The USB Rubber Ducky is a well-known hacking device in the cybersecurity industry, but it needs to be preprogrammed before it can be used. That means it's not easy to issue commands to a target computer since you can't interact with it from afar after plugging it in. And if yo ...more
Password cracking is a specialty of some hackers, and it's often thought that raw computing power trumps everything else. That is true in some cases, but sometimes it's more about the wordlist. Making a custom, targeted wordlist can cut down cracking time considerably, and Wor ...more
Social engineering is described as the clever manipulation of the natural tendency of human trust. All of the passwords, locks, and encryption in the entire world are useless against a good social engineer who can charm or trick you into giving it up. But what once started as ...more
RouterSploit is a powerful exploit framework similar to Metasploit, working to quickly identify and exploit common vulnerabilities in routers. And guess what. It can be run on most Android devices. I initially covered RouterSploit on Kali Linux and macOS (OS X), but this tuto ...more
Welcome back, my novice hackers! This new series on Bluetooth hacking was inspired by a recent episode of Mr. Robot (my favorite TV show). In episode 6, Eliot hacked the bluetooth keyboard of the police office in order to hack the prison and release his nemesis, Vera. This is ...more
With some of the groundwork out of the way in getting a Mac set up for hacking, it's time to start looking at toolboxes. Our first toolbox is Git, which will be used throughout future tutorials. Git is currently the most widely used version control system (VCS) in the world, ...more
In one of my previous articles, I discussed ShinoBot, a remote administration tool that makes itself obvious. The goal is to see if the user could detect a remote administration tool or RAT on their system. In this article, I'll be demonstrating the use of Pupy, an actual RAT, ...more
The misconception that macOS is more secure than the Windows operating system is far from the truth. With just one small command, a hacker can completely take over a MacBook and control it remotely. The sheer volume of Windows computers currently in operation around the world ...more
MouseJack vulnerabilities were disclosed over three years ago. Some wireless keyboard manufacturers have since issued firmware updates, but millions (if not billions) of keyboards remain unpatched worldwide, either because they can't be updated or because the manufacturer neve ...more
UAC is something we've all dealt with on Windows, either as a user, administrator, or attacker. It's a core feature of the Windows security model, and for the most part, it does what it's supposed to. But it can be frustrating as a hacker when attempting privilege escalation, ...more
Post-exploitation is often not quite as exciting as popping the initial shell, but it's a crucial phase for gathering data and further privilege escalation. Once a target is compromised, there's a lot of information to find and sift through. Luckily, there are tools available ...more
The public leaks of NSA tools and information have led to the release of previously secret zero-day exploits such as EternalBlue, which was used in the notorious WannaCry ransomware attack. Despite multiple patches being released, many users have failed to update their systems ...more
Design flaws in many routers can allow hackers to steal Wi-Fi credentials, even if WPA or WPA2 encryption is used with a strong password. While this tactic used to take up to 8 hours, the newer WPS Pixie-Dust attack can crack networks in seconds. To do this, a modern wireless ...more
The newest version of macOS has arrived. While everyone's mind is being blown by Mojave's groundbreaking new Dark Mode, we'll be taking advantage of its insecure file permissions to establish a persistent backdoor with a self-destructing payload that leaves little evidence for ...more
A man-in-the-middle attack, or MitM attack, is when a hacker gets on a network and forces all nearby devices to connect to their machine directly. This lets them spy on traffic and even modify certain things. Bettercap is one tool that can be used for these types of MitM attac ...more
Secure Shell is one of the most common network protocols, typically used to manage remote machines through an encrypted connection. However, SSH is prone to password brute-forcing. Key-based authentication is much more secure, and private keys can even be encrypted for additio ...more
Privilege escalation is the technique used to exploit certain flaws to obtain elevated permissions relative to the current user. There are a vast number of methods out there to go from user to root on Linux, and keeping track of them all can be difficult. This is where automat ...more
Want to drop Amazon's DRM from a Kindle eBook you've purchased? As the saying goes, where there's a will, there's a way. And, in this case, there are actually a couple of ways: One method uses Calibre and works for both Windows and Mac users, the other uses an AppleScript and ...more
Meet Aperture 3.1.1, Apple's powerful photo post-production tool with the Amazing Shrinking Price Tag. First released in 2005 for $500, Aperture is now available in the Mac App Store for a measly $79.99—a price reduction of 83.67%! That means a lot of new buyers and, as a resu ...more
Whether it's the new iPad Killer or not, one thing's for sure—the Motorola XOOM is hackable. Just hours after its release last week, Verizon's new Android-based tablet (running Honeycomb) was rooted by hacker Koushik Dutta, which seems easy enough. "Since it’s another Google ...more
We all want a faster, more efficient web browsing experience. Some immediately flocked to Google Chrome as soon as it was released, because of its super fast speeds. Others restrained themselves and continued to wait for Microsoft and Mozilla to play catchup. And the time is a ...more
Did you know that you can use Gmail to make free phone calls to anywhere in North America? We're not talking computer to computer, but actual free phone calls to cell phones and home phones. All you need is a Gmail account, a microphone, and speakers plugged into your compute ...more
On its quest for online domination, Amazon.com continues to expand past its basic web marketplace to fulfill the needs of everyone and anyone with a little cash to spend. First, they battled the likes of Barnes & Noble and Borders Books with their online Kindle eBook shop. Ne ...more
The low system requirements of Minecraft make it ideal for playing on an Android smartphone. If you're looking to find out how to download, install, and play Minedroid, a version of Minecraft designed for your Android phone, take a look at this walkthrough and check out the do ...more
If you have been looking for a way to get the popular Joomla Content Management system running on Windows with IIS, you may have run into many problems. In fact, many people spend days trying to get Joomla running on IIS and run into roadblock after roadblock. The problem is g ...more
Download .net framework and install it if you do not already have it. Download DevKitPro from here and install as instructed. Next, go to Palib.info and download the latest release of this program. To install, follow the prompts. Click here and download DevkitArm. Install this ...more
What happens if your jailbroken iPhone or iPod Touch gets destroyed? What happens if it merely malfunctions and poof—all of your applications are gone? You're screwed—unless you backed up your apps. If you want to prevent loss of all your Cydia and jailbroken apps, then you h ...more
You knew it was only a matter of time. China is now producing the iClone, a phone which looks very similar to the famous iPhone. The bonus with this phone is that you have the ability to install Java, and run Java based applications on the device. This tutorial shows you how t ...more
In this video, we learn how to use cracks to play a DVD or CD without the disk. First, go to Gameburnworld and download/install the patch to play your game. Then, open it up and go to the program files folder to find the files for the game. Drag this and drop it in, then you w ...more
What better way to enjoy the beauty of the blocky world of Minecraft than by flying across the land? If you want to fly in the new release of Minecraft 1.8, take a look at this tutorial on how to download and install the Fly Mod, a part of Zombe's mod pack, with the help of MC ...more
Similar to the Wii, Nintendo frequently updates the apps and software on the Nintendo 3DS. These upgrades are always available using System Update under the system settings on the gaming handheld. Take a look at this guide on how to access the System Update feature, download, ...more
In this tutorial, we learn how to download and install a Chrome extension that will enable you to check your Gmail without losing your present page or pages. It's an easy process and this video presents a complete guide. For more information, including a full demonstration and ...more
If you've ever seen something called ThinkPoint Antivirus on your computer, you have gotten one ofhte most widespread and infectious fake antivirus malware programs out there. To get it off your PC, follow the instructions below, or watch this video for an alternate method if ...more
Let us help you install your JVC Everio software and hook up your JVC HD Everio video camera to your computer. Just select your operating system. Apple HD Tutorial Notes: 1. This tutorial explains how to import HD video to an Apple computer via iLink. For many applications, ...more
iTunes is one of the best music programs out there. You will need this program to use an iPod or download anything from the iTunes Music Store. If you have a Windows based PC, you can still use Mac's iTunes program - and best of all it is a free download! In this tutorial, pro ...more
If you want to play the Minecraft 1.8 pre-release you can try it out on a test server. This guide shows you how to download and install the Minecraft 1.8 pre-release and try out the beta on a server before the official release comes out. It also details how to uninstall Minecr ...more
RSbot is no more, long live powerbot! If you want to hack Runescape this program, no matter it's name, has been the authority since 2006. If you've ever wanted to use it or tried to and had problems, this video is for you. It will teach you how to download and install powerbot ...more
This tutorial from LoadedNewsletter's Jonathan Jelkin gives a simple process on how to prepare H.264 video footage for quick editing. H.264 video footage is shot by popular cameras such as the Canon 5d/7d, Flip cam, GoProHD. This is a great format for straight upload to YouTub ...more
This instructional video shows you how to make a RSS ("Really Simple Syndication") feed using the free program RSS builder. RSS is a script that can be put up on a website that other users can subscribe to in order to get notified when the website gets updated. The xml code be ...more
New to eBay? Don't worry, setting up an account and buying and selling doesn't take that much effort at all. Everyone who has an Internet connection has at one point come across eBay, to find the perfect gift for their loved ones, to find the cheapest deals on plasma televisio ...more
This is, by far, the easiest way to root your Android phone, and it's even got its own name— the "SuperOneClick" method. This is a universal technique that applies to most Android-based smartphones (minus the HTC Evo and T-Mobile G2/Vision). TheUnlockr shows you the secret beh ...more
This video demonstrates how to turn Windows Vista to Windows 7 for free. Make sure that you are running your PC on a Windows Vista OS. First, unlock your taskbar by right-clicking on it and unchecking the option. The space where your smaller application icons are located can n ...more
Have you ever browsed the web, watched a video, then wanted to download it? Well, there's a fabulous program that does just that, simply and easily. It's called VideoCacheView by NirSoft. The program basically extracts the FLV video directly from your browser's temporary folde ...more
There has been an update with the NES emulator, so you have to put the ROMs in the /var/mobile/Media/ROMs/NES folder, and not the /var/root/Media/ROMs/NES folder. Another Note: you must install BSD Subsystem and OpenSSH through Installer in your iPod before configuring your i ...more
In this tutorial, learn how to jailbreak your new iOS 4 on your iPhone or iPod. This jailbreak will let you take advantage of cool new features including the huge app superstore: Cydia. Enjoy! Step 1: Download and install the latest version of iTunes. Step 2: Now start iTunes ...more
In this clip, we learn a basic digital photography workflow, one which will enable you to enhance your favorite digital photos with both ease and speed. (Note: To follow along, you will need to have the application installed. Learn how to download and install the Mac App Store ...more
Enjoying the many benefits of Facebook Places? But what if you want to check in somewhere you're not? Your smartphone can automatically detect your geographical location, preventing you from just checking in just anywhere, but like all technology… it's a long way from perfect, ...more
This video tutorial from iDeviceTutz shows how to change the SSH root password for iPhone or iPod.When iPhone or iPod is jailbroken it sets its password to default - alpine.Thus your device becomes vulnerable from a network attack that could steal your information or identity. ...more
Today, BitTorrent Inc. released the SDK for uTorrent Apps, which will allow software developers from around the world to create Apps for uTorrent, the popular bittorrent client. This video will show you how to download the SDK, install it on your computer, make an app, view th ...more
Are you getting that nasty "Application access set to not allowed" error on your Nokia 5300 cell phone? Unfortunately, it's a problem for most Nokia 5300 owners, ones who wish to use 3rd party applications on certain carriers, like T-Mobile, who restricts the uses for branding ...more
"Connect via Facebook" — these words are coated on over a million websites nowadays, but Facebook Connect poses a risk of leaking personally identifiable information to those third parties. If you're not convinced Facebook Connect is safe, then turn off the flow of personal da ...more
When the amount of memory on your computer sucks, you either have two options: Buy more RAM, or make use of the storage space you've got by compressing your files. One program that will become your new BFF should you choose to do the latter is WinRAR. WinRAR is a compression a ...more
Make your router run on VTEC by injecting it with Tomato Firmware. Tomato Firmware gives you excellent tools such as being able to monitor bandwidth consumption, boost WiFi signal, track results with graphics and much more. This upgrade is great for older wireless routers wit ...more
Check out this video tutorial to see how to keep your private files private, even if you have to email them to yourself at your office? TrueCrypt, an open source piece of software, lets you encrypt your files so they remain accessible only to you. This works on any platform; W ...more
Mac owners— life just got a little easier. No longer do you have to wait in line for the newest version of iLife. No more searching Amazon or eBay for the best price on Aperture. And no more Angry Birds on your mobile device's small touchscreen! Yes, the new Mac App Store wa ...more
System Tool. It sounds like something your Windows computer might need, but it's the exact opposite. System Tool is a computer virus masquerading as a free antivirus program. But don't be fooled, System Tool Antivirus might as well be called System Tool Virus or even System T ...more
The PlayStation Phone is almost here, and the hybrid device from Sony Ericsson is rumored to have Android 2.3 (Gingerbread) as its mobile OS. YouTube user xxmajstor managed to get his hands on what is said to be the Sony Ericsson Zeus - Z1 PlayStation Phone. Below is the spy v ...more
If your iPad, iPhone 4 or iPod Touch is already on a tethered jailbreak, this is the tutorial on the new Redsn0w release for all you experienced users. An untethered jailbreak is a type of jailbreak where the device does not require rebooting with a connection to an external j ...more
This is a short tutorial on how to use your iPhone as a remote control for your eeePC. First download touchpad from installer.app, as well as install VNSea if you don't have it. Just open Share My Desktop on the eee, configure it to accept uninvited connections (make sure you ...more
The Windows 8 Developer Preview is available for download and can give you an early look at what Windows 8 will look like, including the new Metro UI that will replace the normal desktop experience for many computers and tablets. Here's a guide on how to install it on various ...more