Exploit Search Results

Hack Like a Pro: How to Cover Your Tracks So You Aren't Detected

Welcome back, my greenhorn hackers! Congratulations on your successful hack that saved the world from nuclear annihilation from our little, bellicose, Twinkie-eating dictator. The rest of world may not know what you did, but I do. Good job! Now that we hacked into the malevolent dictator's computer and temporarily disabled his nuclear launch capability, we have to think about covering our tracks so that he and his minions can't track our good works back to us.

How To: Seize Control of a Router with RouterSploit

A router is the core of anyone's internet experience, but most people don't spend much time setting up this critical piece of hardware. Old firmware, default passwords, and other configuration issues continue to haunt many organizations. Exploiting the poor, neglected computer inside these routers has become so popular and easy that automated tools have been created to make the process a breeze.

Tell Your Friends: How to Protect Yourself from Android's Biggest Security Flaw in Years

Researchers at the cyber security firm Zimperium have recently uncovered a vulnerability in roughly 95% of Android devices that has the potential to allow hackers to take total control over your phone with a simple picture message (MMS). The gritty details of this exploit have not been made public yet, but hackers now know the general framework for this type of attack, so you can be certain that they'll hammer out the details in no time.

How To: Do Favela glitches and tricks in Modern Warfare 2

GamingGuy118 shows a live walkthrough of glitches & tricks for Modern Warfare 2 on Favela. Watch step by step how to use a variety glitches & tricks during gameplay for Modern Warfare 2 on Favela. Strafe jump like a pro, learn the Elevator trick, find the perfect sniping places, and earn a lot of points. Learn the tricks to accessing untouchable positions. Exploit glitches to take out your enemies and render yourself untouchable. Hover a mile above the ground and take down your opponents. Fol...

How To: Hack websites with SQL injection

For Infinity Exists Full Disclosure's first Website Hacking episode, we demonstrate how to exploit a security vulnerability occurring in a website's database to extract password hashes. Sql (Structured Query Language) is a computer language designed for the retrieval and management of data in a system's database. The Attack, known as Sql Injection, manipulates Sql statements before they are sent to the Sql Server, allowing the Attacker to create, change, or retrieve data stored in the database.

How To: Easily Detect CVEs with Nmap Scripts

Nmap is possibly the most widely used security scanner of its kind, in part because of its appearances in films such as The Matrix Reloaded and Live Free or Die Hard. Still, most of Nmap's best features are under-appreciated by hackers and pentesters, one of which will improve one's abilities to quickly identify exploits and vulnerabilities when scanning servers.

How To: Upgrade a Normal Command Shell to a Metasploit Meterpreter

When attempting to compromise a target, we want as much control as possible over the victim. Metasploit's meterpreter allows us to have immense control over the victim, the only issue is that sometimes we can't land a meterpreter. We may only be able to land a standard shell, but fear not, there is a way to upgrade our shell into the all powerful meterpreter!

How To: Hack a Friendster account

Believe it or not, people are still using Friendster. Which is great news for all you hackers because that means there are accounts to hack! With this video you'll find out how to exploit a programming loop hole in order to hack into someone's Friendster account. We can't promise you'll find anything interesting!

How To: Steal the basketball

Do you play basketball? Take a look at this instructional video and learn how to steal the ball on the court with Kansas senior point guard Russell Robinson. To this you, first you need to apply pressure. As you do this you force your opponent to make mistakes and this will give you a window of opportunity to exploit the situation. Keep in mind that you need to maintain defensive principles.

How To: Use Cheat Engine to hack the game Perfect World International

Tired of grinding out endless, boring quests for meager returns when you're playing Perfect World International? Want to rocket to high level and immense piles of treasure immediately? Cheat Engine is your answer! This free game hacking program frees you from having to hunt for cheat codes or exploit glitches to get ahead in PWI. Just follow along with this easy and quick hacking tutorial, which shows you how to use this program to change many of the values of your character and in the game.

How To: Get infinite bottle caps with a simple glitch in Fallout: New Vegas

An old glitch seems to have carried itself over from Fallout 3 right into Fallout New Vegas! Not surprising as they used the same game engine and resources, but regardless of that, you'd think that the Q&A team would have caught it. In this video you will learn how to exploit this glitch by purchasing a cheap item and then selling it back for more than the original price over and over and over again. Details in the video!

How To: Gain weight like a sumo wrestler

Have you ever wondered how sumo wrestlers are able to obtain and maintain such massive figures? Joseph Stickland, an applied clinical nutritionist, will explain to you exactly how a sumo wrestler is able to do this. Joseph will also explain the health detriments and the dangers to this type of lifestyle. Joseph explains that sumo wrestlers will skip breakfast, exercise, eat massive amounts of calories, (10,000 calories at least) for lunch, take a nap, and then have another mega calorie meal f...