Command Post Search Results

Mac for Hackers: How to Set Up a MacOS System for Wi-Fi Packet Capturing

MacOS isn't known as an ideal operating system for hacking without customization, but it includes native tools that allow easy control of the Wi-Fi radio for packet sniffing. Changing channels, scanning for access points, and even capturing packets all can be done from the command line. We'll use aliasing to set some simple commands for easy native packet capture on a macOS system.

Hacking macOS: How to Use One Tclsh Command to Bypass Antivirus Protections

Using Netcat to backdoor a macOS device has its short-comings. If the compromised Mac goes to sleep, the Netcat background process will occasionally fail to terminate correctly; This leaves Netcat running infinitely in the background and the attacker with no new way into the device. As an alternative, we'll use the lesser-known Tcl shell which can handle abrupt backdoor disconnections.

How To: Hide the Navigation & Status Bars on Your Galaxy S8 for Even More Screen Real Estate — No Root Needed

The Samsung Galaxy S8's almost bezel-less display is truly a sight to behold, especially when set to Immersive Mode. While transparent when on the home screen, the navigation and status bars on the S8 will often turn opaque depending on what app you're using at the moment. This, in turn, can detract from the overall experience when viewing anything from the S8's display, as the bars along the top and bottom of the screen bump the phone's aspect ratio down to lower levels.

How to Meterpreter: Obtaining User Credentials with PowerShell

In this article I will show you how to obtain victim's credentials without cracking any hashes. There are a couple of ways to perform this task (for example dumping the SAM file and cracking the NTLM hashes), but here I will explain how to do it using PowerShell and a bit of social engineering. We are going to create a fake login popup.

How To: Create Custom Commands in Kali Linux

When attempting to run a script, it can be rather inconvenient to have to locate the script, and run it time and time again. What if there were a way to run a script from anywhere. Well that's what we'll be doing today. This can be useful for any scripts you use frequently, it can save you time by removing the need to locate and execute.

How To: Attack on Stack [Part 4]; Smash the Stack Visualization: Prologue to Exploitation Chronicles, GDB on the Battlefield.

Hi everyone! Last time we finished analyzing the assembly representation of our vulnerable piece of code (have I ever told you it is vulnerable?). This time we are going to introduce some fundaments about exploitation by demonstrating how to crash a program's execution. If that sounds lame, next time we will see how this crash can in fact be useful to control the program's execution, achieving remote code execution!

How To: Delete wall posts on Facebook

In this video, we learn how to delete wall posts on Facebook. To do this, log into your Facebook account on your preferred browser. Now, click on your profile button so you see your profile. If you see posts you don't like that you want to delete click on the right hand side of the post and you will be able to delete it by clicking "remove". This will remove the entire post from your wall and nobody, including you will be able to see it ever again. This is a good way to remove things you don'...

How To: Make front-post & back-post double crochet stitches

Donna teaches how to do a front-post, back-post crochet stitch. First of all you'll need yarn and a hook. Start with a single crochet. Donna uses white to create the single crochet and to create a heart, goes over the single line with pink to create a double crochet. To create the double line, go around and through. from front to back, through the single post. Always have the yarn going through the same side. The basic method using the pink, is to make the design in a "V" shape. Using this me...

How To: Install vinyl plastic fencing

There is a great cost effective and durable fence option that is available now. It is fence made from plastic PVC. Start by putting a stake in the ground to mark the location of the first fence post. Use a string tied to the first stake to mark the rest of the fence line. Drive stakes in the ground to mark the location of additional fence posts along the string line every eight feet. Dig your fence post holes with a post hole digger or rent a motorized digger. Once you've dug the hole put gra...

How To: Build segmental retaining walls

It's fun to be out in warm weather cutting big timbers and doing a project that sees quick, upward progress. In this video, you'll find instructions for building a post and plank-style retaining wall. This post-and-plank retaining system is based on the way seawalls (or bulkheads) work. You set posts into the ground, vertically, then plank behind them. This creates a wall with texture and shadow lines with nice hollows between the posts for plantings or grass. And, because there's so much pos...

How To: Find your IP address with the Command prompt

In this video we learn how to find your IP address with the Command prompt. First, go to the start menu on your desktop. Then, find the run box and type in "cmd". After this, hit "enter" and then a black command prompt will show up on your screen. Next, type in "ip config" and then hit the enter button again. Now, a list of information will appear on the black screen. Look down the list to find the IP address listed on the page. Once you have this, you should write down your IP address and th...

How To: Teach your dog how to sit on your command

A dog who constantly follows you around the house wagging his tail is a dog who really likes you (or is hungry), but sometimes you're tired and just want your dog to sit and be still for once. Teaching a dog to sit is one of the most basic obedience training tricks out there, and one of the most important (especially in cases of your dog bounding onto friends who enter the house).

How To: Building a patio enclosure with seating walls

In this how to video, you will learn how to build a patio enclosure with seating walls. You will need measuring tape, a level, a dead blow hammer, a square, masking tape, safety glasses, and work gloves. You will need the courtyard collection as well. First, draw out a plan for the enclosure. Mark the locations of the posts and panels with tape. Openings should be three to four feet wide. Start building walls at posts. Adjustments must be made at corners. Start by placing four corner blocks. ...

How To: Upload pictures, embed videos, and publish in Blogger

Radford University demonstrates how to upload pictures, embed videos and then publish them in Blogger. Log into blogger and go to your dashboard page. Click edit posts or create a new post. In the blog editor choose edit image from the toolbar. You can now add an image from a URL or upload one from your computer by choosing the choose file option. Next, choose your image position and size. Then, click the upload image button and then click done. Your image will now appear in your post. To emb...

How To: Access your wireless router from a Windows PC

In order to access your wireless router settings in a Windows PC you need to use a command called ipconfig. The purpose of this command is to find out what your IP is. Go into the command console and use ipconfig to find out what it is but instead of noting down the IP address, we actually have to note down the default gateway values for the task at hand. Now all you need to do is open your web browser and insert the default gateway values from before into the address bar. By doing so you wil...

How To: Plant a file of any kind in a .jpg

In this video the instructor shows how to hide any kind of file in a .Jpeg image file. To do this take the image in a new folder. Go to start button and then to run. Type cmd in the run and hit enter to open the command prompt. Now browse to the directory that contains the picture and also the file that you want to store using the CD command. Type the command to create our required file as shown in the video. Now a new file will be created that contains your image as well as the file that you...