Scraping Search Results

Hack Like a Pro: How to Crack Passwords, Part 5 (Creating a Custom Wordlist with CeWL)

Welcome back, my novice hackers! In my series on cracking passwords, I began by showing off some basic password-cracking principles; developed an efficient password-cracking strategy; demonstrated how to use Hashcat, one of the most powerful password-cracking programs; and showed how to create a custom wordlist using Crunch. In this tutorial, I will show you how to create a custom wordlist based upon the industry or business of the targets using CeWL.

How To: Use UFONet

With the release of the Mirai source code, botnets are back in a big way. In the early days of botnets, zombies (infected hosts) would report to IRC (Internet Relay Chat) channels for CNC (command and control) instructions. Modern botnets have evolved, but they continue to use the same concepts as their predecessors.

How To: A Cold Stone Is Not Needed for This DIY Coldstone Ice Cream

Watching an ice cream pro build you a custom frozen treat mixed with your favorite fruit, candy, and/or toppings makes buying a cone even more exciting. But why go out for ice cream when you can create your favorite combinations in your own kitchen? While you might not have an expensive frozen slab for ice cream topping your kitchen counters, you can mimic the creamy consistency and customizable options from Cold Stone Creamery and Marble Slab any time you're craving it. Best of all, you don'...

How To: Find Passwords in Exposed Log Files with Google Dorks

You may not have thought of dorks as powerful, but with the right dorks, you can hack devices just by Googling the password to log in. Because Google is fantastic at indexing everything connected to the internet, it's possible to find files that are exposed accidentally and contain critical information for anyone to see.

Hack Like a Pro: How to Crack Passwords, Part 2 (Cracking Strategy)

Welcome back, my hacker apprentices! Last week, I started off my password cracking series with an introduction on the principles and technologies involved in the art of cracking passwords. In past guides, I showed some specific tools and techniques for cracking Windows, online, Wi-Fi, Linux, and even SNMP passwords. This series is intended to help you hone your skills in each of these areas and expand into some, as yet, untouched areas.

How To: The 15 Most Popular Talks from DEFCON's Hacking Conferences

Every summer for the last 26 years, hoards of hackers have descended on the Las Vegas Strip for DEFCON, the biggest hacker conference in the US. There's a wealth of talks every season (DEFCON 27 has at least 95 scheduled), and there have been some essential topics to learn from in past discussions. We've dug through the last ten years and found the 15 most popular talks you should watch.

How To: Create a 'My Year in Music' Cover Art Collage from Your iPhone's Music Library to Share on Social Media

Apple Music's Replay feature sucks. Aside from not being very accessible, it offers a fraction of your history compared to Spotify Wrapped, which does a deep dive into what you listened to over the last year. Not only that but Spotify packages data into visuals you can share on social media. While you could share Replay screenshots, there are better options out there for Apple Music users.

How To: The Null Byte Guide to 3D Printing for Hackers

3D printers allow hackers and makers alike to create something from nothing. They're an incredible technology that lets you build protective cases and covers for gear such as a wardriving phone and Raspberry Pi-Hole. 3D printers can even help you out in a bind when something breaks, and it's impossible to get the part, since you can just print one out yourself.

How To: Code a Dead Man's Switch in Python 3 to Encrypt & Delete Files Whenever You Don't Check In

A dead man's switch is a fairly simple concept. If you don't perform a specific task before a set amount of time, it'll perform a specific action you set. They can be handy not just for hackers but for everyone who wants to protect themselves, someone else, or something tangible or intangible from harm. While there are more nefarious uses for a dead man's switch, white hats can put one to good use.

How To: Steam remove paint

John Leeke demonstrates using steam to remove heavy paint build up from wood surfaces in this five minute video. Steam paint removal softens the paint film so it can be more easily scraped away. It works well with the heavy paint buildup commonly found on the exterior of older buildings during house restoration and historic preservation projects.

How To: Make plaster molds

When making a plaster mold you must first decide on the shape and size of your mold. Then you need to order your plaster and supplies. Select something to make a mold from, a container to house the plaster lined with a layer of clay to make for an easy removal of the plaster, a weighing scale, plaster, spatula, a mixing tup and jug of water. Weigh out the amount specified by your suplier onto the scale, then add it to water a little at a time. Stir the plaster into the water, scraping the bot...

How To: Paint roof eaves

In this DIY project on video, learn how to paint the roof eaves and fascia of your home. Our expert will show you everything you need to know to get the job done. Get tips on preparing the eaves with a pressure washer, scraping off old paint, caulking, spackle, priming, and more. Learn the proper paint mixing techniques to get an even, professional result. Watch these videos carefully, and turn a potentially disastrous endeavor, both for you and your home, into a simple painting project. When...

How To: Paint an exterior wall

In this DIY project on video, learn how to paint the exterior of your home. Our expert will show you everything you need to know to get the job done. Get tips on preparing the wall with a pressure washer, scraping off old paint, caulking, spackle, priming, and more. Learn the proper paint rolling techniques to get an even, professional result. Watch these videos carefully, and turn a potentially disastrous endeavor, both for you and your home, into a simple painting project. When you’re done,...

How To: Make a classic chicken piccata

What sounds better than chicken with lemon, parsley and butter? Nothing! And it's called chicken piccata. Danielle Ahern shares this classic recipe, which includes the use of only one sauté pan. Can't beat that. Boneless chicken breasts are pounded thin which results in a quick cooking process. A butter, lemon juice and caper sauce is reduced to a smooth texture and poured gently over the plated dish. Garnish with fresh lemon and parsley and you're done. Great idea for a weeknight when you're...

How To: Carve Fractals and Stars on Pumpkins

Fractals and stars are two of the most beautiful and complicated-looking classes of geometric objects out there. We're going to explore these objects and how to carve them on a pumpkin. Unlike the last one on carving polyhedral pumpkins, where we used the entire pumpkin to carve a 3 dimensional shape, the pumkin carving in this post will involve two-dimensional images on a small part of the pumpkin's surface.

Next Page