Fundamental Machines Search Results

How To: Get Root Filesystem Access via Samba Symlink Traversal

Samba can be configured to allow any user with write access the ability to create a link to the root filesystem. Once an attacker has this level of access, it's only a matter of time before the system gets owned. Although this configuration isn't that common in the wild, it does happen, and Metasploit has a module to easily exploit this security flaw.

How To: Quickly Gather Target Information with Metasploit Post Modules

Post-exploitation information gathering can be a long and drawn-out process, but it is an essential step when trying to pivot or establish advanced persistence. Every hacker should know how to enumerate a target manually, but sometimes it is worth it to automate the process. Metasploit contains post modules that can quickly gather valuable information about a target, saving both time and effort.

How To: Beat LFI Restrictions with Advanced Techniques

One of the most common web application vulnerabilities is LFI, which allows unauthorized access to sensitive files on the server. Such a common weakness is often safeguarded against, and low-hanging fruit can be defended quite easily. But there are always creative ways to get around these defenses, and we'll be looking at two methods to beat the system and successfully pull off LFI.

How To: Bypass UAC & Escalate Privileges on Windows Using Metasploit

UAC is something we've all dealt with on Windows, either as a user, administrator, or attacker. It's a core feature of the Windows security model, and for the most part, it does what it's supposed to. But it can be frustrating as a hacker when attempting privilege escalation, but it's easy enough to bypass UAC and obtain System access with Metasploit.

How To: Samsung Disabled This S10 Setting — But Turning It On Will Drastically Improve Battery Life

It's no secret that Google is all about AI. In their eyes, machine learning is the future of software development, and you can see evidence of this all over the last couple Android updates. They've used it to power all sorts of features in their Pixel phones, and they've even donated some of their AI smarts to AOSP for all Android manufacturers to share. But it looks like Samsung isn't exactly on board.

How To: Use the USB Rubber Ducky to Disable Antivirus Software & Install Ransomware

Ransomware is software that encrypts a victim's entire hard drive, blocking access to their files unless they pay a ransom to the attacker to get the decryption key. In this tutorial, you'll learn how easy it is to use the USB Rubber Ducky, which is disguised as an ordinary flash drive, to deploy ransomware on a victim's computer within seconds. With an attack that only takes a moment, you'll need to know how to defend yourself.

How To: Punchabunch Just Made SSH Local Forwarding Stupid Easy

SSH local forwarding is a must for covering your tracks and getting out there to do your work. Also called SSH tunneling, this process will put one or more steps between your machine and the machine you're working on, for security and other purposes. It can be a bit daunting for newbies to get down, and that's where Punchabunch comes in.

News: Augmented Reality Surprised Sundance Film Festival with a Journey into the Human Brain

The largest and arguably most widely known event of its type, especially in the US, the Sundance Film Festival is an annual celebration of independent film—ones made outside the Hollywood system. This year, a new type of experience appeared at the Sundance Film Festival in an installation called "The Journey to the Center of the Natural Machine." This mixed reality presentation offered the user the newest type of storytelling in a long and important line—continuation of the species kind of im...

Hack Like a Pro: Metasploit for the Aspiring Hacker, Part 12 (Web Delivery for Linux or Mac)

Welcome back, my budding hackers! Metasploit, one of my favorite hacking/pentesting tools, has so many capabilities that even after my many tutorials on it, I have only scratched the surface of it capabilities. For instance, it can be used with Nexpose for vulnerability scanning, with Nmap for port scanning, and with its numerous auxiliary modules, nearly unlimited other hacking related capabilities.

How To: Parallel Programming with OpenMP: A Quick Introduction

As many of you know, processor's clock frequency improvement got stuck in about 2003, causing the origin of multicore CPU (and other technologies). In this article I'll introduce you on how to run code simultaneously in various processors (I suppose that all of you have a multicore CPU). When you write code without any parallel directive, it only executes in one CPU at the same time (see it below). OpenMP make simple to work with various cores (if not with all of them) , without so much heada...

How To: Take Pictures Through a Victim's Webcam with BeEF

Recently, I've been experimenting with BeEF (Browser Exploitation Framework), and to say the least, I'm hooked. When using BeEF, you must "hook" the victims browser. This means that you must run the script provided by BeEF, which is titled "hook.js", in the victims browser. Once you've done that, you can run commands against the victims browser and cause all kinds of mayhem. Among these commands, there is an option to use the victims webcam. This is what we'll be doing here today, so, let's g...

News: Banks Around the World Hit with Repeated DDoS Attacks!

In recent weeks, major bank websites around the world have experienced outages after being have been hit with Distributed Denial of Service (DDoS) attacks. Although few, if any, of these banks have been totally knocked offline, these DoS attacks have dramatically slowed the response time of their websites to legitimate customers. The most recent victim was the Royal Bank of Scotland. Due to this attack, RBS customers were unable to access their accounts for about an hour last week.

Hack Like a Pro: How to Hack the Shellshock Vulnerability

Welcome back, my hacker novitiates! Every so often, a MAJOR vulnerability appears that makes millions of systems vulnerable to attack. The most recent, named Shellshock, basically leaves every Mac OS X, Linux, and UNIX system on the planet vulnerable. As nearly two-thirds of all web servers on planet Earth run one of these operating systems (primarily Linux), that's a whole lot of systems out there waiting to be harvested.

How To: Airbrush a cake

Have an airbrush machine just for baking. Be certain that it is always clean. Cover the surface where you will be working as the color will fly. Cover around the cake and behind the cake. You can use newspaper, butcher paper or a disposable tablecloth. Pressure, angle and speed are very important when using an airbrush. It is best to practice. The more practice, the more comfortable you will become with the airbrush. Draw what you are going to put on the cake to use as a guide. Put just a bit...

How To: Bake chocolate fudge brownies with nuts

Chocolate brownies aren't a well-known dessert in France— it's more of a United States favorite, but that doesn't mean it shouldn't be made by anybody with a carving for chocolate. Try making these fudge brownies. With the rich flavor and consistency of the nuts and chocolate combination in these fudge brownies, you'll fall in love with them. Watch the recipe for baking chocolate fudge brownies from Chef Hubert Keller.

How To: Make an Italian margherita pizza

Everybody's favorite food is pizza. But not everybody knows how to actually make a pizza, which is practically a sin. And this "margherita" style pizza is a great one to learn, full of Italian simplicity— red tomato sauce, mozzarella cheese, and green basil— all the colors of the Italian flag. Check out the recipe for this delicious margherita pizza.

How To: Make pizza dough and style with your favorite toppings

Chef Hubert Keller is known for his ingenuity in cooking, like when Frank Sinatra came into his restaurant and ordered something not on the menu — a pizza. Quickly, he had to come up with a great pizza recipe and this is what's come of it. Check out the recipe for this mouthwatering pizza from Chef Hubert Keller. You learn the whole process, from dough to sauce to baking.

How To: Make a chunky gazpacho summer soup

Gazpacho is a Spanish-style soup served cold, made from vegetables (especially tomatoes) and spices. There's nothing better than chowing down on a nice bowl of gazpacho during a hot summer day. It's refreshing, healthy, colorful and delicious, with cucumbers, bell peppers and tomatoes. Check out the recipe for this chunky gazpacho soup from Chef Hubert Keller.

How To: Create a mousetrap noisemaker prank device

Besides being useful, mousetraps can be pretty loud, which makes them perfect for the prankster at heart. They can scare the crap out of your intended victim, but for some, giving them the heebie-jeebies can be more difficult than just a normal trap. They might not scare as easily with a short burst of sound. But they will if you add a few mods to that everyday mouse trap!

How To: Bake a simple homemade bread

Make an easy, simple bread that will taste better than store-bought stuff. Ingredients: - 3 cups of flour- 1 tsp of salt- 3/4 tsp of yeast, and 1 1/2 cups of water Steps: 1. Mix together all the dry ingredients. If the yeast you used is bread machine yeast, mix it in normally. If it's normal yeast, which means it's a bit bigger, dissolve it into the water first. 2. Add the water, and mix it together until you can form it into a fairly uniform ball. 3. Cover and let it rise for 3 to 5 hours. O...

How To: Make mini polymer clay pancakes for a dollhouse

Garden of Imagination teaches viewers how to make cute and adorable mini polymer clay pancakes for a dollhouse or decoration. First start out with a wooden square to put the finished product on. Next, start out with light brown clay and roll it out on a clay setting number 4 on the pasta machine. Next, use a circle cutter to cute the shape of pancake. Next, texture the pancake so it look doughy and make sure the edges are not too straight. Make three of these pancakes and place them on the wo...