Russia's Evasion Search Results

Hack Like a Pro: How to Evade AV Detection with Veil-Evasion

Welcome back, my greenhorn hackers! One of the most important issues any hacker must address is how to get past security devices and remain undetected. These can include antivirus software, intrusion detection systems, firewalls, web application firewalls, and numerous others. As nearly all of these devices employ a signature-based detection scheme where they maintain a database of known exploits and payload signatures, the key is to either:

How To: Brew Russian Kombucha

In this instructional video, Tim brews up 5 gallons of Kombucha - a fermented tea drink from Russia with healing properties, with a slight alcohol content, and a most original flavor. Watch this video tutorial and learn how to brew traditional Russian kombucha.

How To: Prepare for a solar eclipse

On August 1, 2008 a rare total solar eclipse will appear in the skies over parts of Canada, Greenland, Russia, Mongolia, and China. During this spectacular event, the moon will cross in front of the sun, completely blocking out the sun's disk, and casting a shadow over part of the Earth. While only people in a small area of the world will be able to see the eclipse in person, viewers all across the globe can view the eclipse as it happens on NASA TV.

How To: Brew kombucha

This is a two part video on how to brew up a big batch of Kombucha - a slightly medicinal, slightly alcoholic, and very unique drink from Russia. In part 1 of the video Tim brews the tea and mixes in the Kombucha mother.

How To: Make a caipiroska

Learn how to make a caipiroska. The caipiroska is the Russian cousin of Brazil’s national drink, the caipirinha. In this version, vodka stands in for the traditional cachaca sugarcane liquor.

How To: Build an Evasive Shell in Python, Part 1: Introduction & Concepts

Hello, everyone. Stealth is a large part of any successful hack; if we don't get noticed, we're much less likely to be caught. In these next few articles, we'll be building a shell based on keeping us hidden from a firewall. There are many ways to stay hidden from a firewall, but we'll only be incorporating a couple into our shell. This article will outline and explain these evasion concepts and techniques.

How To: Draw a simple eagle (águila)

Learn to draw the mighty bird of prey, the eagle. Eagles tend to frequent national symbols like the "Coat of Arms", for countries like Egypt, Mexico, Germany, Austria, Russia and Armenia. It's more famous as The Great Seal of the United States. So, eagles seem to be one of the most influential birds in the world, so why wouldn't you want to learn how to draw it? This how-to illustrates the step-by-step details to drawing an eagle, "Águila" is the Spanish translation of eagle.

News: The Hack of the Century!

Although this century is still young, with little fanfare we may have just witnessed the "Hack of the Century." AV software developer Kaspersky of Russia recently announced that they found that some hackers have stolen over $1 billion from banks around the world!

News: How Zero-Day Exploits Are Bought & Sold

Most of you already know that a zero-day exploit is an exploit that has not yet been revealed to the software vendor or the public. As a result, the vulnerability that enables the exploit hasn't been patched. This means that someone with a zero-day exploit can hack into any system that has that particular configuration or software, giving them free reign to steal information, identities, credit card info, and spy on victims.

How To: Find the biggest "off map" glitch in Call of Duty 4

Glitches are everywhere in the video game world, and you can call them what you want... glitches, cheats, cheat codes, hints, secrets or tips. In order to find a glitch, you have to keep your eyes open or follow a recommendation from a gaming friend. Either way, to catch a secret glitch, you need to be ready; the cheats for the taking, whether a weapon or secret passageway, so take it, before it gets patched.

How To: Find the under "Ultimatum" glitch in Call of Duty 4

Glitches are everywhere in the video game world, and you can call them what you want... glitches, cheats, cheat codes, hints, secrets or tips. In order to find a glitch, you have to keep your eyes open or follow a recommendation from a gaming friend. Either way, to catch a secret glitch, you need to be ready; the cheats for the taking, whether a weapon or secret passageway, so take it, before it gets patched.

SQL Injection 101: How to Avoid Detection & Bypass Defenses

It is often said that the best hackers remain unknown, and the greatest attacks are left undiscovered, but it's hard for an up-and-coming penetration tester or white hat to learn anything unless one of those factors is actually known or discovered. But the end goal here in our SQL injection lessons is to make that statement as true as possible for us when performing our hacks.

How To: Cook Any Cuisine Perfectly by Knowing the Right Ingredients to Use, Part 1

Home cooks are often quite intimidated when trying to reproduce the delicious ethnic dishes they enjoy at various restaurants. Thankfully, there are definite flavor profiles and spice/seasoning/herb combos that are very specific to various regional cuisines and cultures; with a little guidance, you can create dishes that are tasty homages to the cuisines you love to eat. In this two-part article (second part here), I'll cover both categories and sub-categories of some of the most popular ethn...

News: Some of the World's Most Notorious Hackers Got Hacked

This past weekend, one of the most notorious hacker organizations in the world, Hacking Team, was hacked by some unknown organization. The Hacking Team is an Italian company that sells it software and services to companies and governments (yes, my rookie hackers, there are legitimate companies who sell their services to governments—Vupen, being one of the most famous and lucrative).

Hack Like a Pro: How to Evade AV Software with Shellter

Welcome back, my tenderfoot hackers! One key area on the minds of all hackers is how to evade security devices such as an intrusion detection system (IDS) or antivirus (AV) software. This is not an issue if you create your own zero-day exploit, or capture someone else's zero-day. However, if you are using someone else's exploit or payload, such as one from Metasploit or Exploit-DB, the security devices are likely to detect it and spoil all your fun.

Prev Page