Variety Server Search Results

How To: Detect Vulnerabilities in a Web Application with Uniscan

With the number of web applications out there today, it comes as no surprise that there are just as many vulnerabilities waiting for hackers to discover. Finding those vulnerabilities can be a difficult task, but there are plenty of tools available to make the process easier. While it won't help find any zero-days, web scanners such as Uniscan will detect common vulnerabilities.

How To: Exploit Shellshock on a Web Server Using Metasploit

One of the most critical bugs to come out in the last five years was Shellshock, a vulnerability which allows attackers to execute arbitrary code via the Unix Bash shell remotely. This vulnerability has been around for a while now, but due to the ubiquity of Unix machines connected to the web, Shellshock is still a very real threat, especially for unpatched systems.

News: 'Beast' Cracks Billions of Passwords in Seconds

Dr. Michael Pound, a computer science researcher and professor at the University of Nottingham, uses hashcat and 4 GPUs in parallel to go through 1o billion hashes a second in this Computerphile video. He calls his deep-learning server the "Beast." If you're new to cracking passwords, he does a great job breaking down the process of what's going on as hashcat does its magic.

Where Do I Start: Learn the Fundamentals

I am very new to Null Byte but I find much of its content and community incredibly interesting. I spent quite a bit of time just chronologically going through the posts and I noticed a common theme in many of the beginner posts. Many people seem to want to know the 'secret' or a paragraph on "How to Hack" and become a hacker in a few minutes. I started off this post as a reply to a question from a beginner but thought it might be beneficial to have for those stumbling across this site.

How To: Paint eyebrows and hair onto your reborn baby doll

The importance of paint cannot be underestimated when it comes to correctly constructing a reborn baby doll. There are many tutorials showing you how to correctly replicate the hair on your baby doll's head, but what about the eyebrows? This tutorial shows you how to use a variety of paints and fine tip brushes to correctly achieve realistic eyebrows as well as head hair for your next reborn project.

How To: Create object arrays in 3D Studio Max 2010

See how to create arrays of objects in 3D Studio Max. While there are a variety of methods for generating object arrays, this clip looks at two of the faster methods for creating 1D, 2D & 3D arrays. Whether you're new to Autodesk's popular modeling software or a seasoned 3D artist just looking to better acquaint yourself with the application, you're sure to be well served by this video tutorial. For more information, take a look!

How To: Make a healthy fruit smoothie

Want a fruit smoothie? While we can't recommend asparagus or cheddar-flavored drinks, we encourage you to experiment, using this road map to the ultimate healthy blended beverage. Remember to be creative -- mix a variety of fruity flavors.

How To: Spin a hula hoop around the chest

Chest hooping is no more complicated than spinning at the waist, and has a great variety of movement possibilities because of the variable choices of arm and shoulder placement. Safire, expert hula hoop dancer, walks through the simple steps of doing this stunt, breaking down each movement to exact body positions and also thoroughly explaining any of the hula hoop choreography terminology she uses. Watch this video hula hoop tutorial and learn how to rotate a hula hoop at chest level.

How To: Graft over an apple tree

Grafting, also known as "top working," is simple-but-essential technique that enables you to change the variety of fruit a tree bears. In this tutorial, Stephen Hayes of Fruitwise Apples Heritage reviews the essentials of top working while discussing an apple tree that was successfully grafted a year prior.

How To: Recognize and avoid poison ivy

Life is not always a walk in the woods, but when it is, make sure you don’t step in the poison ivy. Leaves of three, don't touch me or Leaves of three, let it be is a pretty good rule of thumb as poison ivy comes in many colors and varieties. This video nature safety tutorial shows how to look out for and prevent the uncomfortable burning that results from any contact with poison ivy.

How To: Open format timeline in Final Cut Express

Final Cut Express provides easy setup options for a variety of video formats, but if you're not sure what format you're working with, Final Cut Express can automatically set the sequence to match the size and frame rate of your clips. When adding the first clip to a new sequence, the program will ask if the sequence should be changed to match the new clip. You don't have to work with all the same format, either, thanks to Final Cut Express' powerful open format timeline.

How To: Communicate between Flash AS3 and PHP

All the files you need are in a free download on DevelopPHP. PHP has to be on a server. It will not run on a local machine. Type your name. There are two variables which show up in the dialog boxes (which are stacked.) You can change the user name. It sets up a URL request and a URL loader and sends some URL variables and are placed into the value of names and pairs. They get posted to the PHP file. Place the URL reference location of where the PHP files are on your server in the line that sa...

How To: Use SQL Injection to Run OS Commands & Get a Shell

One of the ultimate goals in hacking is the ability to obtain shells in order to run system commands and own a target or network. SQL injection is typically only associated with databases and their data, but it can actually be used as a vector to gain a command shell. As a lesson, we'll be exploiting a simple SQL injection flaw to execute commands and ultimately get a reverse shell on the server.

How To: Use Maltego to Fingerprint an Entire Network Using Only a Domain Name

Hackers rely on good data to be able to pull off an attack, and reconnaissance is the stage of the hack in which they must learn as much as they can to devise a plan of action. Technical details are a critical component of this picture, and with OSINT tools like Maltego, a single domain name is everything you need to fingerprint the tech details of an organization from IP address to AS number.

How To: Use the Chrome Browser Secure Shell App to SSH into Remote Devices

Many guides on Null Byte require using the Secure Shell (SSH) to connect to a remote server. Unfortunately for beginners, learning to use SSH can become a confusing mix of third-party programs and native OS support. For Chrome OS users, using SSH is even more difficult. We'll fix this by using the Chrome Secure Shell to establish an SSH connection from any device that can run a Chrome browser.

How To: Enable the New Native SSH Client on Windows 10

For years, PuTTy has reigned supreme as the way to establish a Secure Shell (SSH) connection. However, those days are numbered with the addition of the OpenSSH server and client in the Windows 10 Fall Creators Update, which brings Windows up to par with macOS and Linux's ability to use SSH natively.