Capability Search Results

Hack Like a Pro: How to Build Your Own Exploits, Part 3 (Fuzzing with Spike to Find Overflows)

Welcome back, my hacker novitiates! In the previous two posts in this series, we looked at the basics of buffer overflows. In this post, we will look at one technique for finding buffer overflows. We will try to send random, oversized, and invalid data at a variable to see whether we can make it crash or overflow. This process is known as fuzzing. It is often the first step to developing an exploit, as we need to find some variable that is susceptible to overflowing.

How To: Get Rid of Facebook Stickers from Your Timeline & News Feed

While stickers have long existed in the messages section of Facebook, they've only just recently rolled out sticker capability in comments for events, groups, and timeline posts. That means you can now reply with a cute sticker of a cat eating a slice of pizza on someone's status instead or writing something more thoughtful. While an animated sticker can show off enthusiasm and excitement that words or a too-simple emoji may not be able to convey, you can bet that your comment section will qu...

How To: Listen to Text Messages and Other Notifications While Driving—Without Touching Your Phone

The car is arguably one of the worst places to receive a text message. You know you can't resist looking, and when you do, your attention is no longer on driving, it's on reading the latest gossip or whatever. You take your eyes of the road for just a few seconds and you could get an expensive ticket, or even worse—an accident. But you can't just ignore that notification sound or vibration, can you? So, if you just have to know what it says right then and there, why not at least do it in a sa...

How to Hack Like a Pro: Getting Started with Metasploit

This is my first contribution in an ongoing series on detailing the best free, open source hacking and penetration tools available. My goal is to show you some of the quality tools that IT security experts are using every day in their jobs as network security and pen-testing professionals. There are hundreds of tools out there, but I will focus and those that meet four key criteria:

News: Everything You Need to Know About the iPhone XR

The iPhone XR has touched down alongside the XS and XS Max, and it utilizes tried and tested materials found on the iPhone 8, while being molded in the same vein as the iPhone X. The budget-friendlier flagship comes with its own set of design elements to set it apart from its more expensive brethren, but is powered by the same SoC, making it is a solid choice if you're thinking of upgrading.