Helps Command Search Results

How To: Execute Remote Commands on a Disconnected Victim

Do you ever thought that you can't control an Internet disconnected system? I saw a funny video in Chema Alonso's youtube channel (A well-known hacker of my country and creator of Fingerprinting Organizations with Collected Archives among other security tools), and decided to post something similar.

How To: Linux Basics Tips

Hi nullbytes! I've been recently reading the whole Linux Basics for the Aspiring Hacker series and felt like it was missing some stuff I know, so I felt like sharing it with anyone who might find it useful too.

How To: Access blocked websites on school computers

In this video you will learn how to get past website blocks on your school network. Some school computers have command prompts blocked. If this is the case then you will want to open a notepad. In the notepad type command, then save as something school related, making sure the file name ends with .bat. Do not save it on the desktop, but rather in a folder deeper on the unit. Once you've saved it, make sure no one is looking, then open the file. It will bring up a blank black window. In the bl...

How To: Install software on Linux

Finding Linux hard to handle after using Windows? Well this should help, here is how to install software on Linux. Start off by clicking on application launcher. Here go into applications, then into 'system' where you should find software management. In this program go straight into the settings and then edit software sources. Under 'downloadable from internet' make sure every option has a check against it. Now press the software management tab on the side. Now this is where you can get which...

How To: Zoom in and out on a Mac

In this video tutorial, viewers learn how to zoom in and out on a Mac computer. To access the zooming tool, begin by clicking on the Apple menu and select System Preferences. Under System, select Universal Access and check On under Zoom. In Options, users are able to set specific settings such as the maximum and minimum range of zoom. The keyboard shortcut for zooming in is: Option, Command and =. The keyboard shortcut for zooming out is: Option, Command and -. This video will benefit those v...

How To: Teach your dog to retrieve

In this how to video, you will learn how to teach your dog to retrieve. First, you should teach your dog the a regular retrieve. You will toss the object so that the dog sees where it lands. Next, give it the command to retrieve. Next, attempt the semi blind retrieve. This involves tossing the object, allowing your dog to see where it has gone. Next, distract the dog for a bit before giving it the command to retrieve. The full blind retrieve should now be attempted. This is done by hiding the...

How To: Auto align and merge images in Photoshop

Open your first image and go to the rectangular marquee tool and select all of the image. Next click command or control C to copy image. Then go to your second image and click command or control V to paste the image. Select both the layers (hold down shift when clicking the layer), then go to edit, auto align layers and choose the top option then click ok. Last add a mask to your top layer, this is done by selecting the gradient tool (make sure its set black to white, the mode is normal and o...

How To: Add today's date & time via keyboard shortcut in Excel

New to Microsoft Excel? Looking for a tip? How about a tip so mind-blowingly useful as to qualify as a magic trick? You're in luck. In this MS Excel tutorial from ExcelIsFun, the 618th installment in their series of digital spreadsheet magic tricks, you'll learn about a handy key command that will allow you to enter both today's time and date into a single Excel cell.

How To: Teach your dog the perfect "STAY"

This is the most important thing that a dog should know. In this video will learn the fundamentals of how to begin to teach this. It is by no means entirely conclusive to the training that is involved in teaching stay. Tab with his German Shepherd "Solea" demonstrate the do's and don't when training your dog to "stay". You'll also learn the importance of this command for the dogs safety.

How To: Communicate with your dog

Check out this lesson on how to understand your dog and train her to listen. This video will show you how to use a clicker to communicate with your dog. It will also show you how to teach your dog the "Leave It" command. This is a helpful video for training puppies and older dogs.

How To: Hack UnrealIRCd Using Python Socket Programming

UnrealIRCd is an open-source IRC server that has been around since 1999 and is perhaps the most widely used one today. Version 3.2.8.1 was vulnerable to remote code execution due to a backdoor in the software. Today, we will be exploiting the vulnerability with Metasploit, examining the underlying code to understand it, and creating our own version of the exploit in Python.

How To: Get Root with Metasploit's Local Exploit Suggester

So you've managed to get a shell on the target, but you only have measly low-level privileges. Now what? Privilege escalation is a vast field and can be one of the most rewarding yet frustrating phases of an attack. We could go the manual route, but like always, Metasploit makes it easy to perform local privilege escalation and get root with its exploit suggester module.

How To: Unlock the Bootloader on Your Pixel 3a

The first thing you'll always have to do before getting your customization game on with most phones is to unlock the bootloader. Doing so opens the true potential of the device, allowing you to root, install TWRP, Magisk, custom ROMs, and other mods. No matter your wants or needs, there's no way around it — the bootloader must be unlocked to modify the system.

How To: Use Websploit to Scan Websites for Hidden Directories

Websites are often misconfigured in ways that allow an attacker to view directories that are not ordinarily meant to be seen. These directories can contain sensitive information such as private credentials or configuration files that can be used to devise an attack against the server. With a tool called Websploit, hackers can scan targets for these hidden directories without difficulty.

How To: Use Metasploit's WMAP Module to Scan Web Applications for Common Vulnerabilities

Having an efficient workflow is an integral part of any craft, but it's especially important when it comes to probing apps for vulnerabilities. While Metasploit is considered the de facto standard when it comes to exploitation, it also contains modules for other activities, such as scanning. Case in point, WMAP, a web application scanner available for use from within the Metasploit framework.