Repeat Applications Search Results

How To: Use the Hacker Defender rootkit or HackDef

Hacker Defender is one of the most widely deployed rootkits in the world. It is a user-mode rootkit that modifies several Windows and Native API functions, which allows it to hide information (files, processes, etc.) from other applications. In addition, Hacker Defender implements a backdoor and port redirector that operates through TCP ports opened by existing services. This means it is not possible to find the hidden backdoor through traditional means, like launching a remote port scan agai...

How To: Create PDFs in Mac OS X

A PDF file is a great way to share your documents with anyone. Both Macs and PCs can read them and it's very easy to create them in Mac OS X. From any application that you can print from, go to File–Print–which will open up the print dialogue box–and find the PDF button in the lower left corner. To learn more, and for a complete walkthrough of printing to PDF in Mac OS X (as well as information on using the handy Web Receipts) feature, watch this video tutorial.

How To: Apply an Ashanti inspired MAC makeup look

Pop/R&B singer Ashanti is the basis of this pretty silver and grey eye look. This how-to video demonstrates how to replicate this look that will really define your eyes. The cosmetic products used to create this look are Studio Fix Fluid Foundation, Makeup Forever HD Powder, Mineralize Skinfinish Duo in “Medium Dark,” Mineralize Blush in “Pleasantry,” Cream Color Base in “Pearl,” Painterly Paintpot, Platinum Pigment, Concrete e/s, Kid e/s, Brule e/s, White Frost e/s, Blacktrack Fluidline, Lor...

How To: Apply a Slave 4 U Britney Spears video makeup look

Just a few years ago, Britney Spears was considered hot. Regardless of what you think of her now, this how-to video recaptures her glory days via makeup. The cosmetic products used to create this look are MAC Studio Fix Fluid mixed with Covergirl Trublend, Bare Escentuals Foundation, NARS Laguna Bronzer, MAC Warm Soul Blush, MAC Cream Color Base in “Pearl,” MAC Blackground Paintpot, 88 Shimmer Palette from Coastal Scents, MAC Black Tied e/s, MAC Blacktrack Fluidline, Urban Decay 24/7 Eyeliner...

How To: Abuse Session Management with OWASP ZAP

It's always a good idea to know how an attack works at the very basic level. Manual techniques for exploitation often find holes that even the most sophisticated tool cannot. Sometimes, though, using one of these tools can make things so much easier, especially if one has a solid foundation of how it works. One such tool can help us perform a cross-site request forgery with minimal difficulty.

How To: Manipulate User Credentials with a CSRF Attack

Web 2.0 technology has provided a convenient way to post videos online, keep up with old friends on social media, and even bank from the comfort of your web browser. But when applications are poorly designed or incorrectly configured, certain flaws can be exploited. One such flaw, known as CSRF, allows an attacker to use a legitimate user's session to execute unauthorized requests to the server.

How To: Beginner's Guide to OWASP Juice Shop, Your Practice Hacking Grounds for the 10 Most Common Web App Vulnerabilities

Web application vulnerabilities are one of the most crucial points of consideration in any penetration test or security evaluation. While some security areas require a home network or computer for testing, creating a test website to learn web app security requires a slightly different approach. For a safe environment to learn about web app hacking, the OWASP Juice Shop can help.

News: Here Is What We Know About the Magic Leap Lumin OS & Lumin Runtime

A core concept that has resonated through societies of the world over the course the last few hundred years is "knowledge is power." And understanding that concept gives us the drive to push further forward and learn as much as we can on a subject. At the moment, that subject for us at Next Reality is the recently released information about Magic Leap's upcoming Magic Leap One: Creator Edition.

How To: Set Up the Meta 2 Head-Mounted Display

So after being teased last Christmas with an email promising that the Meta 2 was shipping, nearly a year later, we finally have one of the units that we ordered. Without a moment's hesitation, I tore the package open, set the device up, and started working with it.

How To: Extract Windows Usernames, Passwords, Wi-Fi Keys & Other User Credentials with LaZagne

After exploiting a vulnerable target, scooping up a victim's credentials is a high priority for hackers, since most people reuse passwords. Those credentials can get hackers deeper into a network or other accounts, but digging through the system by hand to find them is difficult. A missed stored password could mean missing a big opportunity. But the process can largely be automated with LaZagne.