Successful Backend Search Results

Raspberry Pi: Physical Backdoor Part 1

This tutorial is one technique to use the full functionality of your Pi. The small size makes it ideal for inside hacks, but still has the capabilities of a average desktop or computer. I should mention that a tutorial that OTW has done, but I'm gonna take it a step further. OTW made a brilliant article, but only touched on the surface of the possibilities. I hope this article will both show you many the possibilities and also allow you to start causing havoc, but I'm planning on making this ...

Hack Like a Pro: How to Cover Your Tracks So You Aren't Detected

Welcome back, my greenhorn hackers! Congratulations on your successful hack that saved the world from nuclear annihilation from our little, bellicose, Twinkie-eating dictator. The rest of world may not know what you did, but I do. Good job! Now that we hacked into the malevolent dictator's computer and temporarily disabled his nuclear launch capability, we have to think about covering our tracks so that he and his minions can't track our good works back to us.

How To: Hack a PSP 3000 or 2000 with ChickHEN R2 5.03

The PSP has never had the software support that it needed to be a really commercially successful system. Since Sony blew it already, you may as well go the extra mile to make this expensive little thing you bought more useful right? This video will teach you how to hack a PSP 3000 or 2000 with firmware version 5.03. This is a complete hack, meaning that you will be able to play .iso games and everything when you are done. Get to it! This should let you unbrick your psp 3000.

How To: Play co-op story mode in SCC (St. Petersburg, Banya)

The new Splinter Cell video game has a co-op mode now, which means you don't need to play online anymore just to play against a human. You can have your best friend sitting right next to you… playing on the same Xbox 360. Forget the absurdity of playing in separate rooms, play in the same room. Splinter Cell: Conviction for the Xbox 360 is the way to go.

How To: Build a successful fire in the snow

In this outdoors how-to video from fitclimb.com we're shown how to make a fire in the snow. The first step is to find a good flat spot, or make a flat spot yourself. Next, we look for trees with dead branches and break those dead branches off for the wood. The key here is to be organized because you'll have to carry this wood back to your camp. Next, you want to make a platform for your fire to keep it from sinking down as the snow melts. Here, we're using the bark from a dead stump for a pla...

Walkthrough Assassin's Creed: Bloodlines: Mission 5

Find Osman in the Cathedral Square to deliver Alexander's message to him in Mission 5 on the Sony PSP. Make your way to the Cathedral area, at which point the red delivery icon pops up and denotes Osman's rendezvous point. The only problem is that the area is swarming with guards and that Altair must make successful contact without being detected. Climb up the first buildings in front of you and hop across toward the icon. Silently dispatch the archer on the roof and then head around to the o...

How To: Advanced Techniques to Bypass & Defeat XSS Filters, Part 2

Cross-site scripting can be one of the easiest vulnerabilities to discover, but to be successful with this type of attack, it is essential to learn how to get past filters. In the previous guide, we explored some ways to do this, such as abusing attributes and event handlers and tricking the application into accepting unusual characters. Now, let's take a look at more techniques used to defeat filters.

SQL Injection 101: How to Avoid Detection & Bypass Defenses

It is often said that the best hackers remain unknown, and the greatest attacks are left undiscovered, but it's hard for an up-and-coming penetration tester or white hat to learn anything unless one of those factors is actually known or discovered. But the end goal here in our SQL injection lessons is to make that statement as true as possible for us when performing our hacks.

Hack Like a Pro: How to Crack Online Web Form Passwords with THC-Hydra & Burp Suite

Welcome back, my hacker novitiates! In an earlier tutorial, I had introduced you to two essential tools for cracking online passwords—Tamper Data and THC-Hydra. In that guide, I promised to follow up with another tutorial on how to use THC-Hydra against web forms, so here we go. Although you can use Tamper Data for this purpose, I want to introduce you to another tool that is built into Kali, Burp Suite.

News: How Zero-Day Exploits Are Bought & Sold

Most of you already know that a zero-day exploit is an exploit that has not yet been revealed to the software vendor or the public. As a result, the vulnerability that enables the exploit hasn't been patched. This means that someone with a zero-day exploit can hack into any system that has that particular configuration or software, giving them free reign to steal information, identities, credit card info, and spy on victims.