Machine Traits Search Results

How To: Hack Apache Tomcat via Malicious WAR File Upload

Web applications are a prime target for hackers, but sometimes it's not just the web apps themselves that are vulnerable. Web management interfaces should be scrutinized just as hard as the apps they manage, especially when they contain some sort of upload functionality. By exploiting a vulnerability in Apache Tomcat, a hacker can upload a backdoor and get a shell.

How To: Enumerate NetBIOS Shares with NBTScan & Nmap Scripting Engine

NetBIOS is a service that allows for communication over a network and is often used to join a domain and legacy applications. It is an older technology but still used in some environments today. Since it is an unsecured protocol, it can often be a good starting point when attacking a network. Scanning for NetBIOS shares with NBTScan and the Nmap Scripting Engine is a good way to begin.

How To: Securely Sync Files Between Two Machines Using Syncthing

Transferring hundreds of screenshots, webcam recordings, keystroke logs, and audio recordings between your VPS and a local Kali machine can be tricky. Services like Dropbox don't always have the best privacy policies and suffer data breaches just like any other website. To mitigate these risks, we'll use a secure, open source, and decentralized alternative.

How To: Use Pupy, a Linux Remote Access Tool

In one of my previous articles, I discussed ShinoBot, a remote administration tool that makes itself obvious. The goal is to see if the user could detect a remote administration tool or RAT on their system. In this article, I'll be demonstrating the use of Pupy, an actual RAT, on a target Ubuntu 16.04 server.

How To: Google Search Tips and Tricks Part 1

This video will guide you 5 useful tricks and tips for Google search engine. These tips include search operators, search in a single site, get definition, calculation and currency conversion, fast essential information etc. So please watch the video and follow all the steps to employ in your machine.

How To: Reconstruct a t-shirt into an off the shoulder top

In this video, we learn how to reconstruct a t-shirt into an off the shoulder top. First, take a large shirt of your choice color and cut along the line on the shoulder, leaving a 1/4" seam allowance. Next, roll the hem and sew with a sewing machine. Next, cut a strap 4" wide and fold in half, then sew along the edge. After this, use a safety pin to pin one side to the shirt and then to the other side of the shirt. After these are secure, draw marks along the neck line of the shirt. Cut out t...

How To: Make a hedgehog plushie

In this tutorial, we learn how to make a hedgehog plushy. First, choose a fabric to use, then cut out the shape of it. Once you have done this, cut it out again and pin the two pieces of fabric together. After this, use a sewing machine to sew all of the sides together, leaving a hole in the bottom. Now, turn the hedgehog inside out and then iron him flat. Place some stuffy cotton into the plushy until it is as full as you would like it. Then, sew the hole together so none of the stuffing can...

How To: Make cotton candy without a machine at home

Okay, so just as a safety precaution before you dive right in and make yourself a batch of cotton candy at home, remember that melting sugar and corn syrup requires very high temperatures, so you could get burned if you're not careful. Make sure you keep a bowl of cool water next to you at all times just in case any of the hot stuff gets on your skin.