Discovering Search Results

How To: Discover & Attack Raspberry Pis Using Default Credentials with Rpi-hunter

When setting up a Raspberry Pi, it's easy to overlook changing the default password. Like many IoT devices, the Raspberry Pi's default Raspbian operating system installs with a widely-known default password, leaving the device vulnerable to remote access. Using a tool called rpi-hunter, hackers can discover, access, and drop custom payloads on any weak Pi connected to the same network.

How To: Discover Hidden Subdomains on Any Website with Subfinder

When approaching a target, having a precise and detailed plan of attack is absolutely necessary. One of the main goals is to increase the attack surface since the more opportunities there are for exploitation, the greater the chances of success. Subdomain enumeration is one method used to increase the attack surface, and we'll be using a tool called Subfinder to discover hidden subdomains.

News: Cantio Helps You Discover New Music (Using YouTube)

When it comes to finding great new tunes for your music collection, the last place you would think to look is YouTube. But more and more artists are posting music videos on the popular video hosting site as a means to getting noticed and hopefully—building a fan base. And since YouTube is not just a music video site, there's quite a bit of junk to sift through, making it virtually impossible to find new songs to add to your iPod's repertoire... unless you use Cantio.

News: Discover the Hidden World Around You with the Trover iPhone App

You're in a new city and you want to explore—what mobile app is best? If you want to know what club is hopping that night, use SceneTap. If you want to know if any friends are at a nearby get-together, use Foursquare. If you want to know what restaurant is best, try Yelp. But if you're looking to get a real feel for the city, skip the more touristy destinations and take to the streets—discover where some great graffiti is located or where the best view of the city is with the Trover iPhone ap...

How To: Remove shadows from a photo in Photoshop

Photoshop remains one of the coolest digital editing tools of all time, and if you're a user, you're likely discovering new tricks every day. One of the most helpful tricks is removing a shadow from an object, such as a face, a car, a cat, a dog or like this tutorial, a child. This excellent tutorial walks you through each and every step to show you how to use Adobe Photoshop to make those shadows vanish. Check it out and clean up your photos today!

How To: Stay safe during a power or gas outage

There are many different things that could contribute to a power or gas outage or accident in your home. To be properly prepared for an emergency or other situations that endanger you, take a look at this video from SDGE on simple tips to keep safe, including discovering gas leaks and using power generators to maintain eletricity in your home during an outage.

How To: Quickly find the PIN and phone number of a BlackBerry phone

This clip demonstrates a pair of handy shortcuts for discovering the PIN and phone number of a BlackBerry phone. Whether you're the proud owner of a BlackBerry smartphone or are merely considering picking one up, you're sure to be well served by this official video guide from the folks at Blackberry. For detailed information, including step-by-step instructions, take a look.

How To: Find an LCM or GCF with the Indian method

Looking for an easy method for discovering the lowest common multiple (LCM) and/or greatest common factor for a set of numbers? Try the Indian method! Learn how with this free video lesson. From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds have belonged to autodidacts. And, thanks to the Internet, it's easier than ever to follow in their footsteps (or just finish your homework or study for that next big test).

How To: Practice nude beach etiquette

Is the proper term nudists or naturalists? Doesn't seem to be too much of a difference, because when it all boils down, they're both still butt-naked on the beach. Nude beaches are fascinating places for the adventurous spirit, but unless you’re an old-time nudist, you probably have questions about the proper way to behave on a nude beach. Well, we’ve got the answers.

How To: Use Maltego to Fingerprint an Entire Network Using Only a Domain Name

Hackers rely on good data to be able to pull off an attack, and reconnaissance is the stage of the hack in which they must learn as much as they can to devise a plan of action. Technical details are a critical component of this picture, and with OSINT tools like Maltego, a single domain name is everything you need to fingerprint the tech details of an organization from IP address to AS number.

How To: Use Maltego to Target Company Email Addresses That May Be Vulnerable from Third-Party Breaches

The easiest way around a security policy is to find users who don't follow it. The Have I Been Pwned database identifies accounts with information breached by major third parties like Yahoo and LinkedIn. With Maltego, hackers can locate breached accounts created using company email addresses, potentially giving attackers access to a company account if the employee reuses a compromised password.

How To: Identify Web Application Firewalls with Wafw00f & Nmap

Web application firewalls are one of the strongest defenses a web app has, but they can be vulnerable if the firewall version used is known to an attacker. Understanding which firewall a target is using can be the first step to a hacker discovering how to get past it — and what defenses are in place on a target. And the tools Wafw00f and Nmap make fingerprinting firewalls easy.

Prev Page