Welcome back, my tenderfoot hackers! In continuing my series on digital forensics using Kali, I want to introduce you to two complementary tools, both built right into Kali Linux. These are Brian Carrier's tools Autopsy and Sleuth Kit.
It's nice to have a drink on an airplane, whether you're taking a flight somewhere fun or for work. However, what's not so nice is the high prices and relatively bad quality of the liquor that's available.
It's that time of year where you need to break out the grill and cook food over red-hot coals, whether it's the beginning, middle, or end of summer. Even if you're not a grill master extraordinaire, you can use these hacks to fool your friends and family into thinking that you're a barbecuing badass.
Who doesn't enjoy sitting down to a nice dinner with a cocktail in hand? After a long day, a drink is a great way to unwind. Yet your favorite spirits can do more than just help you relax after work. By utilizing alcohol in the kitchen, you can enhance everything from how food tastes to your health.
Even though I often end the workday exhausted and just want to wrap rotisserie chicken parts in a store-bought tortilla and shove it in my eating hole, I generally try and take a couple of minutes to warm up said tortillas before I begin my meal. But if you're starving, do you really need to take the time? Do warm tortillas really make that much of a difference?
We Nexus users are fairly spoiled. There's a ton of third-party development for our phones, which translates to a virtually endless stream of custom ROMs being made available to us.
You've unlocked your bootloader and rooted your HTC One running KitKat, but there's still one lingering aspect of security you've yet to rid yourself of—S-On—the extra security measure HTC implemented into Sense.
There's nothing better than real, homemade tomato sauce, but to really develop the flavors, it usually has to simmer for a few hours. And while it's totally worth doing if you have the time, some nights it's just not an option. That's where the pre-made stuff comes in. Jarred pasta sauce certainly doesn't taste the same, but it's really easy to dress up when you need something quick. If you don't want anyone to know your "secret recipe," here are 10 ways to make store-bought spaghetti or mari...
Welcome back, my budding hackers! In my continuing effort to build your basic Linux skills for hacking, I want to show you how to build a secure "tunnel" to MySQL.
I was just 16 when I poured my first beer. It was my first restaurant job and a customer ordered a pint while the bartender was busy. I'd seen her do it hundreds of times, and she made it look so easy. Besides, it couldn't be that different from filling a cup from the soda machine, right?
Welcome back, my tenderfoot hackers! So many readers in the Null Byte community have been asking me questions about evading detection and hacking undetected that I decided to start a new series on digital forensics.
Welcome back, my budding hackers! In my continuing series on Linux basics for aspiring hackers, I now want to address Loadable kernel modules (LKMs), which are key to the Linux administrator because they provide us the capability to add functionality to the kernel without having to recompile the kernel. Things like video and other device drivers can now be added to the kernel without shutting down the system, recompiling, and rebooting.
I've never understood the phrase "smooth as a baby's bottom" to describe a really close shave. I mean, have you ever touched a baby's cheek? It's even smoother and a lot more sanitary. It just doesn't spew off the tongue as nice.
Welcome back, my fledgling hackers! The database is the hacker's "pot-of-gold," as it contains information that is very valuable to both the business and the hacker. In this, the second of my series on hacking databases, we're on the "hunt" for Microsoft's SQL Server. Although far from the most commonly used database (Oracle hold's that title), Microsoft's SQL Server is very often found in small-to-medium sized businesses. Even a few big businesses use it.
Most smartphone manufacturers focus on megapixels when it comes to cameras, but HTC took a different direction with the HTC One. Instead of trying to compete with the 13MP camera on the Samsung Galaxy S4, or the 20MP camera on the Sony Xperia Z1, or even the newer iPhone's 8MP, they decided on a simple 4MP camera. At first, you might think that 4MP is terrible, but not so fast. There are many advantages to your HTC One's camera that other phones just don't have.
How to easily build a raised garden bed out of wooden pallets for free! …Well almost free. Building a raised vegetable garden with pallets or reclaimed wood is a really rewarding experience. The garden bed idea out of pallets came about from the fact that l wanted to build a rustic looking raised garden bed. A vegetable garden bed that not only provides delicious food, but looks good at the same time. The recycled wood has come from hardwood timber pallets that have been sourced totally FREE ...
This summer's going to be a hot one, so skip the water pistol this year and break out the big guns! In this project, I'll be showing you how to build a water balloon shotgun—a high-powered water balloon launcher that's capable of firing 17 water balloons at the same time!
Welcome back, my fledgling hackers! If you're like most aspiring hackers, at one time or another you've probably spent too much time playing Call of Duty and not enough time preparing for your final exams.
In my first tutorial on Linux basics, I discussed the importance of hackers using Linux and the structure of the directory system. We also looked briefly at the cd command. In this second Linux guide, I'll spend a bit more time with changing directories, listing directories, creating files and directories, and finally, getting help. Let's open up BackTrack and getting started learning more Linux for the aspiring hacker.
Welcome back, my eager hackers! In recent blogs, I've demonstrated how to grab password hashes remotely using Metasploit's meterpreter and pwdump. Once we have the Windows passwords from the SAM file, we can then crack these hashes using tools such as Cain and Abel.
A deck of cards may be a magician's best way to demonstrate his or her's sleight of hand, but for the prankster, it's the perfect way to deliver a shocking 300 volts of electricity! And that's exactly what I'm going to show you how to do today. Stuart Edge used it in his "Electric Shock Kissing Prank" to show the ladies how a man can really put the sparks in a kiss.
Welcome back, my novice hackers! Most of my tutorials up until this point have addressed how to exploit a target assuming that we already know some basic information about their system. These include their IP address, operating system, open ports, services running, and so on.
McDonald's is probably the most recognizable fast food chain in the entire world, with over 34,000 restaurants in more than 100 countries. In may not be the healthiest place to get a meal, but like millions of kids in America, I grew up on McDonald's unquestionably delicious products—and I'm still alive.
Thanksgiving is pretty much the only day out of the year when you can be a complete fatass. It's totally expected, if not encouraged. In fact, if you aren't stuffing your face with a bunch of delicious and unhealthy food, people start to look at you funny.
United Arab Emirates is the cosmopolitan country that offers various attractions for tourists across the world. This country has buildup its image as one the fastest growing country of this region. Besides visiting worth seeing places, travelers can also enjoy tasty traditional food of UAE across the country. Whether you have chosen Dubai, Abu Dhabi, Ajman or Ras Al Khaimah, you will get the chance to enjoy best traditional food everywhere.
This is my first contribution in an ongoing series on detailing the best free, open source hacking and penetration tools available. My goal is to show you some of the quality tools that IT security experts are using every day in their jobs as network security and pen-testing professionals. There are hundreds of tools out there, but I will focus and those that meet four key criteria:
Everyone loves pasta recipes because they are so simple and quick to prepare. This how to video will show you how to make a delicious red pepper and sausage pasta dish. Watch and impress your family by making it for dinner.
Smartphones are inherently bad for privacy. You've basically got a tracking device in your pocket, pinging off cell towers and locking onto GPS satellites. All the while, tracking cookies, advertising IDs, and usage stats follow you around the internet.
What began as a regional specialty has turned into a national trend that looks like it's here to stay: Nasvhille hot chicken has caught on like wildfire, with hot chicken restaurants popping up across the country—not to mention the 8 hot chicken restaurants that you can find in Nashville alone! The history of this Deep South dish is fascinating, and you can read more about it here.
In this video series, our expert will show you how to make homemade potpourri. You will get expert tips on what potpourri is made of, and how you can dry our plants and flowers to make your own potpourri. Get step-by-step instructions for using lavender, and rose petals, adding color and texture to your potpourri and mixing in essential oils.
Make a fantastic brisket for your next holiday meal. Brisket can be dry and bland when not done correctly so remind everyone just how delicious and oven-roasted beef brisket can be with this flavor popping recipe.
In this video series, learn from expert mechanic Nathan McCullough as he teaches and demonstrates how to tune-up a car and do a complete vehicle overhaul. Learn how to check your transmission fluid, air filter, power steering fluid, clutch fluid, brake fluid, radiator and coolant hose, drive belt; how to change your spark plugs and your distributor cap; how to replace your windshield wipers and washer solvent; how to check for tire wear; how to change your oil and check for leaks.
In this do-it-yourself motorcycle maintenance course on video, learn how to fix and repair your hog, so that you can ride cross country without having to stop in at a mechanic. The ultimate riding experience is characterized by freedom and independence: to be in charge of your ride and in control of your bike. So get tips on tire and brake care, how to change motorcycle spark plugs, replace the air filter and change the oil, adjust the primary chain, and other common bike repairs you’ll need ...
In these videos on automobile maintenance you’ll learn how to check all of the major fluids which keep your car operational. Expert Jon Olson demonstrates how to locate the dipstick to check your engine oil, how to check your transmission fluid, brake fluid, power steering fluid, windshield washer fluid, and battery fluid levels. He’ll also show you how to check all of these components for leaks, and how to troubleshoot mysterious fluids that might appear on the ground under your vehicle. Tak...
Are you having trouble balancing the cutting deck of your small engine lawnmower? Our expert will teach you how to do this and many other things including careful removal of the engine’s cutting blade. You will also see how to sharpen the blade and reinstall it safely and efficiently. Watch as our lawnmower maintenance expert removes and reinstalls a carburetor on a small engine lawnmower. Learn how cleaning the carburetor can improve the working mechanism of your lawnmower and see first hand...
Dive (or more appropriately, soar) into another Tom Clancy video game on the Xbox 360— This walkthrough series for Tom Clancy's H.A.W.X. 2 covers the whole entire gameplay for the newly released sequel. Gun down countless MiGs, bomb enemy tanks and shoot down nuclear missiles before they destroy their targets! This video game is all about speed, battle and adrenaline. Try out this air combative flight simulator yourself, and see if you're not on the edge of your seat. Watch the full walkthrou...
You're in the middle of the fight for your life in your favorite iPhone game when all of a sudden, that critical move you tried to make activates Control Center inadvertently, throwing you completely off track. Instead of fuming, do something about it — block Control Center when you're in apps.
While we haven't covered Amazon Web Services, or AWS, on Null Byte before, Amazon's cloud computing platform is ripe for attack by hackers, pentesters, and cybersecurity researchers. It's also an excellent cloud hosting service to build or use vulnerable-by-design AWS setups and frameworks.
It's been said time and time again: reconnaissance is perhaps the most critical phase of an attack. It's especially important when preparing an attack against a database since one wrong move can destroy every last bit of data, which usually isn't the desired outcome. Metasploit contains a variety of modules that can be used to enumerate MySQL databases, making it easy to gather valuable information.
The words of three of tech's most important executives in the last 48 hours are providing some valuable insight into the near term future of augmented reality and the cloud infrastructures that support it.