Specifies Search Results

How To: Transfer photos from your iPhone to your Mac

This video tells us the method to transfer photos from your iPhone to your Mac. In the first step, launch the image capture. Connect your iPhone to Mac via a USB cable. 'Download To' option is used for specifying the folder in which you want the downloaded files. 'Automatic Task' specifies the task which the application must do after the transfer of files is over. Go to the 'Download Some' option. Select the file(video or photos) you want to transfer. Choose the download folder and click 'Ope...

How To: Perform a digital nose job in Photoshop

This Photoshop tutorial on performing a nose job using Photoshop contains detailed instructions on the use of Photoshop tools to, depending on taste, enhance the appearance of an individual. The person narrating the tutorial specifies the necessity of subtlety with the modification of the picture in order to remove any appearance of modification. The way described is essentially to select the general nose area, feather the selection by an optional amount, and set it in a separate layer. Then ...

How To: Build a P-90 prop gun

The FN P90. Everybody wants one, but more than likely, you can't get your hands on one, especially if it's illegal in your area. Designed by FN Herstal back in the 80's, the P90 personal defense weapon is the cream of the crop. It's full name, Project 90, specifies a weapon system of the 1990's. If you want this firearm for a weapon prop or just to have, you can easily build one yourself with household materials, mostly cardboard. Watch this video tutorial to learn how to build a P-90 prop ca...

How To: Graph a line using an x-y table

In this video the instructor shows how to graph a line using X-Y table values. He specifies a four step approach. In the first step he picks numbers for the value of x. In the next step he substitutes the values of x in the equation of the line to obtain the corresponding y values, in the third step he plots these ordered pairs on a graph sheet. Finally in the fourth step he joins them resulting in a straight line for the given equation. This video clearly shows how to graph a line using an X...

How To: Clean the condensate drains on your air conditioner

Check out this instructional home repair video that shows you a very simple way to clean the condensate drain on your air conditioner. If you follow these simple steps, it could save some money, not to mention the grief. If you have an A/C and have ever experienced a backed up condensate drain, you know what I mean. Avoid this inconvenience by watching this air conditioning tutorial video.

Steganography: How to Hide Secret Data Inside an Image or Audio File in Seconds

Steganography is the art of hiding information in plain sight, and in this tutorial, I'll show you how to use Steghide — a very simple command line tool to do just that. In addition, I'll go over a bit of conceptual background to help you understand what's going on behind the scenes. This is a tool that's simple, configurable, and only takes a few seconds to hide information in many file types.

How To: Brute-Force FTP Credentials & Get Server Access

Hackers often find fascinating files in the most ordinary of places, one of those being FTP servers. Sometimes, luck will prevail, and anonymous logins will be enabled, meaning anyone can just log in. But more often than not, a valid username and password will be required. But there are several methods to brute-force FTP credentials and gain server access.

How To: Hack Apache Tomcat via Malicious WAR File Upload

Web applications are a prime target for hackers, but sometimes it's not just the web apps themselves that are vulnerable. Web management interfaces should be scrutinized just as hard as the apps they manage, especially when they contain some sort of upload functionality. By exploiting a vulnerability in Apache Tomcat, a hacker can upload a backdoor and get a shell.

Exploit Development: How to Manipulate Code Execution with the Instruction Pointer

The one thing that separates a script kiddy from a legitimate hacker or security professional is the ability to program. Script kiddies use other people's tools, while hackers and security pros write their own tools. To that end, we're going to see how a stack overflow vulnerability allows us to flood a variable with enough input to overwrite the instruction pointer with our own commands.

How To: Bypass UAC & Escalate Privileges on Windows Using Metasploit

UAC is something we've all dealt with on Windows, either as a user, administrator, or attacker. It's a core feature of the Windows security model, and for the most part, it does what it's supposed to. But it can be frustrating as a hacker when attempting privilege escalation, but it's easy enough to bypass UAC and obtain System access with Metasploit.

How To: Use UFONet

With the release of the Mirai source code, botnets are back in a big way. In the early days of botnets, zombies (infected hosts) would report to IRC (Internet Relay Chat) channels for CNC (command and control) instructions. Modern botnets have evolved, but they continue to use the same concepts as their predecessors.

How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack

Cracking the password for WPA2 networks has been roughly the same for many years, but a newer attack requires less interaction and info than previous techniques and has the added advantage of being able to target access points with no one connected. The latest attack against the PMKID uses Hashcat to crack WPA passwords and allows hackers to find networks with weak passwords more easily.

How To: Upgrade a Dumb Shell to a Fully Interactive Shell for More Flexibility

One of the most exciting things as an ethical hacker, in my opinion, is catching a reverse shell. But often, these shells are limited, lacking the full power and functionality of a proper terminal. Certain things don't work in these environments, and they can be troublesome to work with. Luckily, with a few commands, we can upgrade to a fully interactive shell with all the bells and whistles.

How To: Program Your Own Little RAT (Part 1) Getting the Server Working

I saw many people asking for a Tutorial about writing their own Remote Administration Tool, so I now introduce you in a basic kind of RAT. This program is not for real use, but for learning how you could write this kind of tool. It will be basicly coded and not very refined. I used Python 3, so you have to install it if you want to use this program unchanged. Also this RAT is for Windows and almost all features won't work under Linux.

Hacking macOS: How to Perform Situational Awareness Attacks, Part 1 (Using System Profiler & ARP)

The first few minutes after gaining access to a MacBook are critical — but where do we begin? Using tools built into macOS, we can develop an in-depth understanding of running background processes, detect antivirus software, locate sensitive files, and fingerprint other devices on the network. All of this can be done without installing additional software or modifying any files.

News: What the Pixel 2's New IP67 Water-Resistance Rating Really Means

Not to be outdone by Apple and it's new line of flagship phones, Google has followed suit and finally announced the followup to their highly regarded Pixel line of handsets — the aptly named Pixel 2. Thankfully, the tech giant has also joined in on the trend towards more durable devices, and has engineered both the Pixel 2 and Pixel 2 XL to have a rating of IP67 under the IEC standard 60529.

Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 13 (Mounting Drives & Devices)

Welcome back, my aspiring hackers! One of those areas of Linux that Windows users invariably struggle with is the concept of "mounting" devices and drives. In the Windows world, drives and devices are automatically "mounted" without any user effort or knowledge. Well, maybe a bit of knowledge. Most Windows users know to unmount their flash drive before removing it, but they usually think of it as "ejecting" it.

Prev Page