Things that are supposed to make life easier for developers and users are often easy targets for exploitation by hackers. Like many situations in the tech world, there is usually a trade-off between convenience and security. One such trade-off is found in a system known as Distributed Ruby, which can be compromised easily with Metasploit.
Rooting usually means sacrifice. With most root methods, you lose access to apps like Netflix and Android Pay when SafetyNet gets tripped. More importantly, you lose the ability to accept OTA updates, forcing you to manually flash new Android versions. But there's a way around all of this if you root the right way.
With the rise of website encryption (TLS), sniffing passwords from network activity has become difficult. However, it's still possible to quietly exfiltrate a target's network traffic in real time to extract passwords and sensitive information. Pertaining to macOS, there are two methods for retrieving traffic from a backdoored Mac.
Because it sources a majority of its vital data from actual drivers on the road, Waze is easily one of the best navigation apps to use if you prioritize safety. Benefits such as crowd-sourced traffic data, police trap locations, and road work avoidance, when combined, help you anticipate traffic conditions with unprecedented accuracy and make adjustments accordingly.
Unscheduled pit stops go hand in hand with road trips, no matter how well-planned they are. In the past, making a stop due to low fuel or an emergency bathroom break may have snowballed into massive delays when you went off course on your own, but thanks to a feature in Apple Maps, you can do this in the most efficient manner possible.
Ransomware is software that encrypts a victim's entire hard drive, blocking access to their files unless they pay a ransom to the attacker to get the decryption key. In this tutorial, you'll learn how easy it is to use the USB Rubber Ducky, which is disguised as an ordinary flash drive, to deploy ransomware on a victim's computer within seconds. With an attack that only takes a moment, you'll need to know how to defend yourself.
Barrow's article on Pupy made me wish for a RAT that could target an OS frequently used by gatekeepers at startups, tech companies, and creative firms: macOS. Once run, a RAT can do severe damage by dumping a user's stored credentials for many accounts. The best loot lives in the Chrome Password cache, and EvilOSX, an OS X RAT, infiltrates macOS and dumps these credentials.
In one of my previous articles, I discussed ShinoBot, a remote administration tool that makes itself obvious. The goal is to see if the user could detect a remote administration tool or RAT on their system. In this article, I'll be demonstrating the use of Pupy, an actual RAT, on a target Ubuntu 16.04 server.
In my previous article, we learned how to generate a vulnerable virtual machine using SecGen to safely and legally practice hacking. In this tutorial, we will put it all together, and learn how to actually hack our practice VM. This will provide some insight into the methodology behind an actual attack and demonstrate the proper way to practice on a VM.
Sometimes you need a password to gain access to an older running Windows system. Maybe it's a machine in your basement you forgot about or a locked machine that belonged to a disgruntled employee. Maybe you just want to try out your pentesting skills.
At this point in our series on creating a customized hacking container, you should be able to use Docker to save and retrieve customized instances of Ubuntu from your own machine. Make sure to revisit part one and part two if you need a refresher.
In this series you will learn how to use PHP to perform attacks, gather information, and setup backdoors. Along with performing attacks you will learn how to protect yourself from them. In this part you will learn about PHP as well as install Apache and PHP. What you'll need for this series
How's it goin'? In this tutorial, we will learn about the security issues of the popen and system functions. I've seen a few people attempting to run command line utilities or whatever it is they require with calls to these two functions but may not know the security implications which come along with it. I will show you using an example from the wargame IO Smash The Stack.
Hello friends. This is actually my first how to.
Do you have a file (or many files) that, in the wrong hands, may cause you trouble? Don't worry about it, because I'll show you how to wipe it (or them) from your computer in order to leave no trace behind.
Cortana, Microsoft's voice-activated personal assistant, originally launch on Windows Phone, but is now built directly into Windows 10 complete with "Hey Cortana" voice search (take that, Apple). It can help you locate files, set up reminders, control music.
When I left off on our last hack, we had hacked into the ubiquitous Windows Server 2003 server by adding ourselves as a user to that system so that we can return undetected at any time. The problem with this approach is that a sysadmin who is on their toes will note that a new user has been added and will begin to take preventative action.
Dr. Yin will show viewers how to properly train kittens simple behavior. The wrong way to train a cat is by putting a collar on it and then attach a chain and yank on it. Instead, you will reward them with good behavior when they occur and never when bad behavior is exhibited. Start when the cat is hungry and offer treats when they obey your commands. Be careful not to reward them when they claw at your hand for the food. To train them to sit, only feed them their food when they're sitting. T...
New to Windows? No problem... here's a beginner's video tutorial that will teach you how to install Windows 7 Visa with a USB flash drive. See how to take the Windows ISO and put it on a USB flash drive for fast and easy installation.
XSS Shell is a cross-site scripting backdoor into the victim's browser which enables an attacker to issue commands and receive responses. During a normal XSS attack an attacker only has one chance to control a victim's browser; however, the XSS Shell keeps the connection between the attacker and the victim open to allow the attacker to continuously manipulate the victim's browser. XSS Shell works by setting up an XSS Channel, an AJAX application embedded into the victim's browser, that can ob...
If you pay attention to the top left corner of this video, you'll get to look at the commands for each of Freddy Krueger's fatalities in the new DLC available for Mortal Kombat 9. The last fatality the Achievement Hunters demonstrate is the horrifying 'Babyality.'
The newest Mortal Kombat 9 introduced Rain into the tournament and he has several gruesome fataliites. Take a look at the top left corner for the commands as the Achievement Hunter team gives us a look at each of them.
A recent addition to Mortal Kombat 9 in the form of DLC has reintroduced several classical features of Scorpion, Sub-Zero, and Reptile including some of the more traditional fatalities. Take a look at this video from the Achievement Hunter team and watch for the commands necessary to perform each of these violent attacks.
Watch this video to learn how to update your LG GT540 to Android 2.3.2 using this folder, these fastboot drivers, LG drivers, fastboot and kdz updater. Learn all of the commands for installing Android 2.3.2 on an LG GT540.
Use Iron Trapdoors and redstone to make a moving bridge in Minecraft. This video has specific, easy to follow instructions for building a moving bridge. Watch and learn how to replicate this clever bit of Minecraft engineering with single player commands.
What's your Minecraft world's landscape missing? An enormous creeper maybe? Check out this video to learn how to build a huge creeper in Minecraft. This technique suggests installing the Single Player Commands mod and Too Many items mod for Minecraft beta 1.6
There's safety in numbers. Protect yourself as you explore the unpredictable world of Minecraft with a pack of wolves. You can use bones to tame wolves and keep them as your pets. Minecraft is a lot safer when you have a pack of wolves who do whatever you command.
Are you playing Minecraft on a Mac? Would you like more functions and better performance from chat? Check out this video, you'll need to download Modloader and improved chat. You'll be able to bind keys, so that your most used commands are only a single keystroke away!
Hiding icons from the system tray is easy, but what if you want to get rid of the program entirely? This tutorial shows you how to use the command prompt in Windows to create a service that will allow to delete all extraneous programs.
If you've learned other programming languages, you're likely already familiar with the break and pass flow control commands when programming loops. This video shows you how to use them when writing code in Python, and also how to use the continue trick in your program.
Destroy everything on the map! This tutorial shows you how to defeat the army of crabs, without ever being able to summon the Mama Crab. The solution, of course, is as many explosives and bombs as you can fit onto a rocket.
The less time you spending futzing with your mouse, the more time you can spend making music. Learn how to save time in Reason 5 with a number of useful keyboard shorcuts. Whether you're new to Propellerhead's virtual music studio application, Reason, or their newer DAW app, Record, you're sure to find much to take away from this brief, official video software tutorial.
You will need to be playing Fallout: New Vegas on the PC, and make sure that you have enabled the console. This is not a mod, but you will need to enter a few console commands in order to get the enclave power armor.
Some players might encounter a few bugs when playing the Oh My Papa Melissa mission in Fallout: New Vegas. If you are playing on a PC, you can open up the dev console and manually enter a few commands to fix this bug.
This only works for the PC version of the game, since you will need to enable the dev console to be able to get it. Once you do, you can use a console command to get access to a room that gives you all the items in the game.
The Ranger Combat Armor is the suit featured on the cover of Fallout: New Vegas, and this easy tutorial shows you how to get this armor for yourself without having to use any glitches or console commands to obtain it.
By enabling the console, you can give yourself as much gold and XP as you want. You can even make yourself unkillable, no matter how many darkspawn, rage demons or reavers you face down! This video demonstrates how you can enable the console and a few useful commands.
You can easily attach garages to your foundation homes when you're building a house in Sims 3! You'll need to open up the cheat editor first, but you only need to enter a few commands to make the garage work with the rest of the house.
You'll need to open your cheat box to make this happen, and then type in a few commands. Once you do, you're now able to break into homes (even if the sims are there) and use the teleportation pad to break into houses and steal all their things!