Soviet Attack Search Results

How To: Use Google's Advanced Protection Program to Secure Your Account from Phishing

It's easy to have your password stolen. Important people like executives, government workers, journalists, and activists face sophisticated phishing attacks to compromise their online accounts, often targeting Google account credentials. To reduce this risk, Google created the Advanced Protection Program, which uses U2F security keys to control account access and make stolen passwords worthless.

The Hacks of Mr. Robot: How to Use the Shodan API with Python to Automate Scans for Vulnerable Devices

Shodan calls itself "the search engine for internet-connected devices." With so many devices connected to the internet featuring varying levels of security, the special capabilities of this search engine mean it can provide a list of devices to test and attack. In this tutorial, we'll use Python to target specific software vulnerabilities and extract vulnerable target IP addresses from Shodan.

Hacking Pranks: How to Flip Photos, Change Images & Inject Messages into Friends' Browsers on Your Wi-Fi Network

Networking is built largely on trust. Most devices do not verify that another device is what it identifies itself to be, so long as it functions as expected. In the case of a man-in-the-middle attack, we can abuse this trust by impersonating a wireless access point, allowing us to intercept and modify network data. This can be dangerous for private data, but also be fun for pranking your friends.

How To: Hide DDE-Based Attacks in MS Word

In a previous article, we learned how to take advantage of a feature, Dynamic Data Exchange (DDE), to run malicious code when a Microsoft Word document is opened. The biggest challenge of this attack is that it requires getting the user to agree to a pop-up prompt. Fortunately, since I posted that article, many new obfuscation techniques have been discovered to make this easier. Today, we explore and combine some of them to make the ultimate hidden DDE attack.

Hack Like a Pro: Metasploit for the Aspiring Hacker, Part 12 (Web Delivery for Linux or Mac)

Welcome back, my budding hackers! Metasploit, one of my favorite hacking/pentesting tools, has so many capabilities that even after my many tutorials on it, I have only scratched the surface of it capabilities. For instance, it can be used with Nexpose for vulnerability scanning, with Nmap for port scanning, and with its numerous auxiliary modules, nearly unlimited other hacking related capabilities.

How To: Antisocial Engine

A.E Hi again this is my second post on nullbyte. The first one was on how to make a remote screenshot captor, now I will give you a presentation for a project of mine(I have named It Antisocial Engine) that It is not something extraordinary but will help many guys.

How To: Bake a hash brown pizza with ground beef

This is why you're fat. Coincidentally, this is also why you're happy when you nom on artery clogging junk fare. We don't recommend you whip up this recipe on a regular basis unless you're hopin' and wishin' for a heart attack this Christmas, but this would make a sweet treat every once in a while.

How To: Install brakes, shifters, and grips

In this video, we learn how to install brakes, shifters, and grips. You will need: Allen keys, grease, a knife, and a grip to do this. First, attack the brakes onto the handles, then the shifter and the bolts. Make sure to grease the bolts before you place them onto the handles. Do this on both sides of the bike. Make sure you have everything on the correct sides, then slide the grip in. Customize the grip so it's the right length and cut it with the knife to do this. Once finished, connect a...

How To: Decorate and create paintings for your base in Minecraft

In Minecraft, the key to survival is building proper shelter for yourself to survive the nightly attacks by the creatures that roam the land. But whose to say that you can't spruce the place up a little bit? Notch has included a feature in the game that allows you create paintings using a few sticks and a piece of wool. In this video you will learn how to craft the paintings and also how to put them up and some of the random paintings that you can get.

How To: Make a floating flower, Swarovski crystal toe ring

Kameron Kay teaches us how to make a floating flower crystal toe ring in this tutorial. You will need: stretch cord, large crimp bead, flat nosed pliers, flat backed crystal flower, glue, and small scissors to make this. First, cut out your chord to the exact size that you need. After this, use glue to attack the ring into the middle of the string. Place a crimp bead on the bottom to help the bead stay in place, then glue these together as well. Next, tie this together and attach an end to th...

How To: Work a spinner bait

In this tutorial, we learn how to work a spinner bait. This has a head as the weight, then the hook underneath the head and skirt. On the other side of the safety pin, there is who flat blades for murky waters. These help with sun reflection. This is a very versatile type of bait that helps you fish in murky waters. Bass will attack it as soon as they see it, helping you catch more fish. There is a lot of equipment on this, so it takes the bass a little while to get a hold of it. To ensure yo...

How To: Find all the pieces to Abyssal Armor in Darksiders

if you're looking for a little bit more of a challenge in the game Darksiders, then check out this tutorial. In the video, you'll be finding out how to find all ten pieces to the Abyssal Armor. This armor is much different than War's original armor and is much stronger and gives life on all attacks. It doesn't need to be collected to win the game, but it helps make your character stronger.

How To: Get the Fly Swatter achievement in Assassin's Creed I

This achievement is sure to make you "fly like an eagle." In the game Assassin's Creed II, you're introduced to a bunch of new weapons and skills that you can use to take down your victims. One of the coolest new additions is that of a flying machine or glider. This can be used to travel from once place to another and can even be used to attack nearby archers. Doing that can actually result in the achievement, Fly Swatter. So check out this tutorial on how they did it and how you can do it. E...

How To: Break down a drum beat and master tempo dynamics

In this brief video tutorial, the host 'Uncle Todd' demonstrates how to 'attack a beat'. This video is intended for beginners. Watch as he shows you how to keep your tempo up as you time your drum strokes in a beat. You should practice my trying just your right foot and your right hand, and then alternating to to your left foot and your left hand. The host in this video uses an electric metronome to keep his tempo steady and accurate, something that he recommends you try at home. Don't forget...

How To: Find your open ports in order to close them

In this how to video, you will learn how to keep your Windows operating system secure by look for and closing open ports. First, you will need to run the program called Net State. Once this is open, type in netstat -a. This will list main connections. Next, type in netstat -an. This will give you the numbers of ports that are open. Some may be used for file sharing and anti-virus programs. If you want it completely secured, you should only have one running. This video shows you how easy it is...

How To: Prevent yellow jackets from nesting in your home walls

Rick Steinau with Ask the Exterminator demonstrates how to prevent yellow jackets from nesting in your home's walls. In mid to late summer yellow jacket populations increase. Yellow jackets can find spaces in the veneer or in cracks in bricks or siding. You can hear scratching noises in your walls as the wasps move. Observe wasp activity late in the day when they return to their nest for the night. Treat reachable holes with pesticide dust and a bellows. Leave the hole open to let the wasps f...

How To: Moonwalk

The moonwalk has been written in history and will go down as one of the most well-known dance crazes next to the Macarena and the jitterbug. In order to moonwalk like Michael Jackson, it's important to focus on the pivot and push of the feet and legs while sliding. Make your moonwalk smooth with the tips and tricks given in this free dance lesson.

How To: Cook lamb shoulder chops with apples & prunes

This video shows tips on how to use insects to benefit your garden. This will teach you ways to reduce the insect load in gardens without the use of chemicals. Rose aphids can be controlled with lady beetles, for example. Although these techniques have been used for agricultural use, they will work in your home garden. Asian Lady Beetle, tend to stay put. They won’t migrate. They will attack Pecan Aphids. Trichograma, a wasp that is effective against larvae and eggs.

How To: Perform a cross-court shot in raquetball

This video demonstrates the cross court backhand shot in a Racquetball match. It demonstrates the proper form and timing in an actual racquetball match. It provides helpful tips: for example, the cross court backhand shot should be employed strategically. The best time to consider using the cross court backhand shot is when you see your opponent leaning on the down line: i.e. use the cross court backhand, if it appears that your opponent has already committed to a line of attack. If it appear...