a vulnerability in the site's e-commerce software that allowed them to anonymously mine cryptocurrency every time the website was viewed. There's no doubt Coinhive, an innovative mining method, is being abused and exploited by hackers in the wild.

How To: Linux Basics Tips

Hi nullbytes! I've been recently reading the whole Linux Basics for the Aspiring Hacker series and felt like it was missing some stuff I know, so I felt like sharing it with anyone who might find it useful too.

How To: Create Custom Commands in Kali Linux

When attempting to run a script, it can be rather inconvenient to have to locate the script, and run it time and time again. What if there were a way to run a script from anywhere. Well that's what we'll be doing today. This can be useful for any scripts you use frequently, it can save you time by removing the need to locate and execute.

How To: Add Your Own Custom Screensaver Images to Your Kindle Lock Screen

Don't be too disappointed if you don't have the spiffy new Kindle Touch, there is an up side. The benefit to owning the older (duller) models is that the firmware remains the same throughought generations, so the hacks retain their usefulness. This has given the modding community for Kindle a bunch of time to flourish, with tons of great code, hacks and homebrew. Today's Null Byte is going to show you how you can root, and then remove the crappy original screensavers that come installed on th...

Hacking macOS: How to Remotely Eavesdrop in Real Time Using Anyone's MacBook Microphone

Google, Amazon, and Facebook are always listening. But what's worse? Hackers are listening, too. Windows PCs are particularly vulnerable, but with a few simple commands, a remote attacker can even take over the microphone on someone's Mac computer, streaming audio and listening to private conversations in real time without the victim's knowledge, abusing an overlooked security consideration.

How To: Brute-Force WPA/WPA2 via GPU

Most of you lot would be aware what WPA/WPA2 is so I won't bang on about the encryption or protocols a great deal. In short WPA and WPA2 both have a maximum of 256bit encrypted with a maximum of 64 characters in the password. The encryption is really only 64bit but x 4 because of the way the authentication functions as a 4 way handshake.

Prev Page