Alleged Victims Search Results

How To: Hack a remote Internet browser with XSS Shell

XSS Shell is a cross-site scripting backdoor into the victim's browser which enables an attacker to issue commands and receive responses. During a normal XSS attack an attacker only has one chance to control a victim's browser; however, the XSS Shell keeps the connection between the attacker and the victim open to allow the attacker to continuously manipulate the victim's browser. XSS Shell works by setting up an XSS Channel, an AJAX application embedded into the victim's browser, that can ob...

How To: Execute the wooden spoon head hitting prank

The wooden spoon prank is one of the great group pranks, especially if you have a big group of spectators that won't ruin it right away. What you do is get three wooden cooking spoons and an accomplice. Your accomplice will challenge your victim to a game where they take turn seeing who can hit each other's head the hardest with a wooden spoon held in the mouth. The victim goes first, landing a weak hit on your accomplices head. What the victim doesn't know is that you have a spoon too, and a...

How To: Freeze someone's Xbox 360

This is a hack tutorial, learn how to freeze someone else's Xbox 360. First, host a party and invite your "victim". Send them a voice message about 15 seconds long an wait till you see the victim listening to the message. Kick the victim from the party and reinvite them back to the party really fast, before they stop listening to the message. This freeze has about a 75% chance of working, depending on what your "victim's" actions.

How To: Pull the bloody toothbrush prank with food coloring on a roommate

Brushing your teeth is pretty mundane. Why not enliven the experience for a friend or enemy by pranking them into thinking that their mouth is gushing blood? This video will teach you how to use food coloring and an oven to set up the Bloody Toothbrush Prank. All you do is cook the food coloring into it's powdered essence, apply the powder sneakily your victim's toothbrush, and wait until they brush.

How To: Execute Remote Commands on a Disconnected Victim

Do you ever thought that you can't control an Internet disconnected system? I saw a funny video in Chema Alonso's youtube channel (A well-known hacker of my country and creator of Fingerprinting Organizations with Collected Archives among other security tools), and decided to post something similar.

How To: Prank a friend who is working on a car

This prank is not for the faint of heart. It will hurt your victim a great deal, and likely make them want to visit the same fate upon you. But if you're really trying to find a prank that will make the day of your victim worse, and they like to work on cars, this prank is for you. All you do is wait till your victim is under a car working, then grab a hammer and...

How To: Do a Diet Coke and Mentos bomb explosion prank

The Diet Coke and Mentos Explosion prank is one of those classic pranks that everyone should experience at some point. When combined the Diet Cola and Mentos become volatile, basting your victim in stickiness. Watch this video to learn how to make a Diet Coke and Mentos bomb, a simple, yet devious exploding prank. Next up: how to con your victim into cleaning up the mess. Use this as inspiration for one of your April Fools Day pranks!

How To: Quickly fix hangovers

You've probably tried every alleged hangover cure--from cold showers to hot coffee--with little success. But a hangover remedy does exist! So watch this video and learn how to be a drunk without suffering hangovers ever again!

How to Meterpreter: Obtaining User Credentials with PowerShell

In this article I will show you how to obtain victim's credentials without cracking any hashes. There are a couple of ways to perform this task (for example dumping the SAM file and cracking the NTLM hashes), but here I will explain how to do it using PowerShell and a bit of social engineering. We are going to create a fake login popup.

How To: Set up the ultimate ketchup prank

You must have a certain attitude to appreciate practical jokes and pranks. Your friends (or targets) may not appreciate pranks as much as you, especially messy ones. The messy pranks are the ones that are less likely to provide a laugh from your victims, at least not right away. This ketchup prank is one of those.

Hack Like a Pro: How to Create a Nearly Undetectable Covert Channel with Tunnelshell

Welcome back, my rookie hackers! Most often, the professional hacker is seeking protected information from the target system or network. This might be credit card numbers, personally identifiable information, or intellectual property (formulas, plans, blueprints, designs, etc.). Most of my Null Byte guides have been focused on getting into the system, but this only begs the question—"what do I do when I get there?"

How To: Walkthrough the flash game Horror Plant (both endings)

Tass is here to show viewers a video walk through for the game Horror Plant, revealing both endings. The focus of this game is to set up victims for a meat eating plant to devour along the journey. Starting fires, setting up gruesome traps and fooling poor souls is the name of the game. The horror plant is also revealed to be something of a hero to other non-human comrades as it saves and even shares meals with them along the way. One ending shows how adding certain ingredients to another vic...

How To: Immobilize an injured victim

Wounds that involve underlying structures usually require immobilization. The purpose for immobilizing an injured victim is to provide support. This first aid how-to video demonstrates the proper technique for immobilizing someone who has serious wounds or injuries.

Prev Page