Competent Machines Search Results

How To: Hack Apache Tomcat via Malicious WAR File Upload

Web applications are a prime target for hackers, but sometimes it's not just the web apps themselves that are vulnerable. Web management interfaces should be scrutinized just as hard as the apps they manage, especially when they contain some sort of upload functionality. By exploiting a vulnerability in Apache Tomcat, a hacker can upload a backdoor and get a shell.

How To: Enumerate NetBIOS Shares with NBTScan & Nmap Scripting Engine

NetBIOS is a service that allows for communication over a network and is often used to join a domain and legacy applications. It is an older technology but still used in some environments today. Since it is an unsecured protocol, it can often be a good starting point when attacking a network. Scanning for NetBIOS shares with NBTScan and the Nmap Scripting Engine is a good way to begin.

How To: Securely Sync Files Between Two Machines Using Syncthing

Transferring hundreds of screenshots, webcam recordings, keystroke logs, and audio recordings between your VPS and a local Kali machine can be tricky. Services like Dropbox don't always have the best privacy policies and suffer data breaches just like any other website. To mitigate these risks, we'll use a secure, open source, and decentralized alternative.

How To: Use Pupy, a Linux Remote Access Tool

In one of my previous articles, I discussed ShinoBot, a remote administration tool that makes itself obvious. The goal is to see if the user could detect a remote administration tool or RAT on their system. In this article, I'll be demonstrating the use of Pupy, an actual RAT, on a target Ubuntu 16.04 server.

How To: Overload train to increase your bench press

The tutor suggests that you do 87% to 93% of your maximum on this drill. Take deep breaths while doing these exercises. You have to do five sets followed by rest for one and half minutes for each exercises.1. First of all you have to start with the first overload drill which is the heavy DB chest press. You have to lie down on your back on the bench and hold the drills in your hands and then bring these two drills up. You have to do the repeats of four to seven only for this exercise.2. Now d...

How To: Calculate weighted atomic mass

This video is about Level 2 atomic concepts, specifically the Pennium Lab. This helps you understand how atomic masses are derived for the periodic table. This teacher demonstrates how to do the calculation. He first reviews the Isotopes as they are different masses of the same type of atoms. He uses chromium as his example. It has a different number of neutrons in the nucleus. Using the equation, it could have either 26, 28, 29 or 30, with its 24 protons. So he subtracts the atomic number fr...

How To: Cut lexan for a control panel overlay for an arcade

In this video we get to see how to cut a lexan for your control panel overlay. First we have to lay the control panel on the lexan. Now go to any corner. We use just three tolls in our process two drill bits and a scoring tool. Take the scoring tool and drag it along the sides so that the lexan breaks or cracks. There is no reason to worry since lexan is very easy to work with. Now take the torn lexan and place it on the top of the panel. Clamp it using the clamps at the corners. Now we take ...

How To: Stitch a bland hem

This video demonstrates how to stitch a blind hem. A blind hem does not show stitching on the outer side of the garment, like a pair of pants or a shirt. If you turn the garment you do see the stitching. The reason you don't see the stitching on the outside of the garment is that it's not complete stitching. Depending on your machine it is actually a half of a zigzag stitch and then 3 or 4 strait stitches repeated down the seam. The only stitch that shows is the half a zigzag stitch. Before y...

How To: Reduce the size of a t-shirt

If you've ever wondered how to resize a T-Shirt to a smaller perfect fit, then follow these simple steps presented by Stacey from Sewing Republic. To shrink down your T-Shirt, follow theses steps: You will need an oversized shirt, a smaller shirt to use as a pattern and your sewing machine. 1. Turn both shirts inside out, and lay the fitted shirt on top. 2. Fold the sleeves back and pin the shirts together. 3. Trace around the fitted shirt with a fabric marking pen. Add 1/2 inch for your seam...

How To: Make a mini bell pepper for a dollhouse

To make a hollow clay bell pepper, you will first need four thin strips of aluminum foil. Roll each one into a tiny, thin strip. You will also need pearlized white clay rolled out very thin (number seven on a pasta machine), and rolled out green, red, or yellow clay (number four on a pasta machine). Take your four strips of tin foil and line the up on one end placing them together in a bundle. Place on the white clay and the clay around it one time, remove the excess. Use your fingers to make...

How To: Use Amaco bead rollers

Our instructor will choose set 2, 6 and 8 to show you what the company offers. On the wrappers are pictures of the types of beads possible with each set. She will create from set 2 today, which makes oval beads. Inside of the packages, such as this package which holds set 2 are several items. First is the thin metal pins or rods that can go into the baking oven with the polymer clay molded around them. Next, two pieces for the mold, a bottom and top that fit together with grooves. There are a...

How To: Recycle an old sweater into a bookmark

In this video, Craftside blogger/author/craftster Stephanie Girard shows us how to make bird-like upcycled sweater bookmarks. Joining Stephanie Girard in this video is Jennie Hinchcliff, co-author of Good Mail Day. We're shown how to use a die cutting machine to die cut some sweaters and recycle them into bookmarks. In this example, we use a felted wool sweater and a Hello Kitty die cutting machine. With this tool it is simple to cut out a bird-shaped piece of the sweater. Then you place it o...