At first, it seemed like a clever art installation housed on the web, but now we're not so sure... the Newstweek hack may indeed be legit. Earlier this year, Newstweek claimed to have developed a way to hack into webpages on a local Wi-Fi network using a homemade device that ...more
With just a few taps, an Android phone can be weaponized into a covert hacking device capable of running tools such as Nmap, Nikto, and Netcat — all without rooting the device. UserLAnd, created by UserLAnd Technologies, is a completely free Android app that makes installing ...more
Samy Kamkar, security researcher and friend of WonderHowTo, just had one of his devices featured in Mr. Robot. If you've never heard of Samy, you've at least probably heard of one of his hacks. For instance, the Samy computer worm that hacked MySpace, his compressed air trick ...more
The Kinect is sure to swarm the homes of Xbox 360 gamers this holiday season. Even though some of us are amazed at the hands-free gaming capabilities it offers, others feel it to be frustratingly limited. Adafruit Industries is one of them. They recently held a competition wi ...more
So, you've finally managed to get addicted to one of those free farming games, like Farm Story or Tiny Village. You play the game nonstop now, and the only thing stopping you is that dreaded on-screen notice to come back in 23 hours to finish farming or building. Come back in ...more
It's important to know who you're dealing with after hacking your target's MacBook. Getting remote access is simple, but covertly gathering information about the user and their system can be a challenge. Continuing with our situational awareness attacks, we'll be further orie ...more
Until recently, brainwave-reading devices have pretty much only existed in science fiction. Sure, electroencephalography (EEG), the technology that powers these devices, has been used in medicine and psychiatry since the late 1800s, but diagnosing people's brains and reading t ...more
Hello NullByte, it's mkilic! This time I'm here with the C.H.I.P from NTC. Although it is not too popular, the C.H.I.P is a brand new micro computer. It is very similar to the Raspberry Pi or Beaglebone Black. The key difference with this particular board is its cost and size. ...more
USB devices are ubiquitous and cheap nowadays, which means they make great raw materials for hacking and electronics projects. This video will show you how you use a USB host shield to hack USB devices and use them with MIDI controllers, game controllers, and other devices.
Turn the classic 70's wireless toy into a modern high-tech spy device with the instructions in this how-to video. I never picked up any chicks with it anyway. This is another fantastic video tutorial by KipKay.
If you're new to the Bluetooth hacking world, here's a little background on using Linux BackTrack to hack a Bluetooh device: Linux Backtrack is a Live DVD device that offers security tools - like password crackers - that allow you penetrate networks. Thus, you can penetrate e ...more
Make a bionic hearing spy device by hacking a megaphone! Kipkay brings you this hack video on how to use a megaphone to spy on people. You can pull in conversations up to 100 feet away! Check out Kipkay hiding in a tree, spying on people. It also works through walls. That's ho ...more
Want to watch Netflix Watch Instantly on your Android device? Watch this video and follow these instructions to learn how to hack any rooted Android device with an APK to work with Netflix. Watch thousands of streaming movies and TV shows with your hacked Android tablet or sma ...more
In this article, I'll show you how to easily "hack" Facebook, Twitter, YouTube, and any number of similar account types with an Android app called FaceNiff. FaceNiff allows you to sniff and intercept web session profiles over the Wi-Fi that your mobile device is connected to. ...more
Netflix is more popular now than ever, but it still has a ways to go before satisfying everyone. Whether it's a lack of availability, buggy or unattractive apps, or just not being able to find anything to watch, lots of people have their complaints. But there is a way to make ...more
The Deauther Watch by Travis Lin is the physical manifestation of the Wi-Fi Deauther project by Spacehuhn, and it's designed to let you operate the Deauther project right from your wrist without needing a computer. That's pretty cool if you want to do all the interesting thing ...more
Welcome back, rookie hackers! We recently began an exploration of ways to hack using the Bluetooth protocol. As you know, Bluetooth is a protocol that connects near field devices such as headsets, speakers, and keyboards. Its minimum range is a 10-meter radius (~33 feet) and ...more
Welcome back, my aspiring hackers! One of those areas of Linux that Windows users invariably struggle with is the concept of "mounting" devices and drives. In the Windows world, drives and devices are automatically "mounted" without any user effort or knowledge. Well, maybe a ...more
Welcome back, my aspiring hackers! In recent tutorials, I have made reference to the name and location of the Linux devices in the file system, such as sda (first SATA or SCSI drive). Specifically, I have mentioned the way that Linux designates hard drives when making an imag ...more
Welcome back, my fledgling hackers! In this series, I am trying to develop your knowledge of digital forensics, which is valuable whether you're choosing a career in it or just want to know how your hacker activity can be traced. Few professional digital forensic investigator ...more
Ever since the release of iOS 6 for the iPhone in late September last year, people had been itching for the subsequent jailbreak. While the untethered jailbreak was released on Super Bowl Sunday this past February 3rd, many others couldn't wait and jailbroke their iPhones with ...more
Shodan calls itself "the search engine for internet-connected devices." With so many devices connected to the internet featuring varying levels of security, the special capabilities of this search engine mean it can provide a list of devices to test and attack. In this tutoria ...more
I remember a time when I had to rent a VHS from the local video rental store. It wasn't all that bad, with the only real annoyances being the trip to and fro, having to rewind the movie and the possible malfunction of my VHS player, which liked to eat tape from time to time. ...more
Thanks to online music services like eMusic and iTunes, compact discs are becoming a far distant memory, turning local music shops around the country into desolate wastelands. The once mighty movie rental store Blockbuster is now bankrupt because of online streaming services l ...more
Whether it's the new iPad Killer or not, one thing's for sure—the Motorola XOOM is hackable. Just hours after its release last week, Verizon's new Android-based tablet (running Honeycomb) was rooted by hacker Koushik Dutta, which seems easy enough. "Since it’s another Google ...more
The 'One Small Hack for Man' achievement in Call of Duty: Black Ops is available if you own the Rezurrection DLC and requires you to hack anything within the game with the hacking device. Take a look at this guide from the Achievement Hunters to learn just how to unlock the ac ...more
Jailbreaking your iPod or iPhone is method of hacking the device so you can then download third party apps onto the phone. This will void your Apple warranty, but if that doesn't bother you, here's how to do it. Make sure you back up your device before trying to jailbreak it! ...more
How many of you have or know people who have a smartphone? There's a lot of you, right? Well, depending on how most of you use those smartphones, there could be all kind of sensitive information stored on it, and that doesn't just mean sensitive personal information, but it co ...more
It isn't a new gadget, but the EyeClops Mini Projector still makes a great stocking stuffer for Christmas Day. It's great for kids to play with, but for techies— it's sure to be something fun to hack and mod this holiday season. The EyeClops Mini Projector looks more like Wal ...more
In this Electronics video tutorial you will learn how to use Bluetooth connectivity to share cell phone files. You are not hacking in to other people's phones as you need their permission to access their phones. You can change ringtones and pictures or share them with your fri ...more
Looking to mod GTA 4 for the PS3? Here's how to do it. This video gives you the info and links to get tweaking this already killer game. You will need: a PS3 on Firmware 3.41, an external HDD, a device to hack your PS3. Watch the vid and learn how to hack GTA 4 for PS3.
The Brother KH-930e knitting machine is an old but reliable device. It's age means that it doesn't like interfacing with modern computers though, so it's hard to get patterns from your computer to your machine so it will knit your project. Without this video it's hard, that is ...more
Watch this amazing USB Bluetooth adapter hack from Kipkay. It's easy and effective, plus it will work with other wireless devices, too. Bluetooth works on a 2.4GHz short wavelength radio frequency, but it's only effective over short distances. Well, Kipkay's going to show you ...more
Jailbreaking iPhones, iPods, and iPads with Jailbreakme.com is one of the easiest hacks ever creataed, and is completely legal. That doesn't mean it works perfectly every time. If you're having problems using jailbreakme, don't give up! This video will show three ways to fix c ...more
Interested in tethering a WiFi device to your Google Nexus One phone? This guide will show you how it's done. Whether you're the owner of a Google Nexus One Android smartphone or just covet one, you're sure to enjoy this Nexus One owner's guide from Nexus One Hacks, which pres ...more
In this video, learn how to hack your HTC EVO 4G and root it for "Super user" access. Once you have rooted your device you can install custom ROMs, apps, overclock the CPU and a whole lot more. So, follow along with this step by step demo and root your phone to discover the po ...more
In this tutorial, learn how to access your phone's data network to enable free tethering on your new HTC EVO 4G. By tethering with your EVO you can connect up to eight other devices to your phone and use it as a wireless modem. This hack works with any EVO and will allow you t ...more
This network security tutorial addresses how to create a Meterpreter reverse connecting executable. It can be ported to a U3 device for pentests. For detailed, step-by-step instructions on how to create Meterpreter executable, or .exe, files, watch this hacking how-to.
Watch this instructional video to learn how to use Google Hacks. Google Hacks is a collection of software that explores Google's search function. Hacks is meant in this definition. "A Hack is a modification of a program or device to give the user access to features otherwise w ...more
Xeni checks in with the authors of the forthcoming O'Reilly HOWTO book "iPhone Hacks" (David Jurick, Adam and Damien Stolarz) for a demonstration of how to unlock and jailbreak your iPhone or iPod Touch. The authors promise to teach you how to coax more out of these devices: l ...more
Few Bluetooth users realize that Bluetooth headsets can be hacked or otherwise exploited to a remote attacker the ability to record and inject audio through the headset while the device is not in an active call. SANS Institute author and senior instructor Joshua Wright demonst ...more
Want to stop wasting energy charging your USB devices? Transform some cheap solar-powered garden lights into your very own solar USB charger. For step-by-step instructions on replicating this hack yourself, watch this video tutorial. Just watch to see how to build your own sol ...more
Kip "Kipkay" Kedersha is known for his intriguing and clever how-to and prank videos, even when he teams up with MAKE Magazine. He will show you how to tweak, hack, mod, and bend any technology to your hacking needs. No electronic device, gadget, or household item can stand th ...more
Kip "Kipkay" Kedersha is known for his intriguing and clever how-to and prank videos, even when he teams up with MAKE Magazine. He will show you how to tweak, hack, mod, and bend any technology to your hacking needs. No electronic device, gadget, or household item can stand th ...more
WPA-secured wireless networks, or WiFI Protected Access, is a form of internet security that secures your wireless LAN from being accessed by unauthorized users. Safer than WEP, or wireless equivalent privacy, WPA still has weaknesses that are prone to cracking - IF, that is, ...more
GTA 4 is a sweet game, and now you can get into the guts of it and create some sweet mods for yourself. Cars, weapons, perspectives, and many, many, many more mods can be created. Follow the steps and open the doors to new cools things with this great game on Sony PS3. This vi ...more
Now that most computers have internal webcams in them, what are you going to do with that external webcam eating up precious desktop space? Kipkay shows you the perfect hack— the "Super SpyScope". The first thing you'll need to do is disassemble the webcam. Remove the main bo ...more
It's official! You can jailbreak whatever devices you want without fearing reprisal from the federal government! WIN! If you were worried about the legal implications before, worry no longer, and start taking advantage of your devices! This video will show you how to hack an i ...more
Learn how to hack Google with this amazing video. This video will teach you how to hack Google by using advanced search operators and esoteric search terms to find “hidden” files and mp3s quickly and easily; you'll also learn how to use Google to hack unprotected Internet-cont ...more
Enjoying the many benefits of Facebook Places? But what if you want to check in somewhere you're not? Your smartphone can automatically detect your geographical location, preventing you from just checking in just anywhere, but like all technology… it's a long way from perfect, ...more
Now that you're officially allowed to do it, jailbreaking your iPhone, iPod Touch, or iPad is a better idea than ever before! This video will show you everything you need to jailbreak a wide variety of Apple devices, including the iPhone 3G and 3GS, the iPod Touch 2G and 3G, a ...more
Apple's iOS 4.2.1 firmware update was released yesterday to all iPads, iPhones and iPod Touches, with enhanced multitasking features. It was the first significant update for the iPad since its introduction. And when there's a new firmware update for iOS, there's always a new ...more
According to Amazon.com, Kindle was their best-selling item this year, which means many, if not all of you are playing with a brand new Kindle on Christmas Day. Of all of Amazon's Kindle models, the Kindle 3 (6") will be the most common eReader in everyone's hands, either the ...more
Security awareness seems to be a hot topic these days on the web, with developers making apps and devices that can hack networks and machines with just a few clicks. But these applications aren't only exploiting security flaws in systems and networks, they're being used by ama ...more
Thanks to Yifan Lu, it's been discovered that the operating system running on the Kindle Touch is written mostly in HTML5 and JavaScript, unlike the previous models which used Java. This is exciting, because when a device is hacked or rooted, that means homebrew programs can b ...more
Don't be too disappointed if you don't have the spiffy new Kindle Touch, there is an up side. The benefit to owning the older (duller) models is that the firmware remains the same throughought generations, so the hacks retain their usefulness. This has given the modding commun ...more
Android smartphones have all sorts of connectivity chips built in, including Bluetooth, Wi-Fi, GPS, NFC, and mobile data. But what about AM or FM radio, two of the most common methods of wireless communication? The truth is, it really depends on your device. Some phones come ...more
Check out this instructional video and learn how to build an infrared night vision device from a modified digital camera. You'll be able to see and record in night vision. For detailed, step-by-step instructions on replicating this hack at home, take a look at this how-to vide ...more
Advancements in technology usually lead to the miniaturization of old technologies, and video games are no exception. Since at least 1990, game hardware manufacturers and enterprising DIY electronics enthusiasts have poured their efforts into making full-size video game consol ...more
By now, many of you may have heard about iPhone tracking and recording your location data, but is there anything else being extracted from cell phones without our knowledge? If you're a Michigan state resident, the answer is an alarming "maybe". Michigan's police department h ...more