Physique Obtains Search Results

How to Use PowerShell Empire: Getting Started with Post-Exploitation of Windows Hosts

PowerShell Empire is a post-exploitation framework for computers and servers running Microsoft Windows, Windows Server operating systems, or both. In these tutorials, we will be exploring everything from how to install Powershell Empire to how to snoop around a target's computer without the antivirus software knowing about it. If we are lucky, we might even be able to obtain domain administrator credentials and own the whole network.

How To: Get Root Access on OS X Mavericks and Yosemite

Hello all! In this tutorial, I'd like to show you one way of getting root on OS X. Check out this GitHub page for a recent privilege escalation exploit that was recently discovered. I've tested it and it works on both OS X 10.9 Mavericks and OS X 10.10 Yosemite, but appears to have been patched with OS X 10.11 El Capitan. If you check out the file main.m you can see where most of the magic is happening. This source code can very easily be changed to make it do more than just the system("/bin/...

How To: Make Spoofed Calls Using Any Phone Number You Want Right from Your Smartphone

Spoofed phone calls originate from one source that's disguising its phone number as a different one, and you probably get these calls all the time. Maybe they're numbers from your local area code or for prominent businesses, but the callers are just hijacking those digits to fool you into picking up. Turns out, making a spoofed call is something anybody can do — even you.

How To: Use Banner Grabbing to Aid in Reconnaissance & See What Services Are Running on the System

As we've seen with other tools and utilities, administrators typically use certain things to do their job more efficiently, and those things are often abused by attackers for exploitation. After all, hacking is just the process of getting a computer to do things in unexpected ways. Today, we will be covering various methods to perform banner grabbing to learn more about the target system.

How To: Use Linux Smart Enumeration to Discover Paths to Privesc

Privilege escalation is the technique used to exploit certain flaws to obtain elevated permissions relative to the current user. There are a vast number of methods out there to go from user to root on Linux, and keeping track of them all can be difficult. This is where automation comes into play, and a privilege escalation script called Linux Smart Enumeration is one to take advantage of.

How To: Crack SSH Private Key Passwords with John the Ripper

Secure Shell is one of the most common network protocols, typically used to manage remote machines through an encrypted connection. However, SSH is prone to password brute-forcing. Key-based authentication is much more secure, and private keys can even be encrypted for additional security. But even that isn't bulletproof since SSH private key passwords can be cracked using John the Ripper.

How To: Conduct a Pentest Like a Pro in 6 Phases

Penetration testing, or pentesting, is the process of probing a network or system by simulating an attack, which is used to find vulnerabilities that could be exploited by a malicious actor. The main goal of a pentest is to identify security holes and weaknesses so that the organization being tested can fix any potential issues. In a professional penetration test, there are six phases you should know.

How To: Upgrade a Dumb Shell to a Fully Interactive Shell for More Flexibility

One of the most exciting things as an ethical hacker, in my opinion, is catching a reverse shell. But often, these shells are limited, lacking the full power and functionality of a proper terminal. Certain things don't work in these environments, and they can be troublesome to work with. Luckily, with a few commands, we can upgrade to a fully interactive shell with all the bells and whistles.

When Uber & Lyft Go Driverless: Why Transportation as a Service Means You Might Never Own a Car Again

The private automobile has been an intrinsic part of our lives for around a hundred years. But over the last decade, car sharing has gained a very small but growing part of the mobility market. The more recent rise of companies like Uber and Lyft is witness to a more dramatic shift in mobility and car ownership. Private vehicle ownership to a transportation-as-a-service model has already started, and high capability SAE Level 4 vehicles will complete this trend.

How To: Here's How You Can Make a Real Difference in the Aftermath of the Michael Brown & Eric Garner Grand Jury Decisions

In the aftermath of the unindicted police killings of Michael Brown and Eric Garner, we've been told that the system worked as intended. When our legal system's outcome is at conflict with what a majority of Americans believe is just, it's clear that some changes are needed. But what specifically needs to change? And what can an average citizen with a moral and just cause do to prevent these kinds of tragedies from repeating themselves again and again?

How To: Measure and track your body fat percentage

Body fat is important to understand when you are dieting. It is good to track your body fat, so that you are not as reliant on the scale. The numbers on your scale are not always accurate. Muscle weighs more than fat and if you are exercising more than usual your physique will get better but your weight may rise. Knowing the difference between fat and muscle will keep you from getting discouraged and hindering your workout. This tutorial will show you how to measure fat for success. Measure a...

How To: Obtain blood cultures from cubital and cephalic veins

One of the key tasks of a nurse is being able to take blood samples, and the only way to get good at the procedure is by practice. Knowing the steps to drawing blood (to go to the lab) is key to both yours and your patient's safety. This interactive video module will help familiarize you with the phlebotomy medical procedure, but is not meant to be your sole method of instruction— always ask for supervision in performing a procedure if you've never done one before, or have little experience.

How To: Obtain information abut the Humboldt squid (red devil)

Six feet long and always hungry, the Humboldt squid, aka the "red devil", is one of the most dangerous yet intelligent predators of the deep. This incredible squid has 3 hearts, keen eye sight, a giant brain, 2 lightning fast tentacles, 8 grasping arms and razor sharp teeth. The red devil squid come out at dusk. They come up from 2300 feet to 200 feet. Obtain information abut the Humboldt squid (red devil).

How To: Make baby bibs

Crafter Dawn Huntington shows how to make felted baby bibs. Materials needed are 8 1/2-by-14-inch sheet of freezer paper, felt, ink-jet printer, small binder clips, snaps and a templet which can be obtained from the article part of this video. Make baby bibs.

News: A 3-in-1 Model

These drawings were made with Google SketchUp. There is a dodecahedral model, icosahedral model, and a third I don't know the name of, made of rhombic faces obtained by connecting vertices of the other two. The final image is all three models together. I'll use a ShopBot CNC router to cut out the pieces this week.

How To: Create a cross-processed LOMO effect in After Effects

Give a vintage look to your footage similar to that obtained from LOMO Cameras. Originally LOMO cameras are still cameras that are used for causal cheap photography. But the photographs obtained from such cameras have a unique look to it. In this tutorial you will learn to digitally manipulate cross-processed LOMO effect and add it to your video footage.

How To: Build your own aquifer

Many communities obtain their drinking water from underground sources called aquifers. If a surface water source, such as a river, is not available, water companies will drill wells into the soil and rock to a water source below. Some homes have their own private wells and must tap into the same ground water sources. In this video tutorial, you'll what aquifers are, how they work, why they are important and, of course, how to build your own model! Build your own aquifer.

How To: Get FeedingBottle Back in Kali 2.0

Back in Backtrack5 there was a nice GUI addon for the aircrack suite called feedingbottle. I liked it because it simplified easy tasks like fake auth with a click of a button. I was hunting for sources and it seems that all I could find was an ubuntu deb package from 2013. It was a little tricky installing it on a 64-bit system so I thought I would write a quick how to. Feedingbottle is an x86 package so you must install the corresponding libraries. If they are missing you will get a "bash:.....