Targeted Totally Search Results

How To: Play infield in baseball

Check out this instructional baseball video that demonstrates how to play infield. This video offers a few tips for fielding ground balls. Learn how to make a play on a grounder from a professional in this baseball video.

How To: Tone every trouble zone with a beach ball

There is not better way to get in shape and target trouble zones than with the help of some experts in fitness and some simple workout equipment. In this how to video tutorial SELF Magazine shows you how to tone and sculpt your body with a simple beach ball. Tone difficult areas with tilt-a-whirls, dipsy dos, squeeze play, close reaches, reverse lunges, pendulums, hold your own and tummy toner exercises.

How To: Pattern your shotgun

When shooting a shotgun, you don't really have to aim--just point and shoot. Whether you hit what you're shooting at depends on how well you did your homework. "Patterning" your shotgun allows you to choose exactly the right brand of shells, size and type of shot and type of choke required for the game you're pursuing. Set yourself up 40 yards from a 30-inch circle target, and bring along several brands of shells in various shot sizes. Use some form of rest like sandbags on a table or a rolle...

How To: Use English slang

In this ESL language tutorial we look at English slang. Slang is when you replace a common word or sentence with a totally new one. English slang often depends on the country and then region of the country you are in. This how to video teaches you some widely used slang words and phrases that you can say in English. Try out the words in this lesson and you will be "shooting the breeze" in English in no time.

How To: Hack Apache Tomcat via Malicious WAR File Upload

Web applications are a prime target for hackers, but sometimes it's not just the web apps themselves that are vulnerable. Web management interfaces should be scrutinized just as hard as the apps they manage, especially when they contain some sort of upload functionality. By exploiting a vulnerability in Apache Tomcat, a hacker can upload a backdoor and get a shell.

How To: Use John the Ripper in Metasploit to Quickly Crack Windows Hashes

There are many password-cracking tools out there, but one of the mainstays has always been John the Ripper. It's a powerful piece of software that can be configured and used in many different ways. Metasploit actually contains a little-known module version of JTR that can be used to quickly crack weak passwords, so let's explore it in an attempt to save precious time and effort.

How To: Quickly Gather Target Information with Metasploit Post Modules

Post-exploitation information gathering can be a long and drawn-out process, but it is an essential step when trying to pivot or establish advanced persistence. Every hacker should know how to enumerate a target manually, but sometimes it is worth it to automate the process. Metasploit contains post modules that can quickly gather valuable information about a target, saving both time and effort.

How To: Bypass UAC & Escalate Privileges on Windows Using Metasploit

UAC is something we've all dealt with on Windows, either as a user, administrator, or attacker. It's a core feature of the Windows security model, and for the most part, it does what it's supposed to. But it can be frustrating as a hacker when attempting privilege escalation, but it's easy enough to bypass UAC and obtain System access with Metasploit.

How To: Use Metasploit's WMAP Module to Scan Web Applications for Common Vulnerabilities

Having an efficient workflow is an integral part of any craft, but it's especially important when it comes to probing apps for vulnerabilities. While Metasploit is considered the de facto standard when it comes to exploitation, it also contains modules for other activities, such as scanning. Case in point, WMAP, a web application scanner available for use from within the Metasploit framework.

How To: Set App Limits on Your iPhone to Restrict All-Day Access to Games & Other Addictive Apps

Most of us have, at one point or another, found ourselves glued to our smartphone in a trance-like state, totally unaware of what's around us. Well, Apple has a way to curb overuse with an awesome tool for iPhone starting in iOS 12. It can help nudge us away from our phones to spend more time attending to real-life matters.

How to Hack Wi-Fi: Capturing WPA Passwords by Targeting Users with a Fluxion Attack

With tools such as Reaver becoming less viable options for pen-testers as ISPs replace vulnerable routers, there become fewer certainties about which tools will work against a particular target. If you don't have time to crack the WPA password or it's unusually strong, it can be hard to figure out your next step. Luckily, nearly all systems have one common vulnerability you can count on — users!

How To: Use Meterpeter on OS X

Hello all, this is my first submission to null byte! I noticed something a little strange, particularly that whenever Meterpreter is discussed, it is virtually always in the context of Windows. Granted, the Windows Meterpreter is more powerful than the version that can run on OS X (it has several more commands/options), but I think it is still worth noting how to do it. I've even seen some people mistakenly say that Meterpreter can only be run on Windows, which is not true. Meterpreter can ea...

How To: Hack and control anyone's webcam using Google

Consider this reason 1,001 why we love the internet: Using Google, you can hack into almost any webcam or security cam, in any part of the world and even control the webcam to move around so you can get your full panoramic shot. Don't believe us? Then check out this video tutorial to learn the steps you need to take.

How To: Order coffee in Polish

Have you ever wanted to order coffee in another language? Well if you have, this is the video for you! When watching, make sure your audio is turned up so you can hear exactly how the phrases are said in Polish. Listen to the voice and get the different parts of the word down right so you have the correct sounds. If you don't have this right, you can end up saying a totally different phrase. Practice this a lot and then when you learn how to say it, you can speak it with ease! Have fun and en...

How To: Use "may I" phrases in Polish

In this tutorial, we learn how to say basic phrases in Polish: "may I use...". Listen to the video and read the text as you practice saying each of these phrases. It's important to get the accent down right, or you can be saying a totally different word or phrase than you mean to. If you use these everyday, you will become more familiar with the answers you get to the questions as well! Just make sure you practice and go slow with these, no rush. Once you learn these, you will open your mind ...

How To: Lay ceramic tile

In this tutorial, we learn how to lay down ceramic tile. Start off by laying down the mortar for the base. After this, scrape it around with the ridged laying tool. Then, lay the tile down flat and place a spacer in between the one that it is next to. Once you are finished with this one, continue the same process for the rest of them. Make sure you are laying the tile down totally flat and it is lined up with the other ones. There should be spacers in between all of the different tiles that a...

How To: Wear rompers and jumpsuits to perfectly fit your body

Rompers aren't just for babies anymore! Rompers and jumpsuits are totally in style these days, but not everyone can pull them off, but that's only because they don't really know how to wear them. There's a romper and jumpsuit out there for virtually everyone, no matter how big, small or curvy. One of the big worries with rompers is the dreaded cameltoe. If the romper you're trying on gives you a camel toe, then just go for a bigger size, and then you can tighten it up to your shape with acces...