Rare Special Search Results

Hack Like a Pro: Metasploit for the Aspiring Hacker, Part 11 (Post-Exploitation with Mimikatz)

Welcome back, my neophyte hackers! Metasploit is such a powerful tool that I can only scratch the surface of its capabilities here. As it has developed over the years, it is now possible to use Metasploit for nearly everything from recon to post exploitation to covering your tracks. Given its versatility, every aspiring hacker should have at least a tentative grasp of Metasploit.

Tutorial: Create Wordlists with Crunch

Greetings all. Before I get into the tutorial, I would like to mention that I am fairly new to Null Byte (been lurking for some time though), and what really appeals to me about this place is its tight, family-like community where everyone is always willing to help each other and the constant search for knowledge that inhabits this subdomain is a driving motivator for me to join in. I'm glad I arrived at the right time. Anyway, wipes tears (not really)...

How To: 5 Simple Ways to Perk Up Your Morning Joe

Ahh, coffee. That first sip of hot goodness in the morning is glorious, isn't it? There are days when you need it straight up: No extras, please. But what about those moments when you need a little something else? When that flavored French vanilla, hazelnut mocha, blah blah blend just doesn't cut it and you want a truly special flavor in your morning joe?

Hack Like a Pro: Finding Potential SUID/SGID Vulnerabilities on Linux & Unix Systems

Welcome back, my nascent hackers! We have spent a lot of time in previous tutorials focused on hacking the ubiquitous Windows systems, but the vast majority of "heavy iron" around the world are Linux or Unix systems. Linux and Unix dominate the world of Internet web servers with over 60% of the market. In addition, Linux and Unix servers are the operating system of choice for major international corporations (including almost all the major banks) throughout the world.

How To: Get VPN Connection

This how-to is for everybody who faced the problem of intercepting personal data sending through the Internet and is looking for fast and secure method to protect his activity in the global network.

News: Top 5 Must Try Traditional Food of UAE

United Arab Emirates is the cosmopolitan country that offers various attractions for tourists across the world. This country has buildup its image as one the fastest growing country of this region. Besides visiting worth seeing places, travelers can also enjoy tasty traditional food of UAE across the country. Whether you have chosen Dubai, Abu Dhabi, Ajman or Ras Al Khaimah, you will get the chance to enjoy best traditional food everywhere.

How To: Make a spiral rose easily

In this video Jennie shows us how to make a perfect spiral paper rose. All you need for this is a piece of 6X6 inches of paper, scissors, some glue and, if you really want to be creative, some ink. For starters you're going to need a 6X6 inch piece of card stock. Jennie chose a double-sided card stock because she thinks it will look more interesting but you can also use a plain piece of paper. The first step in creating your rose is making a spiral patterned cut alongside the paper. The ideal...

How To: Make kissing cards

Nothing says you care like a hand-made card. Show that special someone what they mean to you or just have fun with this cute arts and crafts project. Get your markers and colored pencils. Get your glitter and glue. Get creative.

How To: Make a breakable baseball bat movie prop

There are plenty of films out there with baseball bats, but if you want your bat to explode on impact, you'll have to make it yourself. A smashable baseball bat is perfect for any gangster flick or sports movie. Watch this video tutorial to learn how to make a breakable baseball bat movie prop.

How To: Practice skateboarding safety

Whether you’re headed for a half-pipe or your driveway, always be safe. Wearing protective gear and taking a few precautions can help prevent you from landing in the ER. Watch this video to learn how to practice skateboarding safety.

How To: Fry puri bread (Indian style bread)

Puris are such a treat to the eyes and to the taste buds. The sight of a well puffed up puri excites everyone (not just kids). Some great combinations are ‘Aloo-Puri’, Chole-Puri’ or ‘Halwa-Puri’. It is made on special occasions from religious functions to weddings to birthdays. Enjoy this awesome South Asian unleavend bread that will take your breath away! Watch this how-to video to learn how it is prepared.

How To: Apply makeup for a vampire face

Let our expert show you how to do super scary Vampire Halloween makeup! A vampire Halloween costume is easy, but getting the makeup right is key. Our expert will show you how to apply the various layers of vampire makeup, how to add gray shadows, how to add creepy bite marks on your neck and even how to add fake blood special effects to your lips and chin. This is great makeup for a fun Halloween party or even a Haunted House!

How To: Craft a duct tape rose

A bouquet of fresh roses is wonderful but real roses soon fade and die. Make a rose that will last forever, or at least a lot longer that a freshly cut one. Give your rose to someone special or use it as a decoration.

How To: Make a fruit tart for any occasion

Impress everyone by bringing a beautiful homemade tart to the next celebration. You can use seasonal berries or even other fruits to create a colorful and flavorful dessert that will make any occasion seem extra special. With its rich pastry cream and tangy fruit wrapped in a flaky, buttery shell, the fruit tart is a classic dessert. Make this version with one or more of your favorites berries.

How To: Make fried ice cream

You don't have to wait for the carnival to come around. You can make this special treat any time you like at home. It takes a little bit more time than at the fair but will be worth the look on party guests’ faces when they realize you've just made this counterintuitive dessert.

How To: Completely Prevent Apps from Accessing Your Camera & Microphone on Android

We're thinking more and more about our digital privacy these days. When we first started using smartphones, we'd download apps with reckless abandon, allowing permissions lists as long as novels in order to play free games. Now, we know that apps have access to things like our cameras and microphones, even when they shouldn't. Luckily, taking away these permissions is easy.

How To: Stop Your iPhone from Counting Steps & Tracking Fitness Activity

Every iPhone since the 5S has come equipped with a microchip called a motion coprocessor, which collects data from integrated accelerometers, gyroscopes and compasses, and can then transfer that information to fitness apps that track physical activity. Essentially, the chip knows whether you're running, walking, sleeping, or driving — but what if you don't want it to?