User's Ip Search Results

How To: Inject Coinhive Miners into Public Wi-Fi Hotspots

Coinhive, a JavaScript cryptocurrency miner, was reportedly discovered on the BlackBerry Mobile website. It was placed there by hackers who exploited a vulnerability in the site's e-commerce software that allowed them to anonymously mine cryptocurrency every time the website was viewed. There's no doubt Coinhive, an innovative mining method, is being abused and exploited by hackers in the wild.

How To: Gain Complete Control of Any Android Phone with the AhMyth RAT

There are more than 2 billion Android devices active each month, any of which can be hacked with the use of a remote administration tool, more commonly known as a RAT. AhMyth, one of these powerful tools, can help outsiders monitor a device's location, see SMS messages, take camera snapshots, and even record with the microphone without the user knowing.

Networking Foundations: Subnetting Madness

Hello everyone! How's subnetting going? Did you practice a lot? I hope you did, but even if you didn't we will go through some more examples so you can be feeling confident after reading this article. It's all about that bad boy binary!

How To: Introduction to the C.H.I.P by Next Thing Co - IoT Hacking Device?

Hello NullByte, it's mkilic! This time I'm here with the C.H.I.P from NTC. Although it is not too popular, the C.H.I.P is a brand new micro computer. It is very similar to the Raspberry Pi or Beaglebone Black. The key difference with this particular board is its cost and size. The C.H.I.P only costs $9 and measures 2.5 x 1.5 inches. In addition to this, the C.H.I.P has built in 802.11 b/g/n Wifi and Bluetooth 4.0. Considering these great specs, what could a Hacker use this for? Step 1: The In...

Hack Like a Pro: How to Crack Online Web Form Passwords with THC-Hydra & Burp Suite

Welcome back, my hacker novitiates! In an earlier tutorial, I had introduced you to two essential tools for cracking online passwords—Tamper Data and THC-Hydra. In that guide, I promised to follow up with another tutorial on how to use THC-Hydra against web forms, so here we go. Although you can use Tamper Data for this purpose, I want to introduce you to another tool that is built into Kali, Burp Suite.

How To: Create a new standard user & admin in Windows 7

In this video tutorial, viewers learn how to create a new standard user and administrator account. Begin by clicking on the Start menu and select Control Panel. Then click on User Accounts and Family Safety and click on User Accounts. Now select the "Manage another account" option and click on "Create a new account". Users are able to name the account and select the account type (Standard or Administrator). Finish by clicking on Create Account. Users are then able to make changes to the accou...

How To: Disable Windows Vista's user account control

In Windows Vista start off by going into the control panel in the start menu. In here go into "user accounts and family safety". Inside go into "user accounts". A screen will appear where you can make changes to your user account. Here there should be an option to turn user account control on or off. Click on this will bring up another window where if you uncheck the solitary checkbox you will have succeeded in turning User Account Control off. After doing so click ok and then press restart n...

How To: Disable uac and dep on Windows Vista

This video contains instructions about how to disable or enable the user accounts on Windows Vista. It is very simple; just go to control panel -> user accounts and safety -> user accounts. You can click the check box on or off to disable or enable the user accounts. This can also be done by using command line. Open run and type the following command:

How To: Manage standard user & admin accounts in Windows 7

ClearTechInfo live up to their by offering clear and concise information on how to manage user account settings in the new OS from Microsoft, Windows 7. Begin by pressing the start button and going into the control panel. In here look for 'user accounts and family safety', open it. Now go into user accounts and then manage another account. If you are the administrator then you can change whichever setting you want for whichever account but if you're just a standard user you can only alter you...

How To: Create a custom user control in ASP.Net

In this video tutorial, Chris Pels will demonstrate how to create a custom user control in ASP.NET that can be used throughout a web site or across many web sites. Start out by learning the basics of creating a user control that will be used in multiple pages including validation, controlling formatting using style elements, and loading/saving data for the user interface elements. Throughout the video considerations for building user controls that can be easily maintained and used across mult...

How To: Detect browser capabilities in ASP.Net web pages

In this video tutorial, Chris Pels will show how to determine what capabilities a user’s browser has when viewing pages in an ASP.NET web site. First, learn how to access an instance of the HttpBrowserCapabilities object from the ASP.NET Request object associated with the web page request. Next, see the different information available in the HttpBrowserCapabilities object such as the type of browser and whether the user’s browser supports JavaScript and Cookies. Then see an example of how to ...

How To: Do an alphabet plank for a runner's workout

Users will need an exercise ball to perform this exercise. Begin by going on your knees and elbows on the ball. Users basically go into a plank position in the ball. Now users will need to go into a straight position from the shoulders to the knees. Now users will draw the alphabet using their elbows, while rolling the ball. To make the exercise more challenging, users may choose to lift one or both knees off the ground while doing the exercise. This video will benefit those viewers who want ...

How To: Find your IP address without using a 3rd party site

In this how-to video, you will learn how to find the IP address you are using on your computer without using any third party sites. First, go to the start menu and click run. If you are using Vista, go to search in order to the run the file. Next, you should type in cmd.exe into the prompt. A window should now open up. In this window, type in ipconfig /all. From there, your IP address should be listed. This simple video shows you a very easy way to find your IP address without having to use a...

How To: Switch the user ID and log off in Windows 7

Microsoft recommends a unique user ID and password for every user. In order to switch user ID or log off one need to click to the 'Start' menu as shown in the video. Press the move button at the shut down menu as shown. In the sub menu you can see the Change user and Log off. The window will typically shut down and restart on change of user ID or Log Off. In case you need to leave your PC unattended you can press 'Lock' from the same menu which will refrain anyone from changing your desktop s...

How To: Get Root Filesystem Access via Samba Symlink Traversal

Samba can be configured to allow any user with write access the ability to create a link to the root filesystem. Once an attacker has this level of access, it's only a matter of time before the system gets owned. Although this configuration isn't that common in the wild, it does happen, and Metasploit has a module to easily exploit this security flaw.

How To: Enumerate SMB with Enum4linux & Smbclient

SMB (Server Message Block) is a protocol that allows resources on the same network to share files, browse the network, and print over the network. It was initially used on Windows, but Unix systems can use SMB through Samba. Today, we will be using a tool called Enum4linux to extract information from a target, as well as smbclient to connect to an SMB share and transfer files.

HoloLens Dev 101: How to Use Holographic Remoting to Improve Development Productivity

Way back, life on the range was tough and unforgiving for a HoloLens developer. Air-tap training was cutting edge and actions to move holograms not called "TapToPlace" were exotic and greeted with skepticism. The year was 2016, and developers had to deploy to their devices to test things as simple as gauging a cube's size in real space. Minutes to hours a week were lost to staring at Visual Studio's blue progress bar.

How To: The Easiest Way to Pick Up on Your PC Where You Left Off on Your Android

One of Android's biggest strengths is its ability to interact with other operating systems. When you plug your phone into your Windows PC, you instantly see all of the files it holds—and all it takes is a simple syncing app to do the same with Mac. To top that off, apps like Pushbullet and Join bridge the gap even further by allowing you to share links, files, and messages between all of your devices.

SPLOIT: How To Build a Peer to Peer Chat Application in Python ( GUI - Linux )

Developing GUI apps in python is really cool. I ask those who understand the language to help convert some of the command-line or console programs or apps ( I mean programs that are useful to a hacker ) to GUI. I know GUI makes us lazy and not wanna learn but we should all know its fast. Today's tutorial is on p2p chat app I developed last week and decided to share it with the community since its kinda cool.

Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 22 (Samba)

Welcome back, my aspiring hackers! Those of you who use Windows in a LAN environment understand that Windows machines can share directories, files, printers, etc. using "shares." This protocol dates back to the 1980s when the then dominant computer firm, IBM, developed a way for computers to communicate over the LAN by just using computer names rather than MAC or IP addresses.