In my first tutorial on Linux basics, I discussed the importance of hackers using Linux and the structure of the directory system. We also looked briefly at the cd command. In this second Linux guide, I'll spend a bit more time with changing directories, listing directories, c ...more
NOTICE: Ciuffy will be answering questions related to my articles on my behalf as I am very busy. Hope You Have Fun !!! Hello Guys, Welcome to my tutorial and in this tutorial, We are basically going to create a python script that serves as a proxy server ( Without External ...more
Bitcoin is a new currency built off "Satoshi Nakamoto's" (alias) 2008 Bitcoin white-paper. Bitcoin provides its users with a way to make peer-to-peer (P2P) transactions without having to use a bank as a mediator. There is no middle man, no corporation backing it, and no one ha ...more
Welcome back, my fellow hackerians! Today we'll be hacking Facebook profiles on your local network. You may think, "How is this useful, nobody but me is using my network." Well, you can use this on other Wi-Fi networks that are available for free (like at Starbucks) and crack ...more
Ikebana, the Japanese art of flower arrangement, dates back to over 500 years ago and is still practiced as a highly respected cultural art form in modern-day Japan. Unlike conventional flower arrangements, which emphasizes the color and bloom of different flowers set in a va ...more
When it comes to cybersecurity, one layer isn't enough. A complex password (or one created with a password manager) does a good job of protecting your data, but it can still be cracked. Two-factor authentication strengthens this by adding a second layer of security, giving you ...more
In our first part on software-defined radio and signals intelligence, we learned how to set up a radio listening station to find and decode hidden radio signals — just like the hackers who triggered the emergency siren system in Dallas, Texas, probably did. Now that we can hea ...more
Wow, naked + batman + tattoo/body painting = some pretty "out-there" art... Korean artist Kim Joon has been fascinated with tattoo culture ever since his days in the military as a young man. Since, he has taken his obsession into the fine arts realm, treating the human body l ...more
Hey, coffee drinkers—your morning cup of joe is killing your metabolism. If you count on coffee to jump-start your day and your diet, you might want to think twice. Swapping a hearty breakfast for a cup of coffee does your body more harm than good. Although caffeine suppresse ...more
When hacking Wi-Fi networks, having the right wireless adapter is essential. But hunting online for one can be a frustrating experience. To see how the handful of Kali-compatible adapters on the market measure up, I ran a series of tests to benchmark and compare their range, s ...more
Have you ever looked at a piece of fruit and thought to yourself, "you suck, fruit, sitting there all smug and happy, I wish I could just destroy you here and now?" If so, read on—your favorite Fat-man is going to show you how you can get your revenge on that happy smug fruit ...more
To steal a quote from Mean Girls, Halloween is the one night when a girl can dress like a total slut and no one can say anything about it—but why do girls get to have all the fun? Why can't guys use the day to be good looking? Scary good looking? Well, use one of the followin ...more
The new iOS 14 for iPhone arrived Wednesday, Sept. 15, 2020, alongside iPadOS 14, and there are a lot of features to uncover. Improved widgets. Better home screen customization. Exciting Messages improvements. New abilities in Camera and Photos. There's so much here that it'll ...more
It's been a while when the major web browsers first introduced HTTP Strict Transport Security, which made it more difficult to carry Man In The Middle (MITM) attacks (except IE, as always, which will support HSTS since Windows 10, surprised?). SSLStrip and the HSTS Chronicles ...more
If you love Iron Man 2 and wish you could have his gadgets or want to have a cool costume for Halloween, you too, can be Iron Man once you're done watching this video. This tutorial will walk you through the steps needed to convert household materials and inexpensive items you ...more
If you're looking for some manscaping tips, this how-to video is for you. Learn the tips and tricks to go smooth down there and impress the ladies. Be careful, follow the steps and you too can trim the grass and make the tree look larger. So if you want to shave your private p ...more
Fondant looks pretty, but man, it sure does taste weird. Don't Miss: How to Frost Your Cake Like a Pro If you've ever slaved over decorating a cake with fondant, you know how disappointing it is to watch people peel it off and only eat the cake. You can avoid this by skippi ...more
Despite a rocky start with plenty of feature disparity, the Google Assistant now provides a pretty consistent experience regardless of what device you're using it on. Be it Android, iPhone, or Google Home, the AI behind the Assistant is virtually identical — including its quir ...more
Security awareness seems to be a hot topic these days on the web, with developers making apps and devices that can hack networks and machines with just a few clicks. But these applications aren't only exploiting security flaws in systems and networks, they're being used by ama ...more
Welcome back, my nascent Hackers! In my last blog, we looked at a passive way to gather information necessary for a hack. The advantage of using passive recon is that it's totally undetectable, meaning that the target never knows you're scouting them and you leave no tracks. ...more
While iOS 11.3 doesn't have as many new features as iOS 11.2, there's still a lot to love about Apple's latest update for iPad, iPhone, and iPod touch, even if some of the best features we were expecting didn't make the cut. Apple released the iOS 11.3 beta on Jan. 24, and ju ...more
Wolverine (AKA Hugh Jackman) looks so deliciously perfect in his spiked out hair and scruff that women all over want to be with him and guys want to look like him. While his rock-hard abs, perky derriere, and sculpted biceps take months of hard work to achieve, you can get his ...more
There are so many things in life I wish I could've canceled without any repercussions, and I'm mostly talking about text messages. But nothing is more annoying than cancellation fees. Booking a hotel in advance is usually a good way to save some money and make sure all things ...more
Does executing a perfectly timed, no-scoped headshot, followed by a well-choreographed teabagging ever get old? No, no it doesn't, and neither do custom emblems for Call of Duty: Black Ops 2. How else are we going to kill time until Black Ops 3 arrives? I've already covered m ...more
Apple just released its biggest update to iOS 17 yet, and there are 60 exciting new changes for your iPhone. With iOS 17.2, you get a brand new app, more Apple Music enhancements, upgrades in Messages, and a new security feature that was announced last year, as well as changes ...more
All day I dream of eggs: scrambled, poached, over easy, hard-boiled, fried, baked, raw... Okay, the last one is a joke (unless you're Gaston, which means that you eat five dozen of them and you're roughly the size of a barge). But eggs are freaking good in just about any cooki ...more
Facebook may connect millions of its users to each other with its messenger service, but it can also make it very difficult to avoid those annoying "friends." The problem is, when you use the default Facebook Messenger app, you get the added bonus of a timestamp added to mess ...more
Smartphones and laptops are constantly sending Wi-Fi radio signals, and many of these signals can be used to track us. In this guide, we'll program a cheap IoT device in Arduino to create hundreds of fake networks with common names; This will cause nearby devices to reveal the ...more
YouTube illusionist Brusspup has used everything from mirrors to fire to create his optical illusions, but his latest trick is a little more 2D. Using a printer, a transparency sheet and a piece of regular paper, he made several illusions that trick your brain into thinking th ...more
Welcome back, my budding hackers! As you know, I firmly believe that to be a true professional hacker, you need to be proficient in Linux. This is for a number of good reasons. Most hacker tools are developed in Linux (well over 90 percent). Linux offers us greater granulari ...more
It's almost time for Halloween, which means that it's time for the nastiest-looking food and drink to make its appearance. Severed fingers, brains, vomit... everything that would normally make our stomachs turn at any other time of year makes us cackle with glee instead on Hal ...more
Minecraft is not just a game. It is a creative tool. Over the past year and a half countless epic builds, servers, and community projects have been undertaken. I'm sure some of you have seen the one-to-one scale recreation of the Starship Enterprise from Star Trek or the epic ...more
No matter what word game you're playing, whether it's Scrabble or one of its near-homogeneous counterparts like Lexulous, Wordfeud or Words with Friends, one of the easiest ways to stay on top of your opponent is knowing all of the legal two-letter words you can play. You're n ...more
Networking is built largely on trust. Most devices do not verify that another device is what it identifies itself to be, so long as it functions as expected. In the case of a man-in-the-middle attack, we can abuse this trust by impersonating a wireless access point, allowing u ...more
First off, don't be frustrated. YOU CAN DO IT! Contrary to the message in the image above, it's NOT over. It's just beginning. And when it comes to solving the New York Times crossword puzzle, the old cliche does apply: practice makes perfect. I've read quite a few books and ...more
You may remember string art from your elementary school days. If so, it probably makes you think of the 2D geometrical designs that took every ounce of patience you had as a kid. Or those laborious curve stitch drawings, which string art was actually birthed from. But thanks t ...more
If you're interested in nabbing superhero memory strength, the secret behind training your brain is not necessarily what you might expect. Your standard G-rated brain strengthening exercises range from crossword puzzles to Sudoku to calculating fairly simple math problems to i ...more
Whether you've celebrated multiple cake days or you're just now getting your feet wet with Reddit, it's a rite of passage to choose your preferred smartphone client. Quick spoiler: Your best option most certainly is not the official Reddit app. Reddit's mobile site is pretty ...more
Hello, all. In this article, I will be showing you how to make one of the most useful products known to man. I am talking, of course, about charcoal. You might be surprised at just how many uses this stuff has. You can use it to purify your drinking water, replace your aquari ...more
The pubic area is a very, very tricky area, when trying to shave and so in this video, Dan and Jennifer from Ask Dan and Jennifer try to supply some useful tips and tricks for this delicate operation. First, you need the proper tools. These include, Dan and Jennifer say, a goo ...more
Hello fellows nullbyters, first of i will start saying that im addicted to this community, i feel the challenge growing up so fast, all the newbies, amateurs,advanced and professionals hackers around trying their best to help the community, badly but we got some script-kids to ...more
With only a few days left until Halloween, your options might be rather limited if you still don't have a costume. You may have laughed while some people spent the entire month of October painstakingly crafting their ridiculously detailed costumes, but now that the big day is ...more
Man-in-the-Middle attacks can prove to be very useful, they allow us to do many things, such as monitoring, injection, and recon. What Is a Man-in-the-Middle Attack? Essentially, a man-in-the-middle attack is when an attacker places them self between two parties. This passes ...more
A man-in-the-middle attack, or MitM attack, is when a hacker gets on a network and forces all nearby devices to connect to their machine directly. This lets them spy on traffic and even modify certain things. Bettercap is one tool that can be used for these types of MitM attac ...more
Welcome back, my neophyte hackers! Many newbie hackers seem to be confused regarding the process or methodology to employ a successful hack. Most want to simply go straight to the exploit without doing the due diligence to make certain that the hack will work and you won't ge ...more
Every year, some overly ambitious neighbor down the street amazes the crowds with his DIY illusion costume. While these costumes certainly require more work than pulling a mask over your head, they do have that wow factor that others lack. These costumes illicit lots of doubl ...more
Using Cain & Able and a host booter, you can kick someone off of Xbox Live. If you are annoyed with another player, this is how you take their ball and throw it into the scary old man neighbor's yard.
Welcome back, my budding hackers! I began this series on Linux basics because several of you have expressed befuddlement at working with BackTrack on Linux. As a hacker, there is no substitute for Linux skills. Linux beginners are often faced with the issue of how to find fi ...more
Coinhive, a JavaScript cryptocurrency miner, was reportedly discovered on the BlackBerry Mobile website. It was placed there by hackers who exploited a vulnerability in the site's e-commerce software that allowed them to anonymously mine cryptocurrency every time the website w ...more
If you're dressing up as someone iconic for Halloween, having the right voice can make or break your costume. Think about it—having a Darth Vader lookalike walk up to you and start talking like Alvin the Chipmunk would probably ruin the effect (and possibly be a little creepy) ...more
General Motors acquired Cruise Automation in March 2016 for a reported $1 billion (well, at least $581 million). GM President Dan Ammann made a point of being in the press release photograph with Cruise founders Kyle Vogt and Daniel Kan (see photo below). On January 19, 2017, ...more
The game has undergone many transitions over the years, since its days as LEXIKO (1931) to its briefness as CRISS CROSS WORDS to its current and amalgamated, renowned brand of SCRABBLE. There has been many editions of the word board game along that historic metamorphosis, and ...more
Playing along with your favorite songs is an enjoyable, and highly effective, way of developing your playing technique. In this four-part piano tutorial, you'll learn how to play Billy Joel's "Piano Man." While the lesson is geared toward players of an intermediate skill level ...more
Come December we apparently are finally going to have a new Dr. Dre album, and he claims it will be his last. Show your respect for arguably the most important man in hip-hop by learning how to play his 1999 hit "Still D.R.E." on piano, and represent for the gangstas all acros ...more
If you've ever seen Goldfinger you've probably wondered when we're going to get access to lasers that could cut a man in half. This might be it. Watch on to learn how you can, with some electrical engineering skills, make a DIY blue death ray laser gun that will cut through al ...more
After enabling disk encryption, creating encrypted disk images, installing KeePassX and iTerm2, and using Git with local repositories, the next step to getting your Mac computer ready for hacking is setting up a package manager that can install and update open-source hacking t ...more
Now that we've talked about encryption and managing your passwords, let's continue this series on getting your Mac ready for hacking by turning our attention to the terminal. The terminal is a key component of any pentester's setup. We're going to be spending a lot of time wo ...more
UK-based artist Matthew Nicholson is a man of many talents: designer, photographer, professional free runner and papercraft engineer—and in the latter of which, he generously posts free downloadable DIY kits for your folding pleasure. The only template currently available is ...more
Who here binges TV on a regular basis? I know I do. Never before have we had so many options for watching our favorite shows, especially when you consider how easy it is to stream from anywhere on a mobile device. But sometimes, all that choice gets a little overwhelming. What ...more
Video: . The Walls is a PvP survival map that takes back Minecraft to it's roots: crafting, surviving and creativity. The map is separated by giant sand walls, players start each on their own platforms and when the timer reach 00:00, the walls falls and the player can kill ea ...more