Minecraft Spawn Points

How To : Abuse Vulnerable Sudo Versions to Get Root

Anyone who has used Linux long enough is familiar with sudo. Short for superuser do (or substitute user do, depending on who you ask), it allows users to run commands as either root or another user on the system. From a hacker's point of view, sudo is often all that stands bet ...more

How To : Create Service Files with Systemd

Firstly let me start by giving credit to Lucid for their guide on Evilzone which inspired this idea, as well as the recent talk of anonymity on here. As the Archwiki states: Systemd is a system and service manager for Linux, compatible with SysV and LSB init scripts. systemd ...more

How To : Make an Automatic Minecart System in Minecraft

Summer is over and autumn is here. Serotonin levels are dropping and people don't have the motivation to be outside as much anymore. So we play Minecraft instead. But walking is cumbersome, so we want minecarts. Remembering to carry one in your inventory or placing one on the ...more

How To : Make the Simplest Invisible Door Ever in Minecraft

This design is super simple and is the easiest invisible door that I've ever seen. Unlike designs that use horizontal pistons, the redstone here is completely hidden underground, and the door itself doesn't create an unsightly dip or gap in the wall. Here's what the mechanism ...more

Minecraft Melodies : How to Recreate the Zelda Secret Chime

As I said before in my earlier post on how to make a two-tone doorbell, sound is more than just music. Note blocks can create a wide variety of notes and sounds, and those can be used for more than just making a stirring rendition of "Still Alive" from Portal. In this tutoria ...more

How To : Exploit Java Remote Method Invocation to Get Root

In the world of technology, there's often a trade-off between convenience and security. The Java Remote Method Invocation is a system where that trade-off is all too real. The ability for a program written in Java to communicate with another program remotely can greatly extend ...more

News : New Minecraft LEGOs for Displaying, Not Playing

Here at WonderHowTo, we've been following the Minecraft LEGO set for quite some time, through its development on LEGO CUUSOO (a LEGO site where users can submit ideas for LEGO sets) to its eventual implementation. Well, I finally got my hands on the finished set, and I have b ...more

How To : Find & Exploit SUID Binaries with SUID3NUM

File permissions can get tricky on Linux and can be a valuable avenue of attack during privilege escalation if things aren't configured correctly. SUID binaries can often be an easy path to root, but sifting through all of the defaults can be a massive waste of time. Luckily, ...more

Mac for Hackers : How to Install iTerm2 Using the Terminal

Now that we've talked about encryption and managing your passwords, let's continue this series on getting your Mac ready for hacking by turning our attention to the terminal. The terminal is a key component of any pentester's setup. We're going to be spending a lot of time wo ...more

News : The Coolest Tech to Come Out of CES 2016

There's been a whole lot going on at this year's Consumer Electronics Show, from the latest in virtual reality gear to televisions that continue to slim down while producing higher quality images. We've seen so many smart automobiles and appliances that it feels like pretty s ...more

How to : Scripting with Python - A Backup A Day..

Welcome, in this tutorial we shall we looking at creating a safe(r) way to back up your important files. The contents we will be covering are as follows; Creating a partition Updating the /etc/fstab file Mounting a file system with Python Copying the contents of a file system ...more

Next Page
  • Hot
  • Latest