Perform a He

How To : Hack SSL passwords with ARP poisoning

Are you serious about becoming a bonafide hacker? Then you simply must learn how to hack SSL passwords using ARP poisoning. ARP poisoning, also known as ARP spoofing, involves attacking an ethernet wireless network by looking at the data frames on a LAN (local area network). R ...more

How To : Build a Stealth Port Scanner with Scapy and Python

As we're all aware, recon is vital to a successful hack. We need to know everything we can about the target in order to perform the best possible attack. Port scanning is a basic recon concept that is introduced very early in learning proper reconnoissance. The issue with port ...more

News : 7 Must-Have Paid Apps for Android

Let's say you're flush with Google Opinion Rewards credits, or you just got a Google Play gift card for your birthday. This is a perfect opportunity to remove ads and unlock new features by upgrading some of your free apps to their paid counterparts, or to finally purchase tha ...more

How To : Use Dmitry Effectively.

Greetings comrades! Great leader has ordered that we gain intel on a website owned by the opposition. For all general purposes we will be scanning nmap.org because they really don't care if Big Brother decides to perform a whois on their IP. We will be using Dmitry for the sca ...more

How To : Jerk and do the "Dougie"

Lookin' to master a hot new dance move? Check out this tutorial and learn how to rock the Jerk and the Dougie. Both of these dances are fun to perform and will earn you a ton of street cred if you're good. So, why not check out this step by step clip and get on your feet!?

How To : Use & Customize the New Start Menu in Windows 10

The desktop Start menu is finally back! After receiving a lot of negative user feedback, Microsoft ditched the touchscreen-first approach of Windows 8 and went with a more traditional setup for mouse-and-keyboard users in Windows 10. Don't Miss: How Anyone (Even Pirates) Can ...more

How To : Enumerate MySQL Databases with Metasploit

It's been said time and time again: reconnaissance is perhaps the most critical phase of an attack. It's especially important when preparing an attack against a database since one wrong move can destroy every last bit of data, which usually isn't the desired outcome. Metasploi ...more

How To : Trace IP Addresses to a Location

Need help tracing an IP address to a location? Well, Tinkernut has a clear and effect way to help out. First, you'll need the URL of a website you desire to trace, in this case, YouTube (youtube.come) is used. After you've done that, you'll want to go to the Start menu (Windo ...more

How To : Split a telephone book with your hands in seconds

It seems impossible. Ripping one piece of paper is effortless. Ripping a small stack of papers takes a little force. But ripping a book? No way! Actually, it can be done, but only with a telephone book. This tutorial will show you how to rip a phonebook in half, quickly and ea ...more

How To : Use the Memory in the Windows Calculator

For the purpose of simplicity, we shall consider the Windows version to be used as Windows XP. How to start the calculator in Windows XP? Here are two ways to get there: Start -> All Programs -> Accessories -> Calculator Start -> Run -> calc This demonstration of the usage ...more

How To : Find & Exploit SUID Binaries with SUID3NUM

File permissions can get tricky on Linux and can be a valuable avenue of attack during privilege escalation if things aren't configured correctly. SUID binaries can often be an easy path to root, but sifting through all of the defaults can be a massive waste of time. Luckily, ...more

How To : Check for Out-of-Control App Permissions on Android

Android's permission system doles out access to certain system-level functions. Without it, our favorite apps wouldn't be able to perform their most basic operations. Picture a camera app that didn't have permission to access your camera sensor—now that wouldn't be much fun at ...more

Apple vs. LG : How Does the iPhone X Compare to the LG V30?

The highly anticipated iPhone X is finally up for preorder, and it's been almost as exciting as we expected. With the dual cameras, bezel-less display, and high-tech facial recognition, there's almost nothing on the iPhone X that won't be liked. But around the same time as the ...more

How To : Count Calories & Log Nutrition with Samsung Health

The most essential part of a healthy lifestyle is managing your diet — after all, what would be the point of a daily workout regimen if you were eating junk food? Thankfully, Samsung Health makes it easy to record your calorie and nutrient intake to get a clear picture of your ...more

How To : Take Control of Sonos IoT Devices with Python

Many popular IoT devices have terrible security. For instance, a hacker who's on the same Wi-Fi network as a Sonos speaker can assume direct control over the device's behavior. If an IoT device doesn't secure the messages used to control it over a network, it's easy for somebo ...more

PHP for Hackers : Part 1, Introduction and Setting Up

In this series you will learn how to use PHP to perform attacks, gather information, and setup backdoors. Along with performing attacks you will learn how to protect yourself from them. In this part you will learn about PHP as well as install Apache and PHP. What you'll need f ...more

How To : Unlock the Bootloader on the Essential PH-1

Although the Essential PH-1 got off to a rocky start, thanks to steady updates, it has slowly become one of the best Android phones to come out in recent years. For $499, the Essential Phone is a cheaper Pixel, receiving updates almost as soon as the Pixel lineup does. What's ...more

How To : Connect a Windows Mobile Device to a Computer

Connecting your new smartphone gadget to your desktop isn't just connecting these products with a USB cord. It is important to sync them to allow the transfer of data from your smartphone to your computer and vice-versa. This is desired if you wish to transfer information incl ...more

How To : Use a Volumetric Flask in the Chemistry Lab

Find out how everything in a chemistry lab works, from pipettes to burners to recrystallization to storage. You'll get precise instructions on how to work and perform certain scientific duties in the chem lab, whether it's chemical or just ordinary high school science. Watch ...more

How To : Do the "3 knife scaffold trick" and win bar bets

This video will show you how to perform a great bar trick/puzzle/proposition bet called the "Three Knife Scaffold". This trick is super easy, it just takes a bit of know-how. In this tutorial, learn how to place your knives in order to fool your friends and win any bets they m ...more

How To : Make TCPO (for making glow sticks)

How to make TCPO or bis(2,4,6-trichlorophenyl) oxalate, used in glow stick reactions. WARNING: This procedure should only be performed by, or under the direct supervision of, an experienced chemist. Please refer to the material safety data sheets of all chemicals for their ha ...more

How To : Make a quick and easy compass

This is an easy & simple way to make your home made compass using stuff that can be found in every home. You will need a magnet, a paper clip, a glass of water and a piece of paper. Check out this instructional science video to learn a a quick and easy method of making your ow ...more

  • Hot
  • Latest