Obtaining Brain Search Results

How to Meterpreter: Obtaining User Credentials with PowerShell

In this article I will show you how to obtain victim's credentials without cracking any hashes. There are a couple of ways to perform this task (for example dumping the SAM file and cracking the NTLM hashes), but here I will explain how to do it using PowerShell and a bit of social engineering. We are going to create a fake login popup.

How To: Security-Oriented C Tutorial 0x0B - User Input

Hey readers! This tutorial will be the entry point for the introduction of buffer overflows. Something like requesting user input is a very common place for vulnerabilities to pop up and we will definitely have fun while trying to make programs crash. But for now, let's start with how we can get input from a user.

How To: Make glow sticks with DEP, TCPO, sodium acetate & dye

If you prefer glow sticks over candles during a power outage, then this how-to is for you! Although glow sticks are used as temporary light sources, there are other applications for them. Divers use them for night diving, fisherman use them to catch swordfish, and the military uses them for light markers, along with infrared versions used in conjunction with night vision devices. But with all these handy uses for glow sticks, the most popular is — recreational use, like dancing at raves, some...

How To: Make bo kho (vietnamese beef stew)

Titlibo Nihaan shows us how to make Bo Kho(Vietnamese Beef Stew,in this video. The ingredients for this are,500 grams of beef,3 chopped shallots,1 small onion, thinly sliced,soy sauce,nuoc mam sauce,a bunch of fresh basil,2 red chillies,3 cloves of garlic,1 tablespoon lemon grass,1 tablespoon of turmeric powder,1 tablespoon of curry powder 1 tablespoon of brown sugar,4 star anise and a beef stock cube.In a small pan dry roast the star anise for 5 minutes.When cooled,gring them in a coffee gri...

How To: Fold an origami lotus flower with one sheet of paper

To make a lotus out of a single sheet of paper, use a colored, square paper sheet with a different center color (optional). With the colored side facing outwards, fold the sheet diagonally in half creating a center crease. Open up and repeat the step with the other corner to obtain a center point. Carefully fold the 4 corners towards the center point to form a smaller square. Repeat the same procedure with this square. Flip over and repeat the same procedure over again. The next step is optio...

How To: Make bacon from scratch with Karen Solomon

Karen Solomon shows how to make bacon. You need 2 1/2 to 3 pounds of pork belly with no skin or bone. Rinse the belly with water and pat really dry. Mix ingredients for cure which includes 1/2 cup sugar, 1 tablespoon blackstrap molasses, 1 teaspoon freshly ground pepper, 2 tablespoons kosher salt and 1 teaspoon curing salt. Curing salt may be obtained at local butcher shop or online at Sausage Maker. Curing salt helps preserve the color of the bacon and ensures no spoilage. Mix ingredients un...

How To: Make aluminum nitrate nonahydrate

Aluminum nitrate nonahydrate is a crystalline hydrate - a salt of aluminum and nitric acid - Al(NO3)3·9H2O. It's used for a variety of things such as antiperspirants, corrosion inhibitors, and petroleum refining, or… glow-in-the-dark powder. Watch this science video tutorial from Nurd Rage on how to make aluminum nitrate nonahydrate with Dr. Lithium.

How To: Use a light meter to properly light a digital film

A light meter can prove to be an invaluable tool on any film set, allowing you to quickly and efficiently set lights and know the correct exposure values of those lights. Light meters were initially designed for still photographers and cinematographers can easily calibrate them to a given film stock speed for shooting film. But what about today’s digital cinematographer? I’m glad you asked. In this video tutorial you'll see how you can use a light meter to quickly and efficiently light a scen...

How To: Hack a remote Internet browser with XSS Shell

XSS Shell is a cross-site scripting backdoor into the victim's browser which enables an attacker to issue commands and receive responses. During a normal XSS attack an attacker only has one chance to control a victim's browser; however, the XSS Shell keeps the connection between the attacker and the victim open to allow the attacker to continuously manipulate the victim's browser. XSS Shell works by setting up an XSS Channel, an AJAX application embedded into the victim's browser, that can ob...

News: Magic Leap CEO's Tweetstorm Tries to Reframe Reactions to Latest Demo After Signs of Disappointment

Magic Leap CEO Rony Abovitz doesn't engage in tweetstorms often, but when he does, those tweets are bold, exceedingly confident, and there's usually a strong takeaway regarding what the company is or isn't doing. But on Thursday, Abovitz's latest tweetstorm sent an unusually flustered message: We promise, the magic we're telling you about it better than anything you've seen on video.

How To: Make a mini zine

This is a video tutorial for all of you people who don't know how to cut and fold zines, which are short magazines, especially a fanzine, or webzine. It's not brain science here. You basically just print, cut and fold. That's it.

How To: Build a Laser Trip Wire Alarm System

Building a DIY Alarm System: The Concept So, you want to protect your property, or maybe a room, car, or even your backyard. The concept of an alarm system is to notify the "alarm administrator" that there is an intruder entering the previously designated boundaries. The triggers for this boundary could be as simple as a pressure sensor, or as complicated as a laser network. They all do the same thing, but some work better than others.

How To: Merge PDF documents with Preview in Mac OS X 10.6

PDF is a Portable Document Format, which is a popular format to represent documents and pass it over the internet. You can merge different PDF documents to obtain a single document. You can do this on your Mac, using the preview option. Preview does a lot more than the name suggests. You can actually merge PDF's and also rearrange pages inside the documents. There are some changes in the functionality in preview feature between the leopard and snow leopard versions. To use this first you will...

How To: Obtain an international driving permit

This video is provided by "Betty Sell" from AAA travels. In this video she tells about the international travel and also about the important documents to be carried while carrying out an international travel, that is the international driving permit, commonly called as an IDP. It's very important to carry an IDP while traveling overseas because an IDP acts as an important recognizable form of photo identification which helps us to communicate with foreign authorities. To get more information ...

How To: Apply light sources to 3D models in Photoshop

Pixel Perfect is the "perfect" show to help you with your Photoshop skills. Be amazed and learn as master digital artist Bert Monroy takes a stylus and a digital pad and treats it as Monet and Picasso do with oil and canvas. Learn the tips and tricks you need to whip those digital pictures into shape with Adobe Photoshop and Illustrator. In this episode, Ben shows you how to apply light sources to 3D models in Photoshop.

How To: Use John the Ripper in Metasploit to Quickly Crack Windows Hashes

There are many password-cracking tools out there, but one of the mainstays has always been John the Ripper. It's a powerful piece of software that can be configured and used in many different ways. Metasploit actually contains a little-known module version of JTR that can be used to quickly crack weak passwords, so let's explore it in an attempt to save precious time and effort.

How To: Use LinEnum to Identify Potential Privilege Escalation Vectors

The art of privilege escalation is a skill that any competent hacker should possess. It's an entire field unto itself, and while it's good to know how to perform the techniques involved manually, it's often more efficient to have a script automate the process. LinEnum is one such script that can be incredibly useful for privilege escalation on Linux systems.

How To: Exploit Remote File Inclusion to Get a Shell

A simple security flaw can allow an attacker to gain a strong foothold with little effort on their part. When a web application permits remotely hosted files to be loaded without any validation, a whole can of worms is opened up, with consequences ranging from simple website defacement to full-on code execution. For this reason, RFI can be a promising path to obtaining a shell.

News: Scientists Discover How to Track Down HIV's Hiding Spots—A Potential Pathway to a Cure

Tremendous strides have been made in the treatment and outlook for patients infected with HIV, the human immunodeficiency virus. Treatment with a combination of antiretroviral drugs can keep patients with HIV alive for decades, without symptoms of the infection. The trouble is, if HIV-infected people stop taking their medications, the virus takes over in full force again—because the virus hides out quietly in cells of the immune system, kept in check, but not killed by the treatment.