Exploits Para Linux Search Results

How To: Hack WPA WiFi Passwords by Cracking the WPS PIN

A flaw in WPS, or WiFi Protected Setup, known about for over a year by TNS, was finally exploited with proof of concept code. Both TNS, the discoverers of the exploit and Stefan at .braindump have created their respective "reaver" and "wpscrack" programs to exploit the WPS vulnerability. From this exploit, the WPA password can be recovered almost instantly in plain-text once the attack on the access point WPS is initiated, which normally takes 2-10 hours (depending on which program you use).

How To: Troubleshoot problems in Ubuntu Linux

Ubuntu comes with pre-installed tools that can help solve problems you may encounter when using Ubuntu Linux. This video tutorial shows how to identify and address common problems in Ubuntu Linux. Such tools discussed include the system monitor, the log file viewer and the network tools.

How To: Play Windows games on GNU/Linux

Are you, as a Linux user, jealous of the gaming possibilities available to your Windows and GNU/Linux-running friends? In this tutorial, Linux Journal Gadget Guy Shawn Powers walks you through how to play Windows games on Linux using Wine, an open source implementation of the Microsoft Windows API built on the X-Window System.

How To: Seize Control of a Router with RouterSploit

A router is the core of anyone's internet experience, but most people don't spend much time setting up this critical piece of hardware. Old firmware, default passwords, and other configuration issues continue to haunt many organizations. Exploiting the poor, neglected computer inside these routers has become so popular and easy that automated tools have been created to make the process a breeze.

How To: Install Puppy Linux on an innotek VirtualBox

The author shows how to install Puppu Linux 4.3.1 in Innotek VirtualBox 1.5.2. He shows steps to create a new virtual machine in Innotek VirtualBox, by showing the various configuration settings like the RAM size, hard disk space etc. He shows how to boot the virtual machine with the Puppy Linux installation ISO file. Next, during boot up, he shows how to set the language and regional settings, resolution settings etc. In the next screen he shows how to access the local drive and partition it...

How To: Compile a kernel in a Debian-based Linux distribution

In this four-part video tutorial series, you'll learn how to compile a Linux kernel on a Debian-based system (e.g., Ubuntu). You'll learn two separate methods for kernel compilation, both (1) how to make the kernel into a Debian package, which can be handy if you're using a package manager and (2) how to install the kernel manually with make and make install. Take a look!

How To: Install any version of Linux on your computer

Tired of Windows? Want to see what all the buzz is about Linux but you're not a computer expert? In this video, you'll learn how to use a free program called "Wubi" that lets you effortlessly install any flavor of Linux onto your Windows PC, without changing or damaging your existing Windows installation! Wubi handles all the installation and configuration for you, and allows you to dual-boot both Windows and Linux on the same computer.

How To: Install Damn Small Linux

Sneekylinux will show you how you can install small Linux on your computer. You can install Linux on you you computer and this helps your DSL run faster. Find out what programs to open to get the Linux install. You will be installing the Linux on to your hard drive so it can boot as you turn your computer on and make running your DSL faster. Take the guess work out of the process, and put DSL on your hard drive.

How To: Linux Basics for the Aspiring Hacker: Managing Hard Drives

Managing hard drives in Linux is crucial to understanding your system and its operation as well as understanding the system you are exploiting or conducting a forensic analysis on. Linux has numerous commands that can provide us with information, control, and management of hard drives, and in this tutorial, we will examine a number of the most important ones.

News: What to Expect from Null Byte in 2015

Welcome back, my greenhorn hackers, and happy New Year! Now that your heads have recovered from your New Year's Eve regaling, I'd like to grab your attention for just a moment to preview 2015 here at Null Byte. I hope you will add your comments as to what you would like to see, and I'll try to honor as many requests as I can.

How To: Dual boot Ubuntu Linux and Windows

Want to try out a Linux installation without deleting Windows? This is a brief tutorial on how to install Ubuntu linux as a dual boot with Windows. This should work with Windows 3.1, Windows 95, Windows 98, WIndows 2000, Windows ME, Windows XP, Windows 2003, and Vista.

How To: Get Root with Metasploit's Local Exploit Suggester

So you've managed to get a shell on the target, but you only have measly low-level privileges. Now what? Privilege escalation is a vast field and can be one of the most rewarding yet frustrating phases of an attack. We could go the manual route, but like always, Metasploit makes it easy to perform local privilege escalation and get root with its exploit suggester module.

How To: Uninstall and remove Linux

Watching this video will allow you to learn the complete step-by-step process of uninstalling a dual-boot partition of Linux on a Windows Vista machine. The author will first walk you through uninstalling GRUB, the boot manager used while the partition with Linux was still being used. After showing how to uninstall GRUB, you will be walked through both with audio instructions and corresponding on-screen actions in windows to remove the Linux OS files from the two partitions used by the machin...