Hi, everyone! I've started to study some Kali Linux attacks on my own network for educational purposes. I went down that road learning step by step as I advance in the attack, starting by gathering the WiFi Password (breaking the handshake using aircrack-ng).
So I got myself one of those Alexa Echo dot thingies, a handful of MiMoo smart WiFi switches, a projector and motorised screen, you thinking what I'm thinking? Good! Cos I don't have much of a clue and could really use some help!
This Subjects Really interest me and I Want to know how I would go about doing it. I know that it's not easy but I want to learn. At this moment I'm kind of a script kiddy and I want to improve my hacking skills. Please help me
I recently fixed my old alarm i bought for a couple bucks, just for fun, but now i can't remember the alarm code... how do i reset it?
Hi, I've installed kali linux on an virtualBox virtual machine an tried no
Hi is there is anything to get the right WPS pin for the router I already try in 2 networks 10k pins by GOYscript WPS in wifislax 4.12 but none of these pins was correct any ideas ?
So I ripped a microphone and controller out of a pair of Skull Candy inkd's, and I want to fit the mic to a transmitter inside a wide bodied pen. The pen doesn't have to work (the ink cartridge bust anyway), but I have no idea about how to power the mic. Any ideas?
I am going to teach you something illegal but only for educational propose. This only demonstrates how you can copy files from your friend's PC as soon as you plug in your flash drive or any removable storage media.
Hi everyone, I'm looking to attach a spy microphone to leopard radiocollars and have it record continuously for 1 month.
In the 1940's (1946/1947) Popular Science magazine printed a DIY diagram of a high impedance microphone using an old battery carbon core and a headphone to listen (rather than speakers). It used a simple wood base and was very sensitive; you could hear a cock-a-roach walking on the wood or a fly's buzz if it landed on the base. ANYONE WHO MIGHT HAVE A COLLECTION OF THESE MAGAZINES AND CAN PROVIDE A COPY OF THE DIAGRAM WOULD GREATLY HELP ME WITH MY PROJECT.
So to do this i got a nerf gun and a micro servo controller then i mounted a servo on the nerf gun trigger.
Video says it all:
Which steps i have to follow to mod a game?
Can anyone tell which is the best Raspberry Pi 3 Starter Kit? Canakit or Vilros?
i just moved to a new area and there many wpa2 WiFi l. please I want you to help me hack so I have internet in the meantime.
i am a complete beginner in hacking. so before starting any of the hacking i thought i should learn to save/hide my ass from police, government, or any other tracing agents or agencies. so i started crawling on web for learning new tricks and techniques as black hat hackers use. since then i found many new technique so far but now a days i am getting stuff in opposition to my knowledge as:
Arduino Mix Machine is a prototype for liquids automatic mixing. Preset with various recipes of the most famous bar cocktails, it became a real cocktail machine.
Phone Hacking Prevention Phone hacking has now become one of the most concerned issue around the globe when it comes to staying secured online. Though mostly people don't bat an eye upon it, in reality, if you're not careful about your online security, you're likely to lose your valuable data through cyber crime and hacking. How to prevent your phone from being Hacked - Hacking-Guide.com.
I have an old USB YOTA dongle I dont use anymore, what can I do with it?
I'm new here, and to be honest I'm about as rookie as a programmer can get. I only know HTML5 yet (the millions of drag and drop programs I used to do when I was a kid don't count because... well, they're drag and drop, Bro. neither does any WYSIWYG programs.) Point being the only official language I know Is HTML5 so I'm nowhere even close to being a hacker, the only thing I can do yet is pinging. Anyway. I read this book "Don't Turn Around" in part about a group of hacktavists getting caught...
In this video we will use an Arduino Yun (or leonardo with a wifi shield) to check your email account (or chosen label) and return the number of unread emails as an integer to be used in another project or (in this case) to make an email checking clock. This is a good one for anyone just beginning with the internet of Arduino.
I am looking for some guidance to do so.
Hi, I Need Some Help! I Tried to crack My own FB Profile, with Python Mechanics, Fb Python Py. And a Passwordlist. I'm running a Linux Ubuntu System. The wordlist seems to work Fine, at the end I will get the Message Password Found. But I Cant See Any Password. Is This a Script Failure or Linux Secruity? How Can I Unshadow the Password that Has Already been found? Thanks in Advance!
I want to use my iphone to capture wifi handshakes and upload it to my kali. Is that possible?
Hi. I have a car I just purchased that has an installed Motorola analog phone. Would love to get this to work and convert it to digital. Does anyone have any guidance or contacts for someone who does this. I live in so cal.
My 1st day here hope this is the rite forum to ask. i want to make a robot, with and old working i3 laptop and android tablet. can anyone help me in this.
Hello guys! :) How do i make my own mask? :s
i tried several ways ..... if some one know that a way of getting some amount of electricity from the charging jack or from the audio out put please tell
Merely for proof of concept of course :) I am looking to replicate the functionality of the 'CtOS' Program in the computer game Watchdog, where the telescopic/retractable bollard can be hacked and retracted/made to retract.
In this video i am showing you how to make a Taser Gun out of a bug zapper ! Video: .
Step 1: Take a 9 Volt Battery They are the square battery with two holes
I would like to start programming or hacking and a friend of my suggested that I start with php. I know that it has something to do with servers, the book I have is called "PHP for the web", by larry ullman and
please help me ,give some options for wifi router..........
Can We Regenerate Bad Sector Faulty Hard Disk, is it true or fake