With an inconspicuous Android phone and USB flash drive, an attacker can compromise a Windows 10 computer in less than 15 seconds. Once a root shell has been established, long-term persistence to the backdoor can be configured with just two simple commands — all while bypassin ...more
Apple's macOS operating system is just as vulnerable to attacks as any Windows 10 computer or Android smartphone. Hacker's can embed backdoors, evade antivirus with simple commands, and utilize USB flash drives to completely compromise a MacBook. In this always-updated guide, ...more
Step 1: What Exploit Development Is and Why Should I Be Interested on About This Topic An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur ...more
Whether you're white hat, black hat, or some shade in-between, navigating through a network is a core part of hacking. To do that, we need to be able to explore a network to discover the addresses of gateways, interfaces, and other attached devices. When ifconfig just isn't en ...more
Over the years, mobile gaming has become a phenomenon, rivaling in magnitude with its console and PC-based counterparts. We even have mobile versions of Fortnite and PUBG now, games that require lots of processing power to run. But when you just want a quick game to play in th ...more
This video teaches the bare basic sounds for beatboxing and gives you some simple beats to start practicing with. To help you out with timing, use the online metronome at http://www.metronomeonline.com/. Here's how you make the sounds: Kick Drum Make a "buh" sound. It's lik ...more
Some time, when you are making a hat and after you have done your decreases for the crown, you will get to the end of your hat pattern and it will simply say "end the hat". Here's what to do. End Your Hat You will probably have 6 to 10 stitches left on the needle. Push all ...more
Conducting phishing campaigns and hosting Metasploit sessions from a trusted VPS is important to any professional security researcher, pentester, or white hat hacker. However, the options are quite limited since most providers have zero-tolerance policies for any kind of hacki ...more
The key to becoming a competent white hat is knowing how the technology that you are trying to exploit actually works. SQL injection is one of the most common methods of attack used today and also one of the easiest to learn. In order to understand how this attack works, you n ...more
Nmap is more powerful than you know. With a few scripts, we can extend its functionality beyond a simple port scanner and start to identify details about target servers sysadmins don't want us to know. Possibly the most popular and well-known reconnaissance tool currently ava ...more
It is often said that the best hackers remain unknown, and the greatest attacks are left undiscovered, but it's hard for an up-and-coming penetration tester or white hat to learn anything unless one of those factors is actually known or discovered. But the end goal here in our ...more
Transferring hundreds of screenshots, webcam recordings, keystroke logs, and audio recordings between your VPS and a local Kali machine can be tricky. Services like Dropbox don't always have the best privacy policies and suffer data breaches just like any other website. To mit ...more
You may not know what HTTP is exactly, but you definitely know that every single website you visit starts with it. Without the Hypertext Transfer Protocol, there'd be no easy way to view all the text, media, and data that you're able to see online. However, all communication b ...more
Hello and welcome to my article. I have made this article for anyone who wants to become a hacker, and wants to know how to get started. OVERVIEW: As you'll get further into the hacking community, and learn more about how it's all put together, you'll also realize very quick ...more
Welcome back, my greenhorn hackers! Earlier in this series, I showed a you a couple of different ways of fingerprinting webservers. Probably the easiest way, is to use netcat and connect to port 80 and pull the webserver banner. The banner is simply the application advertisi ...more
It's possible to stream a MacBook's entire computer screen without using Apple's Screen Sharing application and without opening any ports on the target device. A hacker with low user privileges on the backdoored Mac may be able to view a victim's every move in real time no mat ...more
Ahoy, landlubber! Next to vampires and werewolves, seafaring pirates are going to be the most popular costumes this Halloween. And luckily, you don't need to pillage or plunder in order to prove your scoundrel worthiness. All you really need is a good hat and a good eyeshadow ...more
This tutorial is for all fitted fanatics like me out there. I’ve been wearing fitted caps and snapbacks since I was in elementary school, and it has become a part of who I am. However, I also know that fitted caps and snapbacks are expensive, especially those from brand name c ...more
Something that always brings a tear to my eye is uninspired Instagram stories. When you have a bunch of like-minded friends, you end up with like-minded stories. While it may seem difficult to stand out, stickers were designed so that you can differentiate yourself from other ...more
Welcome back, my hacker novitiates! Finding vulnerabilities in systems can be one of the most time-consuming tasks for a hacker. There will be times, though, when you'll find yourself in a position that you know that a particular port represents a vulnerable application or se ...more
Once you've reached an age where sparklers are no longer fun, it's time to upgrade to science and steel wool. It may be basic chemistry, but as you'll see in the video, simplicity can amaze more than complexity, as well as create some really impressive fireworks that are perfe ...more
One of the first steps in reconnaissance is determining the open ports on a system. Nmap is widely considered the undisputed king of port scanning, but certain situations call for different tools. Metasploit makes it easy to conduct port scanning from directly inside the frame ...more
If you thought humans were reading your résumé, think again. Robots do, and their one solitary objective is to systematically crush the hopes and dreams of those who don't make the cut. Instead of paying a few humans to read thousands of résumés over a couple weeks, many compa ...more
Halloween is a night to dress up as any character you'd like—but for women, that typically means wearing something skimpy or downright absurd. From "sexy" policewomen to nearly undressed fairy tale princesses, we're surrounded by costumes that leave little to the imagination. ...more
There's no doubt you've heard the old saying, "When life gives you lemons, make lemonade." The phrase was penned in an obituary to a dwarf actor in 1915 by an anarchist named Elbert Hubbard, who lost his life five months later aboard the RMS Lusitania when it was torpedoed by ...more
Many people find Steampunk problematic for a whole host of reasons, not least of which is the glorification of an era of Western history that featured institutionalized slavery, racism, sexism, elitism, and many more -isms. Today, Steampunks frequently get accused of subtly o ...more
The world is full of vulnerable computers. As you learn how to interact with them, it will be both tempting and necessary to test out these newfound skills on a real target. To help you get to that goal, we have a deliberately vulnerable Raspberry Pi image designed for practic ...more
Kali Linux is the go-to Linux distribution for penetration testing and ethical hacking. Still, it's not recommended for day-to-day use, such as responding to emails, playing games, or checking Facebook. That's why it's better to run your Kali Linux system from a bootable USB d ...more
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server! Weekly Challenge: Week 2 Though Weekly Challenges are not required, they were created in order to help our builders on the server get out of that artistic ...more
There are countless ways in which you can turn your love of tech and coding into a full-fledged career — from developing apps and websites as a freelancer to working in the IT departments of small startups or major tech companies. But one of the best ways that you can put your ...more
This beautiful flower can be used as decoration on a hat, scarf, headband or purse. You name it. There are many uses. On the photo above, I added it to a hat. I have also used it as a decoration on a napkin ring. The flower is knit in three parts. Check out the instructions be ...more
The cutting-edge iPhone X, XS, XS Max, and XR have one-upped their Android competitors when it comes to facial recognition. Apple packed these flagships with an array of front-facing sensors to complement its selfie camera, which allows the new device to more accurately analyz ...more
Learn how to knit in the round using a fixed circular needle. Use this technique to knit sweater sleeves, hats, socks, and scarves. There are many way to knit in the round, but this video demonstrates how to knit a hat shaped form with a fixed circular knitting needle.
Whether or not The Purge franchise will be as successful as Friday the 13th, A Nightmare on Elm Street, Halloween, or even the Saw movies remains to be seen, but it's definitely winning in the Halloween costumes department. Don't Miss: Halloween Makeup Masks from Purge: Anar ...more
For the uninitiated, it can be difficult to buy that special hacker in your life a perfect holiday gift. That's why we've taken out the guesswork and curated a list of the top 20 most popular items our readers are buying. Whether you're buying a gift for a friend or have been ...more
Welcome back, my rookie hackers! In my ongoing attempts to familiarize aspiring hackers with Linux (nearly all hacking is done with Linux, and here's why every hacker should know and use it), I want to address a rather obscure, but powerful process. There is one super process ...more
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server! Weekly Challenge: Week 3 Though these Weekly Challenges are not required, they were created in order to help our builders on the server get out of any arti ...more
SSH is a powerful tool with more uses than simply logging into a server. This protocol, which stands for Secure Shell, provides X11 forwarding, port forwarding, secure file transfer, and more. Using SSH port forwarding on a compromised host with access to a restricted network ...more
One of the best new features in Android Oreo is the new Adaptive Icons system. Starting now, developers can create a single icon for their apps, then your launcher can stylize those icons in a broad range of shapes to match your system theme. Most home screen apps haven't adde ...more
Christmas is fast approaching and that means it's time for the big guy to come down our chimneys and eat up all of our cookies. Whether or not you believe in good ol' St. Nicholas, here's your chance to look like him! Santa Booth is an app available in the App Store as well as ...more
This instructional knitting video will show you how to knit a hat using a fixed circular needle and bulky weight yarn. These step by step knitting guidelines cover casting on, knitting in the round, decreasing, and weaving in the ends. If you are a beginner, you may want to av ...more
This how-to crochet video offers a simple pattern and instruction for stitching your own cute and easy crocheted hat. Knitted hats don't have to be for winter. While a cozy hat will protect you from the cold, a lighter yarn can add some style in warmer months as well. Check ou ...more
So much information exists online that it's easy to get lost in data while researching. Understanding the bigger picture can take a lot of time and energy, but narrowing the question to one that's easy to answer is the first step of any investigation. That's why analysts use o ...more
This video demonstrates how to make a loud and annoying paper popper. Prepare a regular sheet of paper and lay it down on the table or a flat surface. Fold the lower portion of the paper at about an inch and a half (1.5") or two inches (2"). Fold it the second time at about th ...more
Google's Pixel lineup hangs its hat on smooth software and a polished UI. At the core of this experience is the Pixel Launcher, a home screen app that is often imitated, but never perfectly duplicated. That is, until developer AmirZ released the latest version of his Rootless ...more
Hello fellow grey hat hackers, as hackers it becomes necessary for us to be able to send emails anonymously. Whether for whistle blowing or pranks or social engineering or whatever, it just is necessary for us to do that. So then I tried with python smtplib but then that requ ...more
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server! Friday is finally here, and that can only mean one thing... Weekly Staff Choice Awards! Although this was only the first week of the Choice Awards, we had s ...more
The holiday season is almost over, bringing the year to an end, and what better way to end it than with some tonsil hockey from the dime across the room on New Year's Eve? If you missed the opportunity to snag a kiss using the awesome mistletoe trick, then this is your last c ...more
Ah, butter—the (literally) heart-stopping star of the dairy world. Everything tastes better with it, from pie crusts and cookies to veggies and steaks. Hell, you can even fry things in butter if you want the best-tasting fried foods of your (short) life. Don't Miss: Compound ...more
This how-to crochet video offers a simple pattern and instruction for stitching your own cute and easy crocheted hat. Knitted hats don't have to be for winter. While a cozy hat will protect you from the cold, a lighter yarn can add some style in warmer months as well. Check ou ...more
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server! It's another Friday, which means it's time for the Weekly Staff Choice Awards. Last week's went great, with Gusse Fant's amazing Steam Fortress taking home ...more
While obvious, it's a lot more difficult to hack into a locked computer than an unlocked computer. As a white-hat hacker, pentester, cybersecurity specialist, or someone working in digital forensics, there's an easy solution — make it so that the computer won't fall asleep and ...more
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server! COMPETITION IS OVER COMPETITION IS OVER COMPETITION IS OVER As most of you already know, I'm iDwarf, the newest moderator on the WonderHowTo Minecraft serv ...more
Whether gabbing via cloud chat or Secret Chat, there's no denying that private messaging is one of Telegram's strengths. Communications can often occur at night, where Telegram's default bright white theme can be a bit uncomfortable to use, but Telegram supports dark mode on A ...more
This article is to all the newbies on here wanting to become a hacker. Since I have seen many newbie questions on here, I need to address this. Thank You: First thank you for wanting to become a hacker, it is not an easy path. Becoming a hacker, at least in the way that I s ...more
Using a strong password is critical to the security of your online accounts. However, according to Dashlane, US users hold an average of 130 different accounts. Memorizing strong passwords for that many accounts is impractical. Fortunately, password managers solve the problem. ...more
Welcome back, my aspiring hackers! In previous tutorials, I have shown you how to scan the globe for vulnerable servers and write simple scripts in BASH and Perl to perform other reconnaissance tasks. In a very recent guide, I taught how to scan vulnerable servers for Heartbl ...more
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server! I spent the entire day yesterday wandering through and getting incredibly lost in last week's maze creations for the Weekly Challenge. The crafted labyrinth ...more
Facial recognition software is being more widely used with every passing day. Your local law enforcement is probably already using it, and it will be even easier for them now that the FBI handed out its own facial recognition software to state authorities. Even the fine folks ...more
Some of us use our smartphones for almost everything. Manufacturers know this, so they try to make their devices as convenient as possible to use, but sometimes that convenience comes with a cost to security. The very same technology that allows you to easily share music with ...more