Scooters Possess Search Results

How To: Hack UnrealIRCd Using Python Socket Programming

UnrealIRCd is an open-source IRC server that has been around since 1999 and is perhaps the most widely used one today. Version 3.2.8.1 was vulnerable to remote code execution due to a backdoor in the software. Today, we will be exploiting the vulnerability with Metasploit, examining the underlying code to understand it, and creating our own version of the exploit in Python.

News: Why the iPhone X Needs a $25 USB Type-C Cable to Fast Charge

After learning that you'll need to spend at least $74 on a special charger and a USB Type-C Lightning cable to enable fast charging on the new iPhone X and iPhone 8 models, you may be wondering why you can't just use the standard Lightning cable. While we can't answer why Apple didn't include the USB-C cable in the box with their new phones, we can explain why you need USB-C to enable fast charging.

How To: Change These Settings Now to Protect Your Data in Case Your Phone Is Stolen

As smartphone users, we live in dangerous times. The value of phones continues to rise, making them prime targets for thieves. In 2015, the FCC estimated that one million phones are stolen each year, and with several devices starting to hit the $1,000 mark now, these numbers are sure to rise. But what do you do if you fall victim to phone theft?

How To: Select a Field-Tested Kali Linux Compatible Wireless Adapter

When hacking Wi-Fi networks, having the right wireless adapter is essential. But hunting online for one can be a frustrating experience. To see how the handful of Kali-compatible adapters on the market measure up, I ran a series of tests to benchmark and compare their range, signal strength, and ability to enter monitor mode and perform packet injection. This should help you determine which adapter is right for your own hacking needs.

Social Engineering: How to Use Persuasion to Compromise a Human Target

Social engineering makes headlines because human behavior is often the weakest link of even well-defended targets. Automated social engineering tools can help reclusive hackers touch these techniques, but the study of how to hack human interactions in person is often ignored. Today, we will examine how to use subtle, hard to detect persuasion techniques to compromise a human target.

News: Radical Theory Linking Alzheimer's to Infections Could Revolutionize Treatment

There are all kinds of theories—many supported by science—about what causes Alzheimer's disease. Tangles of protein called ß-amyloid (pronounced beta amyloid) plaques are prominently on the list of possible causes or, at least, contributors. An emerging theory of the disease suggests that those plaques aren't the problem, but are actually our brains' defenders. They show up to help fight an infection, and decades later, they become the problem.

Guide: Wi-Fi Cards and Chipsets

Greetings aspiring hackers. I have observed an increasing number of questions, both here on Null-Byte and on other forums, regarding the decision of which USB wireless network adapter to pick from when performing Wi-Fi hacks. So in today's guide I will be tackling this dilemma. First I will explain the ideal requirements, then I will cover chipsets, and lastly I will talk about examples of wireless cards and my personal recommendations. Without further ado, let's cut to the chase.

How To: A Smartphone User's Guide to Surviving Thanksgiving

The holidays are stressful. Between traveling, family, and dinner, Thanksgiving weekend can feel like weeks. Many families have traditions that make the days long, but some of us would rather curl up somewhere and watch our favorite shows. But all is not lost — our phones do so much for us now that they can help make the long stressful weekend much more bearable.

How To: Fuzz Parameters, Directories & More with Ffuf

The art of fuzzing is a vital skill for any penetration tester or hacker to possess. The faster you fuzz, and the more efficiently you are at doing it, the closer you come to achieving your goal, whether that means finding a valid bug or discovering an initial attack vector. A tool called ffuf comes in handy to help speed things along and fuzz for parameters, directors, and more.

How To: Here's How You Can Make a Real Difference in the Aftermath of the Michael Brown & Eric Garner Grand Jury Decisions

In the aftermath of the unindicted police killings of Michael Brown and Eric Garner, we've been told that the system worked as intended. When our legal system's outcome is at conflict with what a majority of Americans believe is just, it's clear that some changes are needed. But what specifically needs to change? And what can an average citizen with a moral and just cause do to prevent these kinds of tragedies from repeating themselves again and again?

News: W.M.D (Wedgie of Mass Destruction)

The receiver of the wedgie, would by laying on he ground, preferably face down, with they're underpants securely fastened to some strong cord, at each hip. The cord, would be then tied to the pegs of a BMX bicycle ( if you wished to extreme it up a little you could use a motorised scooter of some sort :P ).

How To: Use Your Shutter, ISO and Aperture

Learn the Basics of Shooting in "Manual" Mode on your DSLR In this first installment of Photography Basics, we will be exploring and explaining the basics of shooting with a DSLR in various shooting modes. This first webisode is intended to familiarize the user with the basic understanding and functions of ISO, Aperture and Shutter in order to produce more professional looking images.

News: Jetman Does Acrobatics in the Sky

Looks like Yves Rossy is getting better at flying (his previous stunt sent him plummeting into the Atlantic). Other than some slight initial engine trouble, last week's record breaking aerial loops went off without a hitch. Watch below. Rossy's site states:

News: "Living" Flower Dresses Change With the Seasons

While I don't find Mattijs van Bergen and Anouk Vogel's "Living" dresses aesthetically earth shattering, I'm wowed by the concept. The fashion designer and landscape architect created a collection of dresses made from recycled inner tubes and flowers for a late summer exhibition titled “Fashion & Architecture” at the Amsterdam Centre for Architecture.

HowTo: Capture Monster Waves on Camera

Waves are like clouds. Perpetually calming, they possess a serene beauty that never grows old. It's no wonder humans capture the planet's daily natural wonders over and over again. Armed with a camera, they just can't resist the classic postcard shot: Sunrise. Sunset. Clouds. Mountains. Beaches. Waves.

News: 8-Bit Your Desk

Well, you might need to take a few lessons in animation first. Another cool 8-Bit animation (previously, Evil Pixels Demolish New York City). This one is short and sweet. And especially beautiful.

How To: Make a coin disappear by snapping your fingers

This magic trick requires a coin, your ability to snap your fingers, and long sleeves. If you possess all of these then you too can become a world class magician. Learn to make a coin disappear out of the palm of your hand with just the snap of a finger. Although the video is super short, it's straight to the point — no illusion here! Make a coin disappear by snapping your fingers.