Command Search Results

Exploit Development: How to Read & Write to a Program's Memory Using a Format String Vulnerability

Format strings are a handy way for programmers to whip up a string from several variables. They are designed to save the programmer time and allow their code to look much cleaner. Unbeknownst to some programmers, format strings can also be used by an attacker to compromise their entire program. In this guide, we are going to look at just how we can use a format string to exploit a running program.

How To: Change your IP or MAC address

The video is about how to change the IP address. MAC address is the unique identifier a site of the most network adapters. MAC address is used to determine what IP address the computer will have and one way to change the IP address is by changing the MAC address. The method is only applicable for the windows systems and for the MAC systems you need to look at the link provided. In Windows in the start menu, type cmd in the run/search box, which will launch the command window. Type ipconfig/al...

How To: Use the levels and histogram in Photoshop

Deke McClelland explains what the Levels and Histogram commands can do in Photoshop in this video tutorial. Levels allows you to adjust the luminance levels allowing you to adjust the contrast and colors within each color channel of an image. Thus, Levels allows you to adjust the individual colors that can be found within a gradient. This command is very similar to the curves command but to a less powerful extent. It is also more efficient than the curves command. The Histogram is another col...

How To: Get Started with MicroPython for ESP8266 Microcontrollers

For anyone interested in using cheap, Wi-Fi-connected microcontrollers like the ESP8266, the Arduino programming language can be a barrier to entry. Based on C++, Arduino requires knowledge of more computer science than languages like Python. Fortunately for beginners, setting up MicroPython on an ESP8266 allows anyone to write Python on affordable microcontrollers in a matter of minutes.

How To: Find Vulnerable Webcams Across the Globe Using Shodan

Search engines index websites on the web so you can find them more efficiently, and the same is true for internet-connected devices. Shodan indexes devices like webcams, printers, and even industrial controls into one easy-to-search database, giving hackers access to vulnerable devices online across the globe. And you can search its database via its website or command-line library.

How To: Steal Usernames & Passwords Stored in Firefox on Windows 10 Using a USB Rubber Ducky

A lot of people still trust their web browsers to remember every online account password for them. If you're one of those users, you need to adopt a more secure way of managing passwords, because browser-stored passwords are hacker gold mines. With a USB Rubber Ducky and physical access to your computer, they can have a screenshot of all your credentials in their inbox in less than 60 seconds.

How To: Unlock Vista's super user mode

Revision3 Internet Television and Tekzilla Daily with Veronica Belmont demonstrate how to unlock Vista's super user mode. First, open the start menu and type CMD. Right click the command prompt and select the run as administrator option. Type the code net user administrator / active:yes. Hit enter. Your system should reply with the command completed successfully message. Then, the next time you restart your system, you'll see the administrator as an option in the welcome screen. If you use th...

How To: Erase your hard drive from the Mac OS X terminal

Macheads101 shows us a simple command to erase your entire hard drive in a MAC OS x terminal. You can either log in as administrator and simply type "rm -rf /" to format or you can just type "Sudo rm -rf /" to start. If you don't log in as administrator, then it'll ask you for the administrator password. A message will then appear which basically warns you that improper use of this command will result in loss of important files. Next type in "sudo mount -uw /" to edit the file command system....

How To: Use the zoom in Mac OSX

In this how-to video, you will learn how to use the zoom function in the Mac OSX. This will help if you are visually impaired. Next to the space bar, there are two keys. There is the command key and the option key. Hold them both of them down at the same and press the number eight key. Once this is done, the desktop will be zoomed in. To zoom in even further, press control, command and plus. Do the same except with the minus key to zoom out. Press option, command and the number 8 to reset the...

How To: Access websites that might be blocked by your school

This video describes how to access websites that may be blocked by your school. To begin, on the desktop go to the Start menu and select Run. Type in "cmd" and hit okay to open the command prompt. If that doesn't work go to Start, My Computer, C drive, Documents and Settings, Default User (or the name of the user), Start Menu, Programs, Accessories, and finally click Command Prompt. From the command prompt enter "ping" and then a space followed by the website. The website entered will display...

How To: Disable uac and dep on Windows Vista

This video contains instructions about how to disable or enable the user accounts on Windows Vista. It is very simple; just go to control panel -> user accounts and safety -> user accounts. You can click the check box on or off to disable or enable the user accounts. This can also be done by using command line. Open run and type the following command:

How To: Use the Cowrie SSH Honeypot to Catch Attackers on Your Network

The internet is constantly under siege by bots searching for vulnerabilities to attack and exploit. While conventional wisdom is to prevent these attacks, there are ways to deliberately lure hackers into a trap in order to spy on them, study their behavior, and capture samples of malware. In this tutorial, we'll be creating a Cowrie honeypot, an alluring target to attract and trap hackers.

How To: Hack UnrealIRCd Using Python Socket Programming

UnrealIRCd is an open-source IRC server that has been around since 1999 and is perhaps the most widely used one today. Version 3.2.8.1 was vulnerable to remote code execution due to a backdoor in the software. Today, we will be exploiting the vulnerability with Metasploit, examining the underlying code to understand it, and creating our own version of the exploit in Python.

How To: Unlock the Bootloader on the Essential PH-1

Although the Essential PH-1 got off to a rocky start, thanks to steady updates, it has slowly become one of the best Android phones to come out in recent years. For $499, the Essential Phone is a cheaper Pixel, receiving updates almost as soon as the Pixel lineup does. What's more, you get a phone with an easily unlockable bootloader, which is the first step to rooting.

How To: Create a Reusable Burner OS with Docker, Part 2: Customizing Our Hacking Container

In the first part of my containers series, we learned how to install Docker on our local machine, pull down "hello-world" and Ubuntu containers, SSH into containers, and install software when in a container. Now, we're going to work on building, customizing, and storing our refined hacking Ubuntu container. Before we dive right in, though, let's make sure we still have a functional Docker installation.

How To: Zoom in and out on a Mac

In this video tutorial, viewers learn how to zoom in and out on a Mac computer. To access the zooming tool, begin by clicking on the Apple menu and select System Preferences. Under System, select Universal Access and check On under Zoom. In Options, users are able to set specific settings such as the maximum and minimum range of zoom. The keyboard shortcut for zooming in is: Option, Command and =. The keyboard shortcut for zooming out is: Option, Command and -. This video will benefit those v...

How To: Teach your dog to retrieve

In this how to video, you will learn how to teach your dog to retrieve. First, you should teach your dog the a regular retrieve. You will toss the object so that the dog sees where it lands. Next, give it the command to retrieve. Next, attempt the semi blind retrieve. This involves tossing the object, allowing your dog to see where it has gone. Next, distract the dog for a bit before giving it the command to retrieve. The full blind retrieve should now be attempted. This is done by hiding the...

How To: Auto align and merge images in Photoshop

Open your first image and go to the rectangular marquee tool and select all of the image. Next click command or control C to copy image. Then go to your second image and click command or control V to paste the image. Select both the layers (hold down shift when clicking the layer), then go to edit, auto align layers and choose the top option then click ok. Last add a mask to your top layer, this is done by selecting the gradient tool (make sure its set black to white, the mode is normal and o...