Detect Your Friend's Devices with a NodeMCU MAC Address Sniffer [Tutorial]

How to Set Up a Friend Detector That Tracks Friendly Devices Full Tutorial: Subscribe to Null Byte: https://goo.gl/J6wEnH Kody’s Twitter: https://twitter.com/KodyKinzie MAC address randomization is a feature new smartphones have to help prevent tracking by third parties. However, it’s a fairly easy to defeat. Today, we’ll show you how to detect the signals smartphones use to connect to Wi-Fi networks via an ESP8266 NodeMCU and Friend Detector on this episode of Cyber Weapons Lab. Materials Needed: – NodeMCU: https:// – Breadboard: https:// – LED: https://

Continue reading “Detect Your Friend's Devices with a NodeMCU MAC Address Sniffer [Tutorial]”

It's only fair to share...Tweet about this on TwitterShare on FacebookShare on TumblrShare on Google+Digg thisShare on LinkedInPin on PinterestShare on VKShare on RedditPrint this pageEmail this to someone
Flattr the authorShare on StumbleUponShare on YummlyBuffer this page

FOUND HACKER CAUGHT ON CAMERA in HAUNTED ABANDONED TOWN (Exploring Crime Scene Mystery)

We found hacker footage with the help of your comments! â-¶ Watch Vy’s video with secret tape https://youtu.be/mQ8IxnKPTl0 â-¶ CWC Shirts & Backpacks – â-¶ Play CHAD’s Video Game Free https://qkq5h.app.goo.gl/chad After Vy Qwaint and I FOUND HACKER & MONSTER IN POND vs SPY GADGETS & NINJA WEAPONS MYSTERY BOX Challenge Unboxing Haul, we read you ninjas YouTube comments to solve clues, solve puzzles and crack codes to help figure out this hacker conspiracy theory. You decide that we watch our videos, like our FOUND $10,000 MYSTERY BOX IN ABANDONED TESLA (Treasure Hunt Adventure Challenge) video. We were exploring our old youtube videos and discovered a scary creepy ghosts caught on camera. Do these abandoned towns, and haunted houses have monsters hiding inside? Som

Continue reading “FOUND HACKER CAUGHT ON CAMERA in HAUNTED ABANDONED TOWN (Exploring Crime Scene Mystery)”

It's only fair to share...Tweet about this on TwitterShare on FacebookShare on TumblrShare on Google+Digg thisShare on LinkedInPin on PinterestShare on VKShare on RedditPrint this pageEmail this to someone
Flattr the authorShare on StumbleUponShare on YummlyBuffer this page

Make Your Own Smartwatch From An Old Cell Phone (Part 1)

ðŸ”-🔕 GET THE NEW TINKERNUT BOOK: 🔕ðŸ”- Have an old cell phone laying around? Don’t know what to do with it? What if I told you that you could turn that old cell phone into a smartwatch!?! Keep “watching” to find out how! _____________________________ =#=#=#= Important Links =#=#=#= Project Page – Arduino LCD Library for Nokia 1100 – https://github.com/cattzalin/Arduino-library-nokia-1100-lcd–PCF8814 _____________________________ =#=#=#= Become a Patron =#=#=#= https:// _____________________________ =#=#=#= Submit your ideas =#=#=#= https:// _____________________________ =#=#=#= Support the show =#=#=#= https:// _____________________________ =#=#=#= Follow

Continue reading “Make Your Own Smartwatch From An Old Cell Phone (Part 1)”

It's only fair to share...Tweet about this on TwitterShare on FacebookShare on TumblrShare on Google+Digg thisShare on LinkedInPin on PinterestShare on VKShare on RedditPrint this pageEmail this to someone
Flattr the authorShare on StumbleUponShare on YummlyBuffer this page

Discover & Attack Almost Any Raspberry Pi on a Network with Rpi-hunter

Scan & Attack Raspberry Pis with Default Login Credentials Full Tutorial: Subscribe to Null Byte: https://goo.gl/J6wEnH Kody’s Twitter: https://twitter.com/KodyKinzie One of the most common mistakes a person makes with a new device is failing to change any default passwords. This leaves that device vulnerable to attack. On this episode of Cyber Weapons Lab, we’ll show you a tool called rpi-hunter that can discover and attack any vulnerable Raspberry Pi on a network. While it’s meant for scanning a local network, if the Pis are connected to the internet, they’re fair game too. Raspberry Pi 3 Model B+: https:// Raspberry Pi Zero W: https://

Continue reading “Discover & Attack Almost Any Raspberry Pi on a Network with Rpi-hunter”

It's only fair to share...Tweet about this on TwitterShare on FacebookShare on TumblrShare on Google+Digg thisShare on LinkedInPin on PinterestShare on VKShare on RedditPrint this pageEmail this to someone
Flattr the authorShare on StumbleUponShare on YummlyBuffer this page

NINJA WEAPONS MYSTERY BOX to Battle PROJECT ZORGO (Gadgets Unboxing Haul Top Secret Clues of Hacker)

I unbox 5 new NINJA GADGETS to defeat Project Zorgo! â-¶ Vy Unboxes Spy Gadgets – https://youtu.be/tW-NXjsaM8Y â-¶ Use code chadwc for 10% off at â-¶ Play CHAD’s Video Game Free https://qkq5h.app.goo.gl/chad After Vy Qwaint and I, Chad Wild Clay found a TREASURE MAP Led Us To An ABANDONED SAFE HOUSE (Explore Project Zorgo Top Secret Clues Found) we CAUGHT HACKER BREAKING INTO ABANDONED SAFE HOUSE on Camera (Secret Mystery Box Treasure Found) Who led us on this scavenger hunt from the abandoned haunted town to our Tesla Model X and into this house remains a mystery. Was it the hacker from Project Zorgo or Lie Detector guy? Usually 3am is the creepy scary time when you ghosts are caught on camera but we discovered a secret clue that said 8pm we must escape. What wil

Continue reading “NINJA WEAPONS MYSTERY BOX to Battle PROJECT ZORGO (Gadgets Unboxing Haul Top Secret Clues of Hacker)”

It's only fair to share...Tweet about this on TwitterShare on FacebookShare on TumblrShare on Google+Digg thisShare on LinkedInPin on PinterestShare on VKShare on RedditPrint this pageEmail this to someone
Flattr the authorShare on StumbleUponShare on YummlyBuffer this page

Cross-Site Scripting Explained – Part 8: Javascript String Injection

Author: Jeremy Druin Twitter: @webpwnized Description: Exploiting XSS using injections which land in JavaScript strings is one of the more potent attacks. These are sometimes over looked since most injections land in HTML context rather than JavaScript strings. While not as common, injections landing in JavaScript strings should be patched quickly since injections can be performed without the need to inject HTML tags. The software used in the video is the OWASP Mutillidae II Web Pen-Test Practice Application. Mutillidae is available for download at Updates about Mutillidae are tweeted to @webpwnized along with annoucements about video releases. Thank you for watching. Please support this channel. Up vote, subscribe or even donate by clicking “S

Continue reading “Cross-Site Scripting Explained – Part 8: Javascript String Injection”

It's only fair to share...Tweet about this on TwitterShare on FacebookShare on TumblrShare on Google+Digg thisShare on LinkedInPin on PinterestShare on VKShare on RedditPrint this pageEmail this to someone
Flattr the authorShare on StumbleUponShare on YummlyBuffer this page

Make a Spot Welder for Cheap!!

Here is a step-by-step tutorial on how to make an 800 amp Spot Welder from common materials and for dirt cheap! Spot welders are used to fuse thin sheets of metal together and can cost hundreds of dollars to buy. In this video, we’ll do it for practically nothing! Endcard Links: Metal Melter: https://goo.gl/jolsPz Make the Melter: https://goo.gl/fOqMVR Mirowave Hack: https://goo.gl/SQKzn5 Emergency Power: https://goo.gl/VgdqqP See What Else I’m Up To: Instagram: https://goo.gl/C0Q1YU Facebook: Pinterest: Business Inquiries: For business and sponsorship inquiries please contact us directly: WARNING: Burning galvanized metal may release toxic Zinc Oxide fumes. This project is ext

Continue reading “Make a Spot Welder for Cheap!!”

It's only fair to share...Tweet about this on TwitterShare on FacebookShare on TumblrShare on Google+Digg thisShare on LinkedInPin on PinterestShare on VKShare on RedditPrint this pageEmail this to someone
Flattr the authorShare on StumbleUponShare on YummlyBuffer this page

BEST OF FITZ 2017

funny gaming montage Follow John on Twitch: https:// That rap at 41:18: https:// BIG THANKS TO ALL MY FRIENDS â-¼ â-¸ RaccoonEggs: https://goo.gl/mmRr9x â-¸ SwaggerSouls: https://goo.gl/CwWgxo â-¸ Kryoz: https://goo.gl/DKcr4e â-¸ SMii7Y: https://goo.gl/kdT0CD â-¸ McCreamy: https://goo.gl/jZjuWQ â-¸ John: https://goo.gl/8CWqbE â-¸ Bordie: https://goo.gl/1W1orz â-¸ Kugo: https://goo.gl/NKBFTD â-¸ iNoToRiOuS: https://goo.gl/trCuqZ â-¸ Zuckles: https://goo.gl/s2DXAu FOLLOW ME EVERYWHERE â-¼ ♦ Instagram: https:// ♥ Twitter: https://twitter.com/GoodGuyFitz ♠ Twitch: https:// ♣ Snapchat: GoodGuyFitz ➧ Discord server: https://discord.gg/fitz Music â-¼ â-¸ Epidemic Sound:

Continue reading “BEST OF FITZ 2017”

It's only fair to share...Tweet about this on TwitterShare on FacebookShare on TumblrShare on Google+Digg thisShare on LinkedInPin on PinterestShare on VKShare on RedditPrint this pageEmail this to someone
Flattr the authorShare on StumbleUponShare on YummlyBuffer this page

Angular: XSS without HTML tags

Retrieving parameters from the user and later displaying them on the website always carries risk of XSS attack. But can you perform such attack without using the html tag? Subscribe: https:// XSS happens when an unauthorized JavaScript code executes on our website. Why is this attack dangerous? Using this code, we can steal the data of current user and perform some action on his behalf. For example, post a post on a page or delete a photo. When we google for XSS payloads, we can find many pages that provide a list of potential text strings used by pentesters. It is a common practice to use the alert() function, which displays a popup with our message in the browser’s window. If with use of these payloads, we make it to display a popup, it

Continue reading “Angular: XSS without HTML tags”

It's only fair to share...Tweet about this on TwitterShare on FacebookShare on TumblrShare on Google+Digg thisShare on LinkedInPin on PinterestShare on VKShare on RedditPrint this pageEmail this to someone
Flattr the authorShare on StumbleUponShare on YummlyBuffer this page

LIVE CTF! PART 1! – CS50 on Twitch, EP. 46

Join CS50’s Nick Wong for a live demonstration of a CTF (short for “capture the flag”), a type of cryptosport in which individuals or teams seek to plant or find a virtual “flag”, typically a string, on a web server, often architected in advance. In this example, Nick and Colton explore a CTF set up by Stripe, with more to come! Tune in live on twitch.tv/cs50tv and be a part of the live chat. This is CS50 on Twitch.

Continue reading “LIVE CTF! PART 1! – CS50 on Twitch, EP. 46”

It's only fair to share...Tweet about this on TwitterShare on FacebookShare on TumblrShare on Google+Digg thisShare on LinkedInPin on PinterestShare on VKShare on RedditPrint this pageEmail this to someone
Flattr the authorShare on StumbleUponShare on YummlyBuffer this page