Local Real Search Results

How To: Security-Oriented C Tutorial 0x08 - A Trip Down Memory Lane

Before I continue with a topic on strings, we first require some fundamental understanding of how memory works, i.e. what it is, how data looks in memory, etc. as this is crucial when we are analyzing vulnerabilities and exploitation. I highly suggest that your mind is clear and focused when reading the following article because it may prove to be confusing. Also, if you do not understand something, please verify all of your doubts, otherwise you may not completely understand when we touch on...

How To: Find Your Lost Cat

When your cat goes missing, chances are it's just chilling in a cozy spot under the couch, or maybe even hiding from you. So it's okay to not freak out just yet. Cats love to hide as if they're spiders, and even their hiding spots are similar. You can find them in corners, on the refrigerator, and according to my roommate, even the dryer hose is fair game.

How To: Add Folders to Other Folders on Your iOS 9 Home Screen

One of the most exciting things about a major iOS update is the discovery of new glitches, or even just finding ways to replicated the old ones that we've come to love so much. One of these is the glitch that lets you nest folders within folders on the home screen, which can save some major screen real estate. While this glitch was available in both iOS 7 and iOS 8, the process is slightly different in iOS 9, but you still have a couple options to choose from.

How To: Get Root Access on OS X Mavericks and Yosemite

Hello all! In this tutorial, I'd like to show you one way of getting root on OS X. Check out this GitHub page for a recent privilege escalation exploit that was recently discovered. I've tested it and it works on both OS X 10.9 Mavericks and OS X 10.10 Yosemite, but appears to have been patched with OS X 10.11 El Capitan. If you check out the file main.m you can see where most of the magic is happening. This source code can very easily be changed to make it do more than just the system("/bin/...

How To: This Easy Tip Will Make Your Homemade Cupcakes Look More Professional

A simply frosted or glazed cupcake is like a blank canvas for creative decorations. Intricate cupcakes are works of art, but piping frosting or rolling fondant can be tricky. Luckily, even the most craft-challenged person can use pre-made decorations to create party-worthy cupcakes. Use chocolates or candies to make designs or other decorations and you can have endless fun (and very little stress) creating eye-catching treats.

How To: Grab All the Passwords

This is a short explanation and tutorial on how to grab saved passwords from Google Chrome, ideally from a meterpreter session. The idea behind this is to understand how saved passwords work and how to keep them safe. Let's have some fun :D Understanding Google Chrome Saved Passwords

How To: Make Homemade Nutella (That's Better Than the Real Stuff)

It is a universal truth that Nutella is the nectar of the gods. It takes the already delicious (e.g., sandwiches, cupcakes, or even bacon), and turns it into something magical. Everyone also knows homemade is always better. So if you're looking to step up your baking game, follow these instructions from Cookies, Cupcakes, and Cardio and make your very own Nutella!

How To: Writing 64-Bit Shellcode - Part 1 (Beginner Assembly)

In this simple tutorial you will be shown step-by-step how to write local shellcode for use on 64-Bit Linux systems. Shellcode is simple code, usually written in assembly that is used as payload in exploits such as buffer overflow attacks. Payloads are the arrow head of an exploit: though the rest of the arrow is important for the delivery of the attack, the arrow head deals the killing blow. In reality, payloads are slightly less exciting yet far more interesting and intelligent than medieva...

How To: Enable LED Flash Alerts for Calls, Texts, & Battery Warnings on Android

When ringtones and vibration alerts miss the mark and fail to grab your attention, causing you to miss an important call or text, LED flash alerts are a great backup plan. While we already showed how to activate this on Samsung devices, the apps shown below make this feature easier to toggle on and off. Plus, they work on devices that don't have flash alerts included in the system settings.

How To: Use Social Engineering to Hack Computers

Today I am going to teach the various ways that you can use social engineering to hack a system. For those of you that have followed my past tutorials, you know that social engineering can unlock a world of possibilities. This is because no matter how many firewalls, no matter how many patches there are on a server, the password is kept in the minds of people...and people, are not as smart as computers.

Slated: An iOS Keyboard That Lets You Text in Any Language You Want on Your iPhone

Many of us were required to take a foreign language in school, but sadly, many of us are far from fluent in said language. To be a better citizen of the world, learning popular and rare languages would be dope, but in reality, that's probably never going to happen. If you ever do find yourself in a situation where you're messaging people who don't speak your language, there's an app that can help you.