Utilize Hash Search Results

How To: Get Full-Screen "Immersive Mode" on Android Without Rooting

Rooting is a great way to unleash your device's full potential, but not everyone's comfortable with it. Rooting can void a warranty, cause issues with certain apps, and the process itself can be tricky for older devices. Alas, most of the great apps or mods out there require root access, like the ability to utilize a built-in KitKat feature known as Immersive Mode.

How To: Model and animate falling shell casings in 3DS MAX

When people fire weapons in movies, there is often a shot of the shell-casings leaving the gun and flying through the air. Sometimes we get to follow them all the way to the ground, leaving us with a sense of loss at the firing of the weapon. This video will show you how to model and animate some shell casings falling to the ground and smoke trailing them in 3D Studio MAX and Photoshop, utilizing Reactor physics, particle flow, space warps, and all sorts of other fun 3DS MAX tools.

How To: Hack a remote Internet browser with XSS Shell

XSS Shell is a cross-site scripting backdoor into the victim's browser which enables an attacker to issue commands and receive responses. During a normal XSS attack an attacker only has one chance to control a victim's browser; however, the XSS Shell keeps the connection between the attacker and the victim open to allow the attacker to continuously manipulate the victim's browser. XSS Shell works by setting up an XSS Channel, an AJAX application embedded into the victim's browser, that can ob...

How To: Identify Missing Windows Patches for Easier Exploitation

No operating system is stricken with as many vulnerabilities as Windows, and it's often a race to release the latest patches to fix things. From an attacker's point of view, knowing which patches are present on a Windows machine can make or break successful exploitation. Today, we will be covering three methods of patch enumeration, using Metasploit, WMIC, and Windows Exploit Suggester.

How To: Use Metasploit's Timestomp to Modify File Attributes & Avoid Detection

It is said that the best way to avoid detection when hacking is to leave no trace, and often that means not touching the filesystem at all. But realistically, in most cases, it's impossible not to interact with the filesystem in one way or another. The next best thing to do to throw off any investigators is to change the file attributes to hide activity. We can do this with Metasploit's Timestomp.

How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack

Cracking the password for WPA2 networks has been roughly the same for many years, but a newer attack requires less interaction and info than previous techniques and has the added advantage of being able to target access points with no one connected. The latest attack against the PMKID uses Hashcat to crack WPA passwords and allows hackers to find networks with weak passwords more easily.

How To: Perform Local Privilege Escalation Using a Linux Kernel Exploit

Getting root is considered the Holy Grail in the world of Linux exploitation. Much like SYSTEM on Windows, the root account provides full administrative access to the operating system. Sometimes even a successful exploit will only give a low-level shell; In that case, a technique called privilege escalation can be used to gain access to more powerful accounts and completely own the system.

How To: Use Pupy, a Linux Remote Access Tool

In one of my previous articles, I discussed ShinoBot, a remote administration tool that makes itself obvious. The goal is to see if the user could detect a remote administration tool or RAT on their system. In this article, I'll be demonstrating the use of Pupy, an actual RAT, on a target Ubuntu 16.04 server.

How To: Navigate the home screen on Droid smartphones

In this video tutorial, anyone who owns a Droid smartphone can learn how to better navigate their home screen. With this Droid phone tips, you'll be able to maximize your time and create shortcuts to your most used applications. The Droid's home screen in much like a computer's desktop; putting an icon on one of your Droid home screens allows you quick access to a program or app. There are numerous Android phones, but this video focuses on the "Droid" versions, but you may need to play around...

How To: Build a worm composting bin

Leigh Ramsdell and Hal Brindley with The Environmentals discuss how to build a worm composting bin. To build a worm composting bin, you will need a plastic tub or a box with a lid. Calculate one square foot of surface area per pound of worms. A pound of worms can process a half a pound of food per day. Worms need air so put holes in your bin on the top and sides. Also put holes on the bottom for drainage so your worms don't drown and die. Add screens to cover the holes. Put bricks on the bott...

How To: Use a damper pedal whle playing piano

Enthusiastic, young David Yzhaki teaches you how to play the piano with a damper (sustain) pedal. Get to know the pedals on an upright piano. The right pedal, which is the primary focus of the video, is the sustain pedal, which creates a sustaining note when pressed. The left pedal is called the "una corda," which modifies the tone quality by softening the note when pressed. The middle pedal is called the sostenuto pedal, which enables the piano player to hold a note longer than usual. To use...

How To: Overclock an Intel Core i7 processor

Check out this overclocking tutorial from HotHardware.com! Intel's Core i7 processor offers a significant performance increase over previous generation Core 2 processors. In addition, like the legacy Core 2 architecture, the new Core i7 also has a bunch more headroom for wringing upside performance out of the chip, maximizing value, power and return on your investment with overclocking. In fact, Intel actually built-in a predefined overclocking feature called "Turbo Mode". We explain how not ...

How To: Build a light table for silkscreening and photography

Josh Copp and Madeline Donahue show us how to build a light table from pine wood and plywood utilizing two fluorescent light fixtures as the light source inside the box. The frame of the box is fashioned out of two 1X8 planks cut into four pieces so that two sides are 30 inches and two sides are 22 3/8 inches. The base of the box is made of plywood or OSB and is 30X22 3/8. Once the pieces are cut and assembled using a pocket hole jig and wood screws, the inside of the box is painted with whit...

How To: Make a dramatic film

This tutorial covers some of the basics of dramatic filmmaking. A drama is a film that is character-driven, using the characters' emotional responses to situations to move the story along. Epic and historical dramas put their characters in historical events. Crime dramas are set within the rules and boundaries of reality, but do not have to be linked with any historical event. These films utilize suspense and action to push the characters through the story. Biopics are motion picture biograph...

How To: Create databases from templates with FileMaker Pro 10

In this Lynda video tutorial, learn how to use FileMaker Pro 10 software to create databases with pre-made templates. FileMaker offers these templates in a package called Starter Solutions. To access these options, click open FileMaker. Then, go to New Database under the File menu. Click the option "Create a database using a Starter Solution." The templates are grouped according to the nature of their use. Some are for the home, while some are for business. All you do is open the template you...

How To: Butcher a beef carcass

A cow is enormous... Hence why this video on how to butcher a beef carcass (from start to finish) had to be broken up into 13 parts. This butchering process is designed to not waste an ounce of meat and utilize every part of the carcass. Warning! These videos are not for queezy stomachs!

SQL Injection 101: How to Avoid Detection & Bypass Defenses

It is often said that the best hackers remain unknown, and the greatest attacks are left undiscovered, but it's hard for an up-and-coming penetration tester or white hat to learn anything unless one of those factors is actually known or discovered. But the end goal here in our SQL injection lessons is to make that statement as true as possible for us when performing our hacks.

How To: Extract Windows Usernames, Passwords, Wi-Fi Keys & Other User Credentials with LaZagne

After exploiting a vulnerable target, scooping up a victim's credentials is a high priority for hackers, since most people reuse passwords. Those credentials can get hackers deeper into a network or other accounts, but digging through the system by hand to find them is difficult. A missed stored password could mean missing a big opportunity. But the process can largely be automated with LaZagne.

News: Samsung Galaxy S8 & S8+ with Infinity Display, Iris Scanner & More—Here's Everything You Need to Know

The new Samsung Galaxy S8 and Galaxy S8+ phones were announced on March 29 at the Samsung UNPACKED 2017 event. Preorders start on March 30 for the Korean tech giant's latest flagships, and sales officially begin in the US on April 21. Samsung will need a smooth release to win back consumer trust after the Note7 mess, and it's already looking like the S8 won't disappoint.

How To: Cook Any Cuisine Perfectly by Knowing the Right Ingredients to Use, Part 1

Home cooks are often quite intimidated when trying to reproduce the delicious ethnic dishes they enjoy at various restaurants. Thankfully, there are definite flavor profiles and spice/seasoning/herb combos that are very specific to various regional cuisines and cultures; with a little guidance, you can create dishes that are tasty homages to the cuisines you love to eat. In this two-part article (second part here), I'll cover both categories and sub-categories of some of the most popular ethn...

Hack Like a Pro: Finding Potential SUID/SGID Vulnerabilities on Linux & Unix Systems

Welcome back, my nascent hackers! We have spent a lot of time in previous tutorials focused on hacking the ubiquitous Windows systems, but the vast majority of "heavy iron" around the world are Linux or Unix systems. Linux and Unix dominate the world of Internet web servers with over 60% of the market. In addition, Linux and Unix servers are the operating system of choice for major international corporations (including almost all the major banks) throughout the world.

How To: Sync Google Calendar with all of your devices

Jordan Patterson the Cheap Geek has made a video showing you the steps to sync your contacts and calendars on three mobile devices together, the iPhone, a laptop running Windows, and a Mac running OS X utilizing a few downloaded programs and Google Calendar. First he shows you how to sync calendars on the Apple computer, by downloading a program from Google code called collaboration code, and then running it. After putting in his g-mail account information, he tells the program which calendar...

How To: Make pork pot stickers from leftover pulled pork

This video shows how to make a recipe for pork potstickers. This recipe utilizes leftover pulled pork which is not made during the video. Some of the pulled pork is placed into a large mixing bowl. Next a table spoon of minced garlic is added to the bowl followed by a pinch of salt and ground black pepper. Afterwards, thinly sliced scallions as well as chopped cilantro are added to the mixing bowl. The mixture is then thoroughly mixed to combine and distribute all of the ingredients; this mix...

How To: Easily wear a rockabilly bandana style

This video demonstrates how to wear your bandanna in a rockabilly style. First, you'll need to curl your hair in either rollers or hot sticks. This particular video utilizes both. Do not worry about including your bangs. Use three rollers on top, so the ends of the rollers are pointing towards your ears. The third roller will be on the top of the back of your head. Put to more rollers on each side of the top, this time the ends facing forwards and backwards. Use four hot sticks for the sides ...

How To: Use interactive motion in Google SketchUp

George Maestri from Lynda shows how to add interactivity in Google SketchUp Pro using a variety of tools in the program. Adding interactivity allows for added dimension and interaction with an object. The example used in the tutorial was that of a fridge, which after adding interactivity, allowed for the doors and drawers of the fridge to be opened. To utilize this technique, the object's file (without interactivity) should be opened. By selecting the fridge and then going to component attrib...

How To: Teach your children to multiply early

The gentleman, acting as the Instructor, starts the session immediately by suggesting that to teach early multiplication all parents should practice a method of "Count-by's" with their children when they are very young using ones to ten, twos to twenty, threes to thirty, fours to forty, and so forth. The Instructor then demonstrates this method of counting by tens using a grid behind him on a chalkboard which depicts columns of ten elements. He counts each column from 10 to 100, and then writ...

How To: Paint biker skull & crossbones nails

If you want to add interest to your nails, follow the steps in this video tutorial from Broadway Fashion Diva Nails. It shows you how to apply acrylic skulls, crossbones, and roses nails. The first step before application is to select nails that fit each of your fingers of one hand. Then, lay the nails out so that they are ready for application. Using pink gel glue, begin with your pinky finger. Utilize the tab to have control of the acrylic nail without actually holding the nail and getting ...

How To: Create a "crocodile tears" makeup look

YOUTUBE Logan Salter presents a video demonstrating a method to create "Crocodile Tear" Makeup. The entire video is demonstrated through visual action, with typed titles in green appearing on the screen prior to each new step, and electronica music played throughout. Logan begins by applying moisturizer, demonstrated visually in the video by applying moisturizer to his facial area and moves at an increasingly faster rate through steps visually demonstrating how to apply various powders and br...

How To: Make a gift card holder & sleeve with Stampin' Up!

Stampin' Up Dawn shows how to use Stampin Up to create original gift card holders and sleeves in this craft tutorial. The tutorial shows how to create the Bashful Blue gift card holder. However, it should be noted that the Certainly Celery card does not utilize the scalloped edge design. The third style, Elegant Eggplant, uses ink #10510 and card stock #105126. You will need a strip of bashful blue card stock cut 4.5" by 7 3/4" scored at 3/4 and 4 1/4. Fold the score lines to create the sleev...