Best Coding Site, Richy Tech, Xtech, Ghana-Paypal, Richard Twum, Affordable, Profession Web Design, Programmer X,Richy Tech Gh
About Me
Get link
Facebook
X
Pinterest
Email
Other Apps
Richard Twum Is a passionate blogger he is mostly interested in technology and computer related stuff and not forgetting he is also a front end web developer, a Software Engineer and a Graphics Designer.
Recently, someone asked how to make your own “Evil USB,” and I promised to make a how-to on this topic. In addition, it would be nice to have something related on our WonderHowTo world. So here it is! Introduction Most common USB flash drives are exploitable due to the “BadUSB” vulnerability. This allows us hackers to reprogram the microcontroller in them to act as a human interface device (HID), e.g., a keyboard, and perform custom keystrokes on our target machine. This scenario is often called an “HID Payload Attack,” since you have to hand over your script to the Bad USB for the execution (more on that later). Even though almost every USB flash drive is exploitable, the only released reprogramming method is for “Phison” microcontrollers. In this tutorial, we are going to determine the microcontroller of your USB flash drive, compile the source code published in GitHub for the tools we need, and move over to building a custom firmware with an embedded HID payload that will turn...
MS PowePoint XP is a handy application which was developed for creating slideshows and presentations. In this tutorial you will learn how to open a presentation, inserting, copying and deleting a slide. Opening a Presentation: Presentations can be opened quickly if you have saved them previously using the task pane. In order to open a presentation you need to follow these simple steps. 1 st of all start PowerPoint. In the task pane under the Open a Presentation option click the presentation which you need to open. You can also opt for an alternative way. Go to the File menu and select Open. ( File>Open.) Now navigate to the file which you need to open. Inserting a New Slide: Once the new slide is created you would want to add more slides in your presentation and for that you need to follow these simple steps. Click Insert>New Slide. ( Press Ctrl+M from your keyboard. ) Move the arrow pointer over the layouts or opt for the scroll bar and sel...
Using a keylogger to intercept keys pressed on an infected computer can circumvent encryption used by email and secure chat clients. The collected data can often reveal usernames, passwords, and potentially compromising and private information which hackers abuse for financial gain. Once a hacker has created a payload and established a backdoor on the target computer of their choice, they have the full power of Metasploit to help them perform whatever post-exploitation attacks needed to get what they want. If it’s your computer, they could capture your screenshots, steal your browser passwords, recover your deleted files, and yes … see everything that you’re typing. we’ll highlight exactly how a hacker could use Metasploit to capture and collect keystrokes and passwords being entered on compromised computers, as well as what potential targets could do to prevent such an attack. Using Metasploit’s Keylogger A keylogger is a software that tra...