How To : Make a spinning frog card
This video tutorial instructs how to make a fun spinning card to add a little extra flare to a basic card.
This video tutorial instructs how to make a fun spinning card to add a little extra flare to a basic card.
This spinning 3D greeting card may look complicated, but don't let that deter you from trying this card design out. A little hard work means a lot to those you will be giving the card to. This video will show you the steps to making this beautiful spinner card, which is a love ...more
Learn how to do the card spin trick. It is a fun thing to learn to go with the rest of your tricks.
Hand spinners who want to master long-draw drafting for woolen spinning need their fibers in a special form: carded rolags. Combed fiber won't do it -- neither will carded batts. This introduction shows you how to make carded rolags. Start by washing your fleece. ...more
Besside-ng is the hidden gem of the Aircrack-ng suite of Wi-Fi hacking tools. When run with a wireless network adapter capable of packet injection, Besside-ng can harvest WPA handshakes from any network with an active user — and crack WEP passwords outright. Unlike many tools, ...more
Place the card in the center tip of your middle finger. The card should balance on your finger and you can test this by wobbling the card on your finger left and right without it falling off of your finger. Try to spin the card with your other hand. If it falls off your finger ...more
Best card control ever ... !! Daryl's Hot Shot Cut. As seen on David Blaine series. This cut shoots a spinning card out of the deck.
Have you ever been away from home or on holiday and noticed an open network connection? FREE INTERNET! But then you find out that every search or page redirects you to an "enter password" or "signup here" page. Well, there are ways around this. In this article, I'll show you ...more
This how-to video shows how to make an owl spinner card out of paper. Learn how to make a designer art card with a spinning owl design.
This video tutorial is in the Computers & Programming category which will show you how to hack a wireless network with WEP encryption. This video is intended only as a means of testing the security of your own network. Go to Backtrack Linux, download the backtrack4 and burn it ...more
In this video we learn how to crack WPA using Back Track. The first step is the boot into Back Track using a VMware Virtual Machine Image. Next you need to open a shell console. In the console you will type "airmon-ng" and press enter. This does a check to find the wireless gu ...more
Ever since kernel 2.6.xx in Linux, a lot of the internet kernel modules for wireless interfaces ended up becoming broken when trying to use monitor mode. What happens commonly (to myself included) is a forced channel that your card sits on. No good! For users of airodump and t ...more
Welcome back, my apprentice hackers! As many of you know, I have been hesitant to adopt the new Kali hacking system from Offensive Security. This hesitancy has been based upon a number of bugs in the original release back in March of 2013 and my belief that BackTrack was easi ...more
Due to weaknesses in the way Wi-Fi works, it's extremely easy to disrupt most Wi-Fi networks using tools that forge deauthentication packets. The ease with which these common tools can jam networks is only matched by how simple they are to detect for anyone listening for them. ...more
To hack a Wi-Fi network, you need your wireless card to support monitor mode and packet injection. Not all wireless cards can do this, but you can quickly test one you already own for compatibility, and you can verify that the chipset inside an adapter you're thinking of purch ...more
Welcome back, my fledgling hackers! In the first part of my series on Wi-Fi hacking, we discussed the basic terms and technologies associated with Wi-Fi. Now that you have a firm grip on what Wi-Fi is exactly and how it works, we can start diving into more advance topics on h ...more
Welcome back, my greenhorn hackers! Now that we're familiar with the technologies, terminology, and the aircrack-ng suite, we can finally start hacking Wi-Fi. Our first task will be to creating an evil twin access point. Many new hackers are anxious to crack Wi-Fi passwords t ...more
What if you could easily visualize which access point every Wi-Fi device nearby is connected to in a matter of seconds? While programs like Airodump-ng can intercept this wireless information, making it easy for hackers to use and understand is another challenge. Fortunately, ...more
Welcome back, my neophyte hackers! I have already done a few tutorials on password cracking, including ones for Linux and Windows, WEP and WPA2, and even online passwords using THC Hydra. Now, I thought it might be worthwhile to begin a series on password cracking in general. ...more
After finding and monitoring nearby wireless access points and devices connected to them, hackers can use this information to bypass some types of security, like the kind used for Wi-Fi hotspots in coffee shops, hotels, and in flights high above the ground. By swapping their M ...more
While the security behind WEP networks was broken in 2005, modern tools have made cracking them incredibly simple. In densely populated areas, WEP networks can be found in surprising and important places to this day, and they can be cracked in a matter of minutes. We'll show y ...more
This is my first how-to for this site so feel free to let me know if I can somehow improve! Inspired by the great Jailbroken iDevice and Rooted Android PenTesting tutorials I decided to share how I use my Toshiba Chromebook 2 with Kali Sana. Chromebooks have a couple of bene ...more
Wi-Fi devices are continually emitting "probe frames," calling out for nearby Wi-Fi networks to connect to. Beyond being a privacy risk, probe frames can also be used to track or take over the data connection of nearby devices. We'll explain how to see nearby devices emitting ...more
In 2019, the Raspberry Pi 4 was released with specs including either 1 GB, 2 GB, or 4 GB of memory, a Broadcom BCM2711B0 quad-core A72 SoC, a USB Type-C power supply, and dual Micro-HDMI outputs. Performance and hardware changes aside, the Pi 4 Model B runs Kali Linux just as ...more
If you want to carry a variety of network adapters without looking suspicious, a perfect solution is accessing them through Airserv-ng. Tucked away in the Aircrack-ng suite, this tool allows a hacker to plug any number of network adapters into a Raspberry Pi and access them ov ...more
Welcome back, my hacker apprentices! My recent posts here in Null Byte have been very technical in nature, so I thought that I'd have a little fun with this one. Have you ever had an annoying neighbor whose dog barks all night, who has loud parties that keep you awake, or who ...more
Wi-Fi networks come in two flavors: the more common 2.4 GHz used by most routers and IoT devices, and the 5 GHz one offered as an alternative by newer routers. While it can be frustrating to attack a device that moves out of reach to a 5 GHz Wi-Fi network, we can use an Alfa d ...more
Pyrit is one of the most powerful WPA/WPA2 cracking tools in a hacker's arsenal, with the ability to benchmark a computer's CPU speeds, analyze capture files for crackable handshakes, and even tap into GPU password-cracking power. To demonstrate how quickly it can hack a WPA/W ...more
If you've ever wanted to track down the source of a Wi-Fi transmission, doing so can be relatively easy with the right equipment. Using a directional Wi-Fi antenna and Wireshark, we can create a display filter to target any device in range to plot the signal strength on a gra ...more
Welcome back, my budding hackers. So many of you are interested in hacking Wi-Fi that I have decided to revisit my Wi-Fi Hacking series with some updated and more in-depth material. I strongly suggest that you look at some of my earlier posts, such as "Getting Started with Te ...more
You may have heard of a signal jammer before, which usually refers to a device that blasts out a strong enough radio signal to drown out the reception of nearby devices like cell phones. Purpose-built jammer hardware is outright illegal in many countries. Still, Wi-Fi is vulne ...more
Your home has walls for privacy, but Wi-Fi signals passing through them and can be detected up to a mile away with a directional Wi-Fi antenna and a direct line of sight. An amazing amount of information can be learned from this data, including when residents come and go, the ...more
Welcome back, my neophyte hackers! Have you ever had a neighbor that you're certain is up to no good? Maybe you've seen him moving packages in and out at all hours of the night? Maybe you've seen people go into his home and never come out? He seems like a creep and sometimes ...more
Determining the antivirus and firewall software installed on a Windows computer is crucial to an attacker preparing to create a targeted stager or payload. With covert deep packet inspection, that information is easily identified. This attack assumes the Wi-Fi password to the ...more
When learning Wi-Fi hacking, picking a compatible Wi-Fi network adapter is the first step to learning to crack Wi-Fi passwords. Many compatible adapters have swappable antennas, and there are several different kinds of specialized antennas you can add to a network adapter to ...more
Design flaws in many routers can allow hackers to steal Wi-Fi credentials, even if WPA or WPA2 encryption is used with a strong password. While this tactic used to take up to 8 hours, the newer WPS Pixie-Dust attack can crack networks in seconds. To do this, a modern wireless ...more
The Raspberry Pi Zero W and Pi 3 Model B+ include integrated Wi-Fi, Bluetooth Low Energy, and more than enough power to run Kali Linux. They sound like perfect all-in-one penetration testing devices, but the lack of support for monitor mode and packet injection usually meant b ...more
Welcome back, my nascent hackers! In previous tutorials for my Wi-Fi Hacking series, I have shown you how to crack WEP and WPA2 passwords, break a WPS PIN, and create Evil Twin and Rogue access points. In this continuation of the series, let's look at slightly different appro ...more
While the USB Rubber Ducky is well known by hackers as a tool for quick in-person keystroke injection attacks, one of the original uses for it was automation. In this guide, I'll be going the latter, explaining how we can use it to automate Wi-Fi handshake harvesting on the Ra ...more
It's common for IoT devices like Wi-Fi security cameras to host a website for controlling or configuring the camera that uses HTTP instead of the more secure HTTPS. This means anyone with the network password can see traffic to and from the camera, allowing a hacker to interce ...more
An internet connection has become a basic necessity in our modern lives. Wireless hotspots (commonly known as Wi-Fi) can be found everywhere! If you have a PC with a wireless network card, then you must have seen many networks around you. Sadly, most of these networks are sec ...more
There are many tools out there for Wi-Fi hacking, but few are as integrated and well-rounded as Bettercap. Thanks to an impressively simple interface that works even over SSH, it's easy to access many of the most powerful Wi-Fi attacks available from anywhere. To capture hands ...more
The Raspberry Pi is a credit card-sized computer that can crack Wi-Fi, clone key cards, break into laptops, and even clone an existing Wi-Fi network to trick users into connecting to the Pi instead. It can jam Wi-Fi for blocks, track cell phones, listen in on police scanners, ...more
Card flourishes are more of an art form, not really necessary for your magic card tricks and illusions, but really cool to impress your friends. Watch this video tutorial to learn how to perform a fan spin card flourish, which shows you how to fan a deck of playing cards and h ...more
Learn how to spin a card on your finger.This can be a nice touch to a magic trick or routine.
A brief video tutorial on how to spin a card in one hand using your pointer finger to spin it.
Nice trick for spicing up you magic act. Watch as the demonstrator shows you the spin and then how to do it.
Scam School host Brian Brushwood demonstrates how to convert a standard playing card into a weapon. By perfecting your release and giving a specific spin, you'll be able to burst a water balloon halfway across the room.
This kid has great instincts for teaching magic or card tricks as he instructs with multiple camera angles the best methods for shooting cards in the air. He also has different finger and grip techniques for multiple cards and different spins.
Learn how to perform a few basic card flourishes such as the card spin, the dribble, and the corner spring. I slowed down the flourishes so people can follow along and learn.
In order to make the Spinner Pinwheel Card with your Cricut, you will need the follow: the Cricut Wild Card cartridge, card stock, ribbon, brads, printed/patterned paper, adhesive, and an ink pad. Go to page 51 on your manual. Place your cartridge in your Cricut. Load the pap ...more
Need a new card trick? Learn how to magically make a card levitate above your hand and spin around in circles like a hummingbird. This trick takes a little set up time but the pay off will be well worth it. Float and spin a card in mid air and impress all onlookers. Perform th ...more
Make this cute baby card, demonstrated using CTMH products. The suspended circle can be wound up, so when the recipient takes it out of the envelope, it will spin. Watch this video card-making tutorial and learn how to craft a suspension style greeting card.
This greeting card tutorial video will give you tips on how to make a greeting card that spins and shows various images in its little window. This is a take on the old view master toys that children used to play with. Your friends and family will definitely think this greeting ...more
Learn how to shuffle cards from one hand to another, make a car spin on your finger, or make a card jump from the deck to your hand. These simple tricks are easy to learn and will definitely impress your audience. Perform multiple card tricks. Click through to watch this video ...more
Learn how to transform your greetings with funky needle-felted motifs. Corinne Bradd shows Kristy Clark how to put a contemporary spin on this traditional craft, with charming shapes and clever techniques.
In this video, you will learn the best way to throw cards. This takes practice, as many people who first try to throw card do not have the right grip. In order to throw the card properly, you will need to place your thumb on the center of the top side and the index finger on t ...more
Shelley Lovett shows how to teach kids a spin on the "Ten Little Indians" song. that she calls "Ten Little Penguins." She has a simple prop to make the song more fun for young kids. She has a pair of black gloves to which she has glued a little card-stock penguin to each finge ...more
The Tesla CD Turbine is a little homemade turbine made from CD's, CD spindle, supermagnets, and glue. It runs on faucet water pressure. This movie demonstrates the total over-use of technology in using the Tesla CD Turbine as a Decision Maker to help decide what to do during ...more
I have had a lot of people ask me, "How does my neighbor keep getting into my wireless?!". Chances are, these people are all using WEP, a deprecated wireless encryption protocol. Either that, or you are using one weak WPA passphrase. If someone can access your wireless networ ...more