Restricting Privileged Search Results

How To: Get Root Access on OS X Mavericks and Yosemite

Hello all! In this tutorial, I'd like to show you one way of getting root on OS X. Check out this GitHub page for a recent privilege escalation exploit that was recently discovered. I've tested it and it works on both OS X 10.9 Mavericks and OS X 10.10 Yosemite, but appears to have been patched with OS X 10.11 El Capitan. If you check out the file main.m you can see where most of the magic is happening. This source code can very easily be changed to make it do more than just the system("/bin/...

How To: Prevent edits or changes in documents in MS Word 2007

In this tutorial, we learn how to prevent edits or changed in documents in MS Word 2007. Start by going to the review tab, then click on protect documents. Then, click restrict formatting and adjust the different settings. Click on the check marks to choose what types of settings you want to restrict from being changed. This can make it impossible for anyone else to edit the pages except for the original author. You can also make an enforcing protection password so only the document creator c...

How To: Restrict internet time usage with Net Nanny

In this tutorial, Andy from TopTenReviews shows us how to restrict internet time usage with Net Nanny. First, open Net Nanny's dashboard and find where it says "time controls". You will see "internet usage", make sure you click on this. Now, a new window will pop up where you can choose time allowance, schedule times and blocks to your specific preferences. Once you pick these, click "ok" and your restrictions will be set and saved! This is a great way to control when your children and others...

How To: Get a commercial driver FAST card for US & Canada

FAST is an expedited travel program for commercial truck drivers that travel between the US and Canada. FAST cards are available to citizens or permanent residents of Canada or the US. The FAST program is viewed as a privilege by both Canada and the US. You can be denied for the FAST program if you do not have a clean driving record and a clean record with the Canadian Border Services and The US Customs and Border Protection. Things such as being caught with undeclared items and having a crim...

How To: Perform a Pass-the-Hash Attack & Get System Access on Windows

Passwords on Windows are stored as hashes, and sometimes they can be tough to crack. In certain situations, though, we can get around that by using the hash as is, with no need to know the plaintext password. It's especially interesting if we can manage to get the hash of an administrative user since we can then authenticate with higher privileges by performing an attack known as pass the hash.

How To: Use a Misconfigured SUID Bit to Escalate Privileges & Get Root

Gaining access to a system is always exciting, but where do you go from there? Root or bust. Sure, a compromised host is a great way to run a botnet, or do some other boring, nefarious thing—but as hackers, we want root. We also want to take the easiest path possible, search out low-hanging fruit, and exploit them. SUID programs are the lowest of the low-hanging fruit.

How To: Create a login form using MS Access 2007

If you want to password restrict some of your data, or just want to know who is doing what in Microsoft Access 2007, you will want to set up a login form for MS Access 2007. This is an easy procedure, and you can create one yourself with just a basic understanding of the structure for MS Access. Watch this video, and Uncle Gizmo will show you how to do a login form and several other forms for MS Access.

How To: Remove DRM on your Kindle

You've got a Kindle, and you've bought your first ebooks! Did you know that you don't have complete control over those books you bought? Amazon restricts your use of ebooks with DRM, or Digital Rights Management, that prevents you from transferring your purchases to other devices, or copying them. Watch this video to learn how to strip your Kindle ebooks of the DRM, and really own your content!

How To: Use the iTunes music store with your kids

Kids can have fun using the iTunes music store while parents still control the credit card and content their children can access. Parents can restrict access to certain content, set up a shopping cart to review music choices before they're purchased, and give kids a monthly allowance.

How To: Create a 360 view using Flash CS3

360 degree panoramic viewers are a staple of all kinds of websites from real estate to auto sales. This video will teach you how to create a a 360 degree view that will display on your website using Flash CS3 and Actionscript 3. Don't restrict your users to just one photo, let them see all of whatever you're showing them with the tools your learn in this video.

How To: Make a custom Myspace 2.0 layout

One of the great things about Myspace, is the ability to customize the layout on your homepage. It gives you the ability to be as creative as you want and show as much personality without being restricted. So in this tutorial, you'll learn how to make a custom Myspace 2.0 layout using easy to use computer programs. Good luck and enjoy!

How To: Share your calendar 3 ways with Outlook 2007

This tutorial shows you how to share your calendar three ways in Microsoft Office Outlook 2007. If your company uses Microsoft Exchange Server, you can share your calendar within the organization by using that feature. You can also send a snapshot of your calendar in e-mail to people outside your company. And you can publish your calendar on the Microsoft Office Online Web site and restrict how much detail is shown and who can access it.

How To: Lock the Dialer to Prevent Snooping When Letting Others Borrow Your Android

Lending someone your phone to make a call is always an awkward situation, as you closely monitor them to make sure they stick to a phone call rather than wandering off into private applications like your photo or messaging apps. You don't necessarily want to eavesdrop on their conversation, but trusting people with your phone is difficult, especially if you have some risqué or embarrassing pictures stored on it.

How To: Find & Exploit SUID Binaries with SUID3NUM

File permissions can get tricky on Linux and can be a valuable avenue of attack during privilege escalation if things aren't configured correctly. SUID binaries can often be an easy path to root, but sifting through all of the defaults can be a massive waste of time. Luckily, there's a simple script that can sort things out for us.

How To: Beat LFI Restrictions with Advanced Techniques

One of the most common web application vulnerabilities is LFI, which allows unauthorized access to sensitive files on the server. Such a common weakness is often safeguarded against, and low-hanging fruit can be defended quite easily. But there are always creative ways to get around these defenses, and we'll be looking at two methods to beat the system and successfully pull off LFI.

How To: Use the Koadic Command & Control Remote Access Toolkit for Windows Post-Exploitation

Koadic allows hackers to monitor and control exploited Windows systems remotely. The tool facilitates remote access to Windows devices via the Windows Script Host, working with practically every version of Windows. Koadic is capable of sitting entirely in memory to evade detection and is able to cryptographically secure its own web command-and-control communications.

How To: Practice nude beach etiquette

Is the proper term nudists or naturalists? Doesn't seem to be too much of a difference, because when it all boils down, they're both still butt-naked on the beach. Nude beaches are fascinating places for the adventurous spirit, but unless you’re an old-time nudist, you probably have questions about the proper way to behave on a nude beach. Well, we’ve got the answers.

How To: Simulate a RAT on Your Network with ShinoBOT

A remote administration tool, or RAT, is a piece of software used for remotely controlling machines. They are commonly used by tech support to gain remote access for troubleshooting purposes, but RATs are also an important part of a hacker's advanced persistent threat (APT) toolkit. Unlike standard administration RATs, these tools are designed to be delivered stealthily and operate undetected.