Reading Search Results

How To: Take Pictures Through a Victim's Webcam with BeEF

Recently, I've been experimenting with BeEF (Browser Exploitation Framework), and to say the least, I'm hooked. When using BeEF, you must "hook" the victims browser. This means that you must run the script provided by BeEF, which is titled "hook.js", in the victims browser. Once you've done that, you can run commands against the victims browser and cause all kinds of mayhem. Among these commands, there is an option to use the victims webcam. This is what we'll be doing here today, so, let's g...

How To: Bypass File Upload Restrictions Using Burp Suite

When attempting to gain access to a server, there may come a point when you need to get around file upload restrictions to upload something. If we can find a way to get around the restrictions, then we can upload anything we want to the server, effectively compromising it. That is what we'll be doing here today, so let's get started!

News: Here's Everything You Should Know About Samsung Pay

Mobile payment systems have been around for almost 5 years now, starting with Google Wallet. But when Apple got into the game last year with their new Apple Pay service, things really started to take off. Around this time, Samsung responded by acquiring an up-and-coming mobile payments company that owned the rights to an incredibly innovative technology called Magnetic Secure Transmission (MST).

How To: OpenSSL Unique Encryption/Decryption Scripts

In this tutorial I will be explaining the purpose of unique encryption/decryption scripts ( I will be referring to these at "UEDS" for this tutorial). Then, I will show you how to make one. Finally I will talk about the downsides to the method I use. I will also provide links explaining the concepts and algorithms used in encryption to anyone who wants to see what is going on under the hood.

How To: Crack WPA/WPA2 with Wifite

Hi there again, aspiring hackers (and veterans as well)! I'm going to explain how to perform a dictionary attack on a WPA/WPA2 protected network with Wifite. Please note that this doesn't work with WPA Enterprise For that end, you'd have to use an Evil Twin to get the "Enterprise" auth attempt, and then crack it.

How To: Linux Basics Tips

Hi nullbytes! I've been recently reading the whole Linux Basics for the Aspiring Hacker series and felt like it was missing some stuff I know, so I felt like sharing it with anyone who might find it useful too.

Real Brain Food: What Geniuses Actually Eat, Part 1

It's common knowledge that certain foods foster brain development, health, and memory. Fish almost always makes the list, as do any foods that are loaded with antioxidants like blueberries, nuts, whole grains, green tea, and dark chocolate. Spices like turmeric are being studied for their ability to prevent Alzheimer's, among other things.

Hack Like a Pro: How to Use Netcat, the Swiss Army Knife of Hacking Tools

For over 20 years, a tiny but mighty tool has been used by hackers for a wide range of activities. Although well known in hacking circles, Netcat is virtually unknown outside. It's so simple, powerful, and useful that many people within the IT community refer to it as the "Swiss Army knife of hacking tools." We'll look at the capabilities of Netcat and how the aspiring hacker can use it.

How To: Essential Minecraft PVP Tips

In Minecraft, a large aspect of the game is PVP (Player vs. Player Combat). A hardcore Minecraft fan will remember that back in Beta 1.8, combat was switched up, and it really changed the game around. Here are some tips on what a two-year Minecraft player has to say.

How To: Mute Notifications for Everything but Your Favorite Contacts in iOS 15

Your iPhone is full of apps that are all vying for your attention. Notifications from Facebook, Instagram, and even Apple Messages can get out of hand fast. With iOS 15, Apple gives you the tools to choose exactly who can contact you and when. Keep reading to see how to take control of your iPhone's notifications so that you only receive the most important alerts.

How To: Turn Your iPhone into a Digital Level to Make Objects & Surfaces Straight, Plumb, or Angled

Let's say you're hanging a picture frame, and it doesn't look quite right. Sure, you could grab a spirit or bubble level, but maybe it's in another room or buried in a toolbox somewhere. Maybe you're away from home, away from your tools. As it turns out, you almost always have a level with you, and it's likely sitting in your pocket right now or resting in your hand as you read this article.

How To: If You Want to Shoot 4K Video on Your iPhone, Don't Make This Mistake

The iPhone 12, 12 mini, 12 Pro, and 12 Pro Max are capable of shooting 4K video using HDR with Dolby Vision, producing content unthinkable in an Apple smartphone just years ago. That said, it's quite easy to miss the full potential of your iPhone's camera, iPhone 12 or not. If you want the best quality video possible on the iPhone XS and newer models, make sure you don't make this one mistake.