Yahoo India Web Search

Search results

  1. Jan 27, 2012 · But if that isn't an option, here's how to make it: Fill a jar with water. Add a tablespoon of salt to the water. Wrap separate wires around the positive and negative ends of the 9v battery. Stick both wires in the water and see which one makes more bubbles. Take the wire that makes more bubbles and wrap the exposed part to something metal ...

  2. Aug 28, 2014 · Well, let's find out. #1. Good Wi-Fi Hacking Software. Before we address the hardware necessary to hack wireless networks, let me once again recommend the Aircrack-ng suite of hacking tools. Nothing else in our open-source world quite compares to the power and versatility of Aircrack-ng. #2.

  3. Feb 22, 2016 · Hello again, folks! I'm back with another (final) guide on runtime crypters which is an extension on my previous runtime crypter guide. If you have not read it yet, I highly recommend that you do since the fundamental theory of the PE format. Again, this will be a Windows-specific guide, so I'll repeat this: If you're a hater and cringe at the slightest sound of Microsoft's grotesque baby, feel free to close this tab, delete your history, exit your browser, pour some oil onto your machine and...

  4. May 9, 2013 · Welcome back, my hacker novitiates! Many of you have written me that you're having difficulty installing and running Metasploit on a variety of platforms. No matter if you're using Mac, Linux, or Windows, I strongly recommend you install BackTrack as your secondary OS, a virtaulization system, or on an external drive. This particular Linux distribution has many hacking and security tools integrated—including Metasploit.

  5. Jun 19, 2012 · This command is used to make the computer speak to the user audibly. The basic use of this is as follows: say "Hello World". This command would make the computer say "Hello World" using the default voice. However, this can be changed to another voice. You do this by adding "Using "Voice"" to the end of the script.

  6. Jan 29, 2012 · Otherwise, use a friend's PC or that of a family member. Step 1 (A): If you are using a DVD, run IMGBurn and insert a blank DVD into your DVD tray. Select "Write image file to disc". Under "Source", select the downloaded Linux ISO image, select "write speed x2". (I found it to be the optimal speed for bootable DVDs.

  7. Nov 4, 2016 · As pentesters and hackers, we're going to be working with text frequently — wordlists, configuration files, etc. A lot of this we'll be doing on our machine, where we have access to whatever editor we prefer. The rest of it will be on remote machines, where the tools for editing will be limited. If nano is installed, we have an easy-to-use terminal text editor, but it isn't very powerful.

  8. Jul 13, 2015 · Step 3: The Real Code - Repeat. This is the same thing as the NoRepeat except it repeats...lol so a lot more words in your dictionary file hence a better chance of finding the password. Image via tinypic.com.

  9. Sep 14, 2018 · Save the file as example-script.nse and copy it to the /usr/share/nmap/scripts directory. We can keep it simple and just use localhost to test our script against. We also need to pass in a port, so run service apache2 restart in the terminal to ensure the web server is running, and we can now use port 80.

  10. Feb 20, 2015 · Next, exploit the system and get the meterpreter. In this case, I have exploited an unpatched 2003 Server (there are millions of them still around and support has just ended, so they will no longer be receiving patches). Rather than me repeat here how to exploit a system, please check out my past Metasploit tutorials.