Target Individual Search Results

How To: Find Identifying Information from a Phone Number Using OSINT Tools

Phone numbers often contain clues to the owner's identity and can bring up a lot of data during an OSINT investigation. Starting with a phone number, we can search through a large number of online databases with only a few clicks to discover information about a phone number. It can include the carrier, the owner's name and address, and even connected online accounts.

How To: Use Metasploit's WMAP Module to Scan Web Applications for Common Vulnerabilities

Having an efficient workflow is an integral part of any craft, but it's especially important when it comes to probing apps for vulnerabilities. While Metasploit is considered the de facto standard when it comes to exploitation, it also contains modules for other activities, such as scanning. Case in point, WMAP, a web application scanner available for use from within the Metasploit framework.

How To: Create Custom Wordlists for Password Cracking Using the Mentalist

Beginners learning brute-forcing attacks against WPA handshakes are often let down by the limitations of default wordlists like RockYou based on stolen passwords. The science of brute-forcing goes beyond using these default lists, allowing us to be more efficient by making customized wordlists. Using the Mentalist, we can generate millions of likely passwords based on details about the target.

How To: Hack WPA & WPA2 Wi-Fi Passwords with a Pixie-Dust Attack Using Airgeddon

Design flaws in many routers can allow hackers to steal Wi-Fi credentials, even if WPA or WPA2 encryption is used with a strong password. While this tactic used to take up to 8 hours, the newer WPS Pixie-Dust attack can crack networks in seconds. To do this, a modern wireless attack framework called Airgeddon is used to find vulnerable networks, and then Bully is used to crack them.

How To: Use Meterpeter on OS X

Hello all, this is my first submission to null byte! I noticed something a little strange, particularly that whenever Meterpreter is discussed, it is virtually always in the context of Windows. Granted, the Windows Meterpreter is more powerful than the version that can run on OS X (it has several more commands/options), but I think it is still worth noting how to do it. I've even seen some people mistakenly say that Meterpreter can only be run on Windows, which is not true. Meterpreter can ea...

How To: Prevent Problem Gambling

The fun of gambling can come at a hefty price. Problem gambling affects 331, 000 individuals and can quickly destroy families and lives. Know the risks. The Responsible Gambling Council offers a free Cost2Play Calculator app and safe gambling tips atwww.noregrets.ca

How To: Curve or hook a bowling ball

In order to curve-hook a bowling ball, you will need the following: a bowling and a bowling lane. You should start by buying your own custom ball to fit your hands. The balls available in bowling alleys aren't designed to curve-hook.

How To: Style a liberty spike mohawk

How to make a liberty spike mohawk. Gather glue, freeze spray, a blow dryer, a brush, and some rubber bands. Brush hair until it is nice and fluffy. Take rubber band and perform spikes around your entire head. After setting your hair up in the spikes use the freeze spray to spray your hair completely. Inside and outside of the spikes. To ensure proper coating run your fingers through your hair especially at the base to make sure they stay up. With blow-drying blow-dry your hair while pulling ...

How To: Discuss constitutional rights as a Boy Scout

As a Boy Scout, when the First Class rank is attained, a scout has learned all the basic camping and outdoors skills of a scout. He can fend for himself in the wild, lead others on a hike or campout, set up a camp site, plan and properly prepare meals, and provide first aid for most situations he may encounter. A First Class scout is prepared.

How To: Make spinach toast with leftover cream spinach

In this video, we learn how to make spinach toast with leftover cream spinach. First, you will need to take small pieces of bread that you have leftover, as well as some cream cheese, parmesan cheese, and spinach (already cooked). Mix the spinach, cream cheese, and parmesan cheese together and add in some salt to taste. After this, spoon the mixture onto the individual pieces of bread and place into the oven. Let cook on a high temperature until the top and sides of the toast are light brown....

How To: Do a double trouble card trick

Cardtrickteacher takes us through one of his favorite card tricks, the Triumph card trick. He explains that this involves using the audience, which he adequately emulates using just himself. Showing amazing dexterity, he goes through the process of the card trick in real time at first, showing us how exactly the card trick would look in real life and leaving us astounded. He then systematically breaks down the card trick showing each individual step and explaining with such clarity that even ...

How To: Cook classic grilled chicken with the BBQ Pit Boys

This video teaches individuals how to cook classic grilled chicken using a BBQ pit. The first step is to begin mixing one cup of vegetable oil and two cups of vinegar. The next step is to add your favorite chicken rub and mix it all together with a pinch of pepper. The instructor marinates his chicken for four hours before cooking. The next step is to put the marinated chicken into the BBQ pit grill to begin cooking. The instructor notes it only takes about 10min to seer both sides of the chi...

How To: Edit Adobe Bridge's layout and interface

Changing the way the Bridge looks is a personal touch everybody can make to streamline their workflow. Changing layout settings in the bridge is actually quite easy and very helpful for customizing for individual needs. In this video tutorial, see the ways that you can change the Bridge's look and feel to suit your work environment and to free up the space necessary to have a comfortable working window. This video also covers the viewing options given to you by the Bridge to allow for quick a...

How To: Make Jello shots to liven up your party

Jello shots are the perfect combination of dessert and alcohol. They're super tasty and usually beloved by everyone, but they're especially great teasers for those who are alcohol virgins and prefer to be ushered in to the world of Jack Daniels slowly. That's because Jell-o shots contain minimal alcohol and maximum flavor.

How To: Measure your foot & calves for proper shoe fit

This is a video guide for measuring your foot and calf size correctly. This is important in order to properly fit shoes. It's a video intended for athletes and individuals sensitive to their foot and leg health. This is brought to you by a retailer that fits wide or narrow feet with proper shoes. You'll need a wall and a measurement guide. Measure for both feet and sometimes you have two different sized feet.

How To: Use Rubik's Cube notation and terminology

Since its invention in 1974, the Rubik's Cube has become a favorite pastime among geeks, puzzle lovers, and other similarly unique individuals. It is currently available in four basic flavors; Rubik's Mini, Rubik's Cube, Rubiks Revenge, and Professor's Cube. This video tutorial will cover the basic terminology and notation used in solutions for each.

How To: Do the Wheat Stitch

If you are a beginner at hand embroidery, one of the first stitches you will probably learn is the chain stitch. The chain stitch has many variations, and one of them is the wheat stitch, also known as the wheatear stitch. This stitch is simple to work and produces a line that resembles a shaft of wheat. The stitch can be used in all kinds of applications - it would make great background greenery in flowers and gardens, it can also serve as a seam embellishment in crazy quilting, and it can s...

How To: Gather Information on PostgreSQL Databases with Metasploit

Attacks against databases have become one of the most popular and lucrative activities for hackers recently. New data breaches seem to be popping up every week, but even with all of that attention, databases continue to be a prime target. All of these attacks have to start somewhere, and we'll be exploring a variety of methods to gather information on PostgreSQL databases with Metasploit.

How To: Find & Exploit SUID Binaries with SUID3NUM

File permissions can get tricky on Linux and can be a valuable avenue of attack during privilege escalation if things aren't configured correctly. SUID binaries can often be an easy path to root, but sifting through all of the defaults can be a massive waste of time. Luckily, there's a simple script that can sort things out for us.

How to Hack with Arduino: Building MacOS Payloads for Inserting a Wi-Fi Backdoor

Arduino is a language that's easy to learn and supported on many incredibly low-cost devices, two of which are the $2 Digispark and a $3 ESP8266-based board. We can program these devices in Arduino to hijack the Wi-Fi data connection of any unlocked macOS computer in seconds, and we can even have it send data from the target device to our low-cost evil access point.

How To: Use LinEnum to Identify Potential Privilege Escalation Vectors

The art of privilege escalation is a skill that any competent hacker should possess. It's an entire field unto itself, and while it's good to know how to perform the techniques involved manually, it's often more efficient to have a script automate the process. LinEnum is one such script that can be incredibly useful for privilege escalation on Linux systems.