Packet Switched Network Search Results

Hack Like a Pro: Advanced Nmap for Reconnaissance

Welcome back, my novice hackers! Reconnaissance is one of the most important preparatory steps to hacking. As I have emphasized many times before here on Null Byte, you must know the operating system, the ports, the services, the applications, and sometimes even the language of the target to be effective. If you haven't taken the time to gather this info, then you are likely wasting your time.

How To: Do a small packet double lift card trick

Learn to do a small packet double lift card trick. With this video tutorial, you'll better your skills as a magician, and learn the proper techniques and presentation involved when performing a small double lift magic card trick. This is a great addition to your sleight of hand repertoire. Made by Richard Scorpio. Do a small packet double lift card trick.

How To: Easily make a no bake cheesecake

In this video, we learn how to easily make a no bank cheesecake. First, you will need to buy a Jell-O no bake cheesecake box and you will also need 1/2 stick butter, 1.5 c milk, 34 tbsp sugar, and a bowl. Now, take the butter and place it into a bowl and microwave it until melted. After this, add in the crust packet from the box and mix together with sugar using your hands. After you pack this down on the bottom of a pie pan, then pour the filling packet into a bowl and add in water with it, ...

How To: Cook pork chop dinner in skillet rice

In this tutorial, we learn how to cook a pork chop dinner in skillet rice with Jack Scalfani. Ingredients include: Rice-a-Roni, 2 tbsp butter, 2 1/2 cup water, and 3 pork chops. Place your skillet over high heat and drop in your butter and let melt. After the butter is melted, add in your Rice-a-Roni box and lower the flame to a medium. Don't add in the flavor packet that comes with the package just yet. SautŽ your rice and butter, mixing frequently until everything has browned. Now, add in y...

How To: Make perfect ramen noodles

This video is a demonstration of how to make the perfect ramen noodles. The requirements for the recipe are 2 packets of ramen noodles, milk and vegetable oil. Using butter instead of oil enhances the taste of this recipe. Water is heated in a pan and the noddles are added to hot water. Let the water boil and cook the noodles till they turn soft. Drain the water from the noodles using a strainer and put it back in the pan. Add half a cap of vegetable oil to the strained noodles and mix thorou...

How To: Make homemade bread crumbs

This video demonstrates how bread crumbs can easily be made at home. Two methods are shown for this. For both the methods first bread has to be dried in oven at 230 degrees. For this you can use fresh bread or stale bread. After heating the bread should become dry and hard. In the first method, break the dried bread into smaller pieces and put in a blender. Start the blender and crush them. Your bread crumbs are ready. In the second method Put the dried bread in a plastic bag and close the ba...

How To: Make BBQ beef ribs

Follow the simple ViewDo steps on how to make perfect Barbeque Beef Ribs. The first step will show you how long to sear the ribs on each side before applying your favorite barbeque sauce. Once the ribs are seared watch and follow the instructions on saucing then sealing the ribs within a packet made from aluminum foil that you will slowly cook and steam on your barbeque grill. After and one hour and a half, open your packet and you will have the perfect fall off the bone beef ribs! Enjoy!

Hack Like a Pro: Scripting for the Aspiring Hacker, Part 2 (Conditional Statements)

Welcome back, my greenhorn hackers! I recently began a series on scripting and have received such positive feedback that I'm going to keep this series going. As I've said before, to graduate from the script kiddie to the pro hacker, you'll need to have some scripting skills. The better you are at scripting, the more advanced your hacking. Ultimately, we are leading up to developing the skills to build your own zero day exploits.

How To: Intercept Images from a Security Camera Using Wireshark

It's common for IoT devices like Wi-Fi security cameras to host a website for controlling or configuring the camera that uses HTTP instead of the more secure HTTPS. This means anyone with the network password can see traffic to and from the camera, allowing a hacker to intercept security camera footage if anyone is watching the camera's HTTP viewing page.

How To: Enable Monitor Mode & Packet Injection on the Raspberry Pi

The Raspberry Pi Zero W and Pi 3 Model B+ include integrated Wi-Fi, Bluetooth Low Energy, and more than enough power to run Kali Linux. They sound like perfect all-in-one penetration testing devices, but the lack of support for monitor mode and packet injection usually meant buying a supported Wi-Fi adapter. Now, it's possible to use monitor mode on the built-in Wi-Fi chip with Nexmon.

Hack Like a Pro: How to Create a Nearly Undetectable Covert Channel with Tunnelshell

Welcome back, my rookie hackers! Most often, the professional hacker is seeking protected information from the target system or network. This might be credit card numbers, personally identifiable information, or intellectual property (formulas, plans, blueprints, designs, etc.). Most of my Null Byte guides have been focused on getting into the system, but this only begs the question—"what do I do when I get there?"

News: Anonymity, Darknets and Staying Out of Federal Custody, Part Two: Onions and Daggers

In the first part of this series, we learned about darknets, as well as how they came about. But these patches of forgotten Internet are not the oasis of free information you might think. Despite being hidden—or just harder to come across—these networks are no more safe then anywhere else on the 'clear' Internet. The nature of networking and routing means your location is always known in server logs. It only takes one phone call to your ISP with your IP address to obtain both your physical ad...

Hacker Fundamentals: A Tale of Two Standards

If you read my article on the OSI model, you got a good overview on communications from that model's perspective, but how does that relate to TCP/IP? We're going to take it a step further, getting into the idea behind the two address concept. How does an IP address and a MAC address work together? If you want to hijack sessions and all sorts of lulz like that, you need to understand these concepts. Let's get into it, mates!

Tor vs. I2P: The Great Onion Debate

In my recent Darknet series, I attempted to connect the dots on the Deep Web. I covered the two largest anonymity networks on the Internet today, Tor and I2P. While my initial four articles were meant as an introduction, I ended up receiving a lot of interesting comments and messages asking the technical differences between the two. I'd like to thank all of you for letting me know what was on your minds, as you should always!

How To: Unlock an iPhone 4 / 3GS / 3G with Ultrasn0w to use it on another cell carrier

The iPhone has always has one very big problem: that it is tied to AT&T. AT&T is a terrible network, and many iPhone users out there are probably dying to switch network but keep their awesome phone. Well now they can! This video will show you how to unlock you jailbroken iPhone 4, 3GS, or 3G using a program called Ultrasn0w, leaving it ready for use on any cell carrier in the country. Except Sprint, they don't have SIM cards.

How To: Install an .apk file on a Google Android smartphone

If you're interested in installing an application that you can't find in the Android Market, you'll need to use an apk (or Android packet) file. Don't know how to load an apk onto your phone? No problem: this Android owner's guide will walk you through the process. You'll find that, with a file manager application like Astro File Manager, it's a snap.

How To: Obscure your OS fingerprint

Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to obscure your OS fingerprint.

How To: How The Internet Works

Sure, you go online to email and shop and do research. But have you ever been curious about how the internet actually works? Don't worry, you don't need a degree in computer science to get a handle on how your info gets from point A to point B. Learning the basics of the internet will give you a whole new appreciation for all those emails and chat messages that seem to magically appear. Get ready, because we're about to enter the wonderful world of digital data!