Proxy Ready Search Results

How To: Leverage a Directory Traversal Vulnerability into Code Execution

Directory traversal, or path traversal, is an HTTP attack which allows attackers to access restricted directories by using the ../ characters to backtrack into files or directories outside the root folder. If a web app is vulnerable to this, an attacker can potentially access restricted files that contain info about all registered users on the system, their permissions, and encrypted passwords.

How To: Use Private Encrypted Messaging Over Tor

Tor is an excellent obfuscation network for web traffic, and while instant messaging over the network is very useful, it can be relatively difficult to configure. In this guide, we'll look at two synchronous communications platforms (instant messengers) which can be routed over the Tor network, Ricochet and XMPP.

How To: Get VPN Connection

This how-to is for everybody who faced the problem of intercepting personal data sending through the Internet and is looking for fast and secure method to protect his activity in the global network.

How To: Hack SAML Single Sign-on with Burp Suite

Single sign-on (SSO) lets users login across different sites without having to manage multiple accounts. I'm sure most of us appreciate the convenience of seeing "Sign in with …" buttons that let us login with a single username. Hackers, however, see a possible avenue for exploitation, and you'll soon learn how an attacker can exploit a SAML vulnerability to assume another user's identity.

My OS: Bugtraq II Black Widow

Welcome back my precious hackerians. Today i would like to promote an OS which i have been using for the past couple months. I'm not talking about Backtrack 5 or Kali Linux. Something even more promising:

How To: Hack a remote Internet browser with XSS Shell

XSS Shell is a cross-site scripting backdoor into the victim's browser which enables an attacker to issue commands and receive responses. During a normal XSS attack an attacker only has one chance to control a victim's browser; however, the XSS Shell keeps the connection between the attacker and the victim open to allow the attacker to continuously manipulate the victim's browser. XSS Shell works by setting up an XSS Channel, an AJAX application embedded into the victim's browser, that can ob...

Dark Side of the Prism: Get Alerted Whenever You Visit a Website Owned by a PRISM-Targeted Company

Since The Guardian published leaked documents exposing the depth of the NSA's spying powers, many people who've never put much effort into protecting their privacy are finally starting to pay attention. Evidence of public opinion concerning PRISM can be seen from the rise in traffic for pro-privacy sites like DuckDuckGo to the petitions demanding that the program be scaled back or done away with altogether. Some would argue that you waive your right to privacy by signing the terms of agreemen...

How To: Access blocked websites on school computers

In this video you will learn how to get past website blocks on your school network. Some school computers have command prompts blocked. If this is the case then you will want to open a notepad. In the notepad type command, then save as something school related, making sure the file name ends with .bat. Do not save it on the desktop, but rather in a folder deeper on the unit. Once you've saved it, make sure no one is looking, then open the file. It will bring up a blank black window. In the bl...

How To: Enable MMS picture messaging on your unlocked iPhone

MMS is disabled on some iPhones. To enable it go to settings, and go into the general settings. From the menu select network and select cellular data in the network menu. In the Cellular Data settings go down to MMS options. Now set the APN as wap:voicestream.com, MMSC as http://mms.MSG.eng.t-mobile.com, and MMS Proxy as 216.155.165.50:8080. Once you do these settings go to the message settings and make sure that the MMS messaging is turned on. Now go to messages and create a new message. Add...

News: iOS 11.4 Beta 5 Released for iPhones with Under-the-Hood Improvements

Apple is speeding things up in the iOS 11.4 development. The company released to developers the fifth beta for iOS 11.4 on Monday, May 15. Public beta testers got the update just hours later. The update comes just one week after the release of the fourth 11.4 beta, which introduced minor bug fixes and security patches to iPhone running the software. This beta version doesn't seem any different.

How To: Get your home ready for a new dog

Pet-proofing your house won't just protect your possessions from becoming chew toys—it could save your dog's life. You will need a dog crate, a dog who's ready to move in, dog manuals, pet repellent, electrical cord covers, baby gates and a dog bed or towels for bedding. These are helpful tips for pet proofing your home for your new puppy or dog.

Guide: Privacy Matters

Greetings all. Today I intend to append a new series to my mini-collection of posts. This series will consist of informative guides for the purpose of depicting certain aspects of the White Hat profession that I believe are of profound importance. Furthermore, I will keep this series simple for everyone to follow, regardless of your tech level. So without further ado, let's get right into it.

How To: Get ready for the digital television transfer

This four-part video tutorial is furnished by the (FCC) Federal Communications Commission shows you how to get ready for the digital television transfer. Is your television ready for digital? By February 17th, 2009 TV stations will stop broadcasting in analog and broadcast only in digital. Your TV needs to be ready so you can keep watching. Digital television, also known as DTV, is here, and after February 17th, TV stations will turn off their analog signal. The FCC wants to be sure you are r...

News: White House Hacked by Russian Hackers!

Yesterday, April 7th, it was revealed that the United States White House had been hacked by allegedly Russian hackers. According to reports, the Russian hackers used social engineering/phishing to get a foothold in the U.S. State Department and then pivoted from that system/network to the White House. Although the White House said no confidential information was compromised, the President's appointment calendar and other information were. Attribution or "blame" for the hack was made more diff...

How To: Get ready for glacier travel while climbing

Check out this instructional climbing video that illustrates how to get ready for glacier travel while climbing. Learn everything you needed to know to properly prepare for a safe glacier trip. This tutorial video offers crevasse rescue tips and safety precautions. Follow along with this video and get ready to glacier travel and crevasse hunt.

How To: Move about the Showdown multiplayer map in Call of Duty 4: Modern Warfare

When it comes time for a Showdown, you better be ready, and the best way to be ready is to watch this NextGenTactics video on playing Showdown in Call of Duty 4: Modern Warfare. There's a lot to know about the multiplayer map Showdown, and if you don't know the ins and outs, you need to pay attention. This will help you move around the map, minimizing enemy confrontation and increasing the chances of surprising the enemy.

How To: Style long, wavy locks, perfect for prom and weddings

If you are looking for a red carpet ready look, look no further than this tutorial. In this video, you will see how to get longer, curlier, fuller locks that will make any budding starlet jealous. So, if you are looking to add some volume to your 'do, follow along with Judy as she shows you how to look camera ready no matter what the occasion.

How To: Draw a "Ready to Fight" pose

Comic artist Mark Crilley demonstrates how to sketch a classic fighting stance, really helpful in your own character or cartoon drawing. Instead of focusing on anatomy, this rendering technique focuses more on style. Follow along with Mark's great artistic advice and make your own action figure. Watch this how-to video and learn how to draw a "ready to fight" pose.