Input Bandwidth Search Results

How To: Build a Stealth Port Scanner with Scapy and Python

As we're all aware, recon is vital to a successful hack. We need to know everything we can about the target in order to perform the best possible attack. Port scanning is a basic recon concept that is introduced very early in learning proper reconnoissance. The issue with port scanning is that is makes a lot of noise. Every connection to every port will be logged. This is where stealth scanning comes in. Also known as SYN or half-open scanning, stealth port scanning is a bit quieter, and is l...

How To: Patch the Glitchy Mic on Your OnePlus One to Use "Okay, Google" Commands Anywhere

Thanks to a recent back-end update to Google's Search app, every KitKat-running device can use "Okay, Google" from within any app—even the lock screen. However, the default settings for the OnePlus One's mic leave it unable to detect your voice unless you have it right up to your face. That isn't a good look for anyone, but thankfully there is an easy fix to get this working correctly.

How To: Put Google's Search Tools Back on the Left Sidebar

Last month, Google changed the placement of search options from the left side of the page to the top, right above the first result. In theory, this shouldn't be such a bad thing—it's just looks, right? Well, not quite. Turns out, it actually got rid of a few of the options as well, and a lot of people were not too happy about it. The problem is that the change gives you less functionality, and makes the options that are still there harder to get to. One of the most frustrating changes was how...

How To: Convert Your Old Cassette Tapes into Digital MP3 Music Files

Before my time, people used to listen to music recorded on these things... I didn't really know what this thing was until my parents clarified and told me that they were called cassette tapes. These "cassette tapes" were utilized to store sound recordings on either side of the tape, which could usually hold between 30 to 45 minutes. I laughed at that information as I took out my iPhone 5 (roughly the same size), which can store roughly 40,000 minutes worth of music.

How To: Don't Have Photoshop? Use the Free Web Tool Cropp.me to Crop and Resize Images Easily

Cropping images can be a huge pain if you have a bunch to do at once. Even if you have Photoshop or a similar program, the process of opening each individual photo and cropping them one at a time can take forever. A free web-app called Cropp.me makes that task a lot easier by auto-cropping your photos to whatever size you choose. All you have to do is upload an image, choose what size you want it to be, and click Cropp My Images. You can choose from a list of sizes or input a custom size of y...

How To: Redial Busy Numbers Automatically on Your iPhone So You Don't Have to Keep Calling & Calling Manually

Even under normal circumstances, it's almost impossible to speak to a representative for a government agency or company in just one try. Many systems will put you on hold for long periods or ask to call you back when someone is available, but there are still some out there that just give you the busy signal over and over again. In those cases, there's a jailbreak tweak that can help.

News: The Best Microphones for Your Podcast & Voiceover Recordings

The landscape of podcasting has exploded in recent years, with everyone from dedicated longtime podcasters reaching the mainstream spotlight, to traditional media personalities moving from TV, radio, and newspapers to grab a slice of the listening pie. The good news is that the barrier to entry is relatively low, so even if you're not a celebrity or media luminary, you can still get your voice out there by starting a podcast.

How To: Create Your Own Augmented Reality Filter for Instagram Stories Using Spark AR on Mac or Windows

There's a new trend on Instagram Stories: People are making viral AR filters where images of popular characters from TV shows, movies, and other mediums shuffle above your head until one sticks. The filters range from Disney and Pokémon characters to Harry Potter and Friends, but you're not limited to just that because you can create your own "which are you?" filter.

News: What's New in Shortcuts in iOS 13

When Apple acquired the popular Workflow app in 2017, many were worried that it would either get replaced with something much worse, or just disappear entirely. Thankfully, Apple put these concerns to rest with the launch of Shortcuts. In iOS 13, Shortcuts is becoming more powerful than ever, providing functionality on the iPhone that the original Workflow team could only dream of.

How To: Stop a Show from Continuously Autoplaying Episodes in Apple Podcasts

Introduced to Apple Podcasts back in iOS 11.2, whenever one episode of a show ends on your iPhone the next one begins right away for an uninterrupted experience. While the continuous playback feature for each show or station is incredibly useful for lengthy commutes, long drives, or to catch up on what you've missed, it may not be ideal for other situations.

How To: Use SQL Injection to Run OS Commands & Get a Shell

One of the ultimate goals in hacking is the ability to obtain shells in order to run system commands and own a target or network. SQL injection is typically only associated with databases and their data, but it can actually be used as a vector to gain a command shell. As a lesson, we'll be exploiting a simple SQL injection flaw to execute commands and ultimately get a reverse shell on the server.

How To: Advanced Techniques to Bypass & Defeat XSS Filters, Part 2

Cross-site scripting can be one of the easiest vulnerabilities to discover, but to be successful with this type of attack, it is essential to learn how to get past filters. In the previous guide, we explored some ways to do this, such as abusing attributes and event handlers and tricking the application into accepting unusual characters. Now, let's take a look at more techniques used to defeat filters.

How To: Crack Shadow Hashes After Getting Root on a Linux System

After gaining access to a root account, the next order of business is using that power to do something more significant. If the user passwords on the system can be obtained and cracked, an attacker can use them to pivot to other machines if the login is the same across systems. There are two tried-and-true password cracking tools that can accomplish this: John the Ripper and Hashcat.