«
Expand/Collapse
72 items tagged "custom"
Related tags:
drupal [+],
code execution [+],
publishing [+],
custom publishing [+],
cross site scripting [+],
security [+],
txt [+],
security issues [+],
roms [+],
content type [+],
compromise [+],
advanced [+],
version 6 [+],
tool [+],
splunk [+],
search command [+],
remote shell [+],
raspberry [+],
python code [+],
proof of concept [+],
phpbb2 [+],
phpbb [+],
module [+],
mass [+],
flexible [+],
fields [+],
custom content [+],
content [+],
contact forms [+],
contact [+],
blogging software [+],
arduino [+],
whitepaper [+],
webkit [+],
vertical [+],
peripherals [+],
null bytes [+],
misc [+],
lfi [+],
led [+],
joomla [+],
iphone [+],
inclusion [+],
encoders [+],
hacks [+],
vulnerability [+],
xoom [+],
wouter van der [+],
wouter [+],
wood [+],
webkey [+],
vodka bottle [+],
virtual test [+],
vbulletin [+],
usb [+],
transportation [+],
time strategy game [+],
tablet [+],
t shirt screen printing [+],
surplus [+],
superman logo [+],
superengine [+],
stephen webb [+],
stephen shaffer [+],
starcraft [+],
slatt [+],
sivan toledo [+],
sitedone [+],
siri [+],
shelving unit [+],
shelf solutions [+],
selective laser [+],
script sql [+],
screensaver [+],
root folder [+],
robots [+],
riley porter [+],
reprogramming [+],
replacements [+],
remote file include vulnerability [+],
recycle [+],
recovery [+],
real time strategy [+],
rasp [+],
radio [+],
proxy [+],
printing [+],
portable network graphics [+],
png file [+],
pcs [+],
patented power [+],
patch wires [+],
party [+],
paper [+],
pagers [+],
orlando [+],
orientation [+],
on the go [+],
new [+],
neighbors [+],
multitouch [+],
movie [+],
motorola micom [+],
motorcycle engine [+],
motorcycle [+],
motd [+],
monitor [+],
millimeter [+],
message of the day [+],
matrix [+],
materialise [+],
mame cabinet [+],
magsafe [+],
livecd [+],
lithium cells [+],
lithium [+],
lighting arrangements [+],
led flashlights [+],
laser cutter [+],
laptops [+],
kindle [+],
jon beck [+],
jon [+],
jamal bandukwala [+],
jake von slatt [+],
interface [+],
insecure [+],
initrd [+],
information [+],
industrial [+],
inductive charger [+],
induction [+],
increments [+],
impossible action [+],
impending release [+],
hot glue guns [+],
hot [+],
hookahs [+],
hookah [+],
homebrew [+],
home theater [+],
hf radios [+],
haven [+],
handy tools [+],
hacker [+],
gridrunner [+],
green [+],
google searches [+],
google [+],
glue [+],
glimpses [+],
glass [+],
functional pieces [+],
flat cables [+],
first person shooter [+],
firmware [+],
file upload [+],
evan [+],
engine [+],
enclosure [+],
electroluminescent [+],
edition [+],
eagle cad [+],
eagle [+],
droidx [+],
doors [+],
dongles [+],
distro [+],
display [+],
desk [+],
derek hughes [+],
decorative shells [+],
day [+],
david [+],
cylinder engine [+],
custom versions [+],
custom urls [+],
custom shapes [+],
custom search engine [+],
custom screensaver [+],
custom robotics [+],
custom message [+],
custom interface [+],
custom firmware [+],
custom enclosure [+],
custom displays [+],
custom controller [+],
custom business card [+],
custom bike [+],
custom 3d [+],
credit card numbers [+],
crankcase [+],
cosimo [+],
corrugated cardboard [+],
controller [+],
computer keyboard [+],
colored glue sticks [+],
cnc [+],
cms [+],
classic [+],
circuitry [+],
cellphones [+],
cellphone [+],
card script [+],
card [+],
car [+],
business [+],
bt4 [+],
brightest flashlight in the world [+],
breadboard [+],
brandon fiquett [+],
boot [+],
birdman [+],
bike [+],
bicycle frame [+],
bbcode tags [+],
basement [+],
bamf [+],
awesome [+],
array [+],
android [+],
andreas georgeades [+],
adafruit [+],
abu dhabi [+],
Support [+],
Rasberry [+],
Hardware [+],
General [+],
BackTrack [+],
3ds file [+],
wordpress [+]
-
-
21:43
»
Packet Storm Security Exploits
This Metasploit module exploits a remote file inclusion flaw in the WordPress blogging software plugin known as Advanced Custom Fields. The vulnerability allows for remote file inclusion and remote code execution via the export.php script. The Advanced Custom Fields plug-in versions 3.5.1 and below are vulnerable. This exploit only works when the php option allow_url_include is set to On (Default Off).
-
21:43
»
Packet Storm Security Recent Files
This Metasploit module exploits a remote file inclusion flaw in the WordPress blogging software plugin known as Advanced Custom Fields. The vulnerability allows for remote file inclusion and remote code execution via the export.php script. The Advanced Custom Fields plug-in versions 3.5.1 and below are vulnerable. This exploit only works when the php option allow_url_include is set to On (Default Off).
-
21:43
»
Packet Storm Security Misc. Files
This Metasploit module exploits a remote file inclusion flaw in the WordPress blogging software plugin known as Advanced Custom Fields. The vulnerability allows for remote file inclusion and remote code execution via the export.php script. The Advanced Custom Fields plug-in versions 3.5.1 and below are vulnerable. This exploit only works when the php option allow_url_include is set to On (Default Off).
-
-
5:00
»
Hack a Day
With so many uses for a Raspberry Pi in a headless configuration – especially with the impending release of the Raspi Model A – we’re surprised it has taken so long for someone to send in a way to create a custom message of the day that is displayed whenever you SSH into everyone’s favorite Linux [...]
-
-
19:51
»
Packet Storm Security Exploits
This Metasploit module exploits a feature of Splunk whereby a custom application can be uploaded through the web based interface. Through the 'script' search command a user can call commands defined in their custom application which includes arbitrary perl or python code. To abuse this behavior, a valid Splunk user with the admin role is required. By default, this module uses the credential of "admin:changeme", the default Administrator credential for Splunk. Note that the Splunk web interface runs as SYSTEM on Windows, or as root on Linux by default. This Metasploit module has only been tested successfully against Splunk 5.0.
-
19:51
»
Packet Storm Security Recent Files
This Metasploit module exploits a feature of Splunk whereby a custom application can be uploaded through the web based interface. Through the 'script' search command a user can call commands defined in their custom application which includes arbitrary perl or python code. To abuse this behavior, a valid Splunk user with the admin role is required. By default, this module uses the credential of "admin:changeme", the default Administrator credential for Splunk. Note that the Splunk web interface runs as SYSTEM on Windows, or as root on Linux by default. This Metasploit module has only been tested successfully against Splunk 5.0.
-
19:51
»
Packet Storm Security Misc. Files
This Metasploit module exploits a feature of Splunk whereby a custom application can be uploaded through the web based interface. Through the 'script' search command a user can call commands defined in their custom application which includes arbitrary perl or python code. To abuse this behavior, a valid Splunk user with the admin role is required. By default, this module uses the credential of "admin:changeme", the default Administrator credential for Splunk. Note that the Splunk web interface runs as SYSTEM on Windows, or as root on Linux by default. This Metasploit module has only been tested successfully against Splunk 5.0.
-
-
16:48
»
Packet Storm Security Exploits
Drupal version 6.22 with Custom Publishing Options version 6.x-1.4 suffers from a cross site scripting vulnerability. Proof of concept information included.
-
16:48
»
Packet Storm Security Recent Files
Drupal version 6.22 with Custom Publishing Options version 6.x-1.4 suffers from a cross site scripting vulnerability. Proof of concept information included.
-
16:48
»
Packet Storm Security Misc. Files
Drupal version 6.22 with Custom Publishing Options version 6.x-1.4 suffers from a cross site scripting vulnerability. Proof of concept information included.
-
-
13:01
»
Hack a Day
[LuckyNumbrKevin] wanted an epic monitor array of his own but didn’t really have the desk real estate to pull it off. His solution was to build a three computer monitor mounting rack with a relatively small footprint. The design started with some virtual test builds using SketchUp. Once he had it dialed in he began [...]
-
-
6:01
»
Hack a Day
Many of you have still not yet received your Raspberry Pi. When you do, you’ll find that there is work to be done in the operating system to get things working as you might want them to. The wonderful folks over at Adafruit have tackled this by releasing their own distribution of Linux for the [...]
-
-
13:01
»
Hack a Day
[Jake von Slatt] is at it again; putting his own artistic spin on ordinary items. This time around it’s the glass on the back of an iPhone. It kept breaking and after a few replacements he wanted to try to replace the glass with a piece of etched brass. But part way through that experiment, [...]
-
5:01
»
Hack a Day
[PRC148] picked up a Motorola Micom radio from eBay. These are US State Department surplus, but apparently the 125 Watt HF units are top-of-the-line at a tenth of the sticker price. The one hangup is that they’re headless; you can’t control them without additional hardware. But the Internets are often kind to the hobbyists, and [...]
-
-
5:01
»
Hack a Day
This Starcraft controller was designed as a contest entry. The goal of the contest was to provide a custom controller for the Starcraft Real-Time-Strategy game that shared some of the features seen in First Person Shooter controllers. The design started as rough sketches. From the there button layout was prototyped before actually building a virtual [...]
-
-
11:01
»
Hack a Day
This isn’t a brightest flashlight in the world type of hack (but it does manage to push about 1000 lumens). [Stephen Webb] is finding a use for leftover parts by building his own simple LED flashlights. As you can see, he uses PVC parts available at any hardware or home store. These are a good [...]
-
-
12:01
»
Hack a Day
The difficulty of rolling a 16-cylinder engine into a motorcycle really boggles the mind. But that’s exactly what [Andreas Georgeades] is doing in his garage. It’s two straight-8 engines sandwiched on top of one another with a custom crankcase connecting them. And get this, those custom parts are being milled by hand, using time-tested techniques rather [...]
-
11:01
»
Hack a Day
The teachers at [Jjshortcut's] school were each given a Webkey by the administration as a promotional item of sorts, but most of the staff saw them as useless, so they pitched them. [Jjshortcut] got his hands on a few of them and decided to take one apart to see what made them tick. He found [...]
-
-
15:01
»
Hack a Day
We haven’t heard much about 3D printing using stainless steel as the medium, but that’s exactly what’s going on with the lugs used to assemble this bicycle frame. They’re manufactured using LaserCusing, which is a brand name for parts produced using Selective Laser Melting. The video after the break gives you an overview of what [...]
-
-
21:31
»
SecDocs
Authors:
Jamal Bandukwala Tags:
intelligence Google Event:
Black Hat Abu Dhabi 2011 Abstract: Traditional Google searches can generate millions of results many of which are not relevant to what a user is looking for and when a user searches for items with various advanced operators they are still limited to searching one site at a time. This means that an individual can have to peruse through several different pages of sometimes questionable quality looking for relevant and usable information. My custom searches allow a user to peruse multiple relevant sources at the same time. I have put together three different custom searches/ engines; each of these searches goes through different types of online sources/ content and consequently provides different types of information/ intelligence. My presentation goes over each of these custom searches and provides examples of the type of information one can obtain from them and also examines how they can be used both in an offensive manner (ie. attacks) and defensively as well. One can find everything from credit card numbers to passport information and even do things like interrupt travel plans and take over identities. Additionally you can also find significant information on various individuals even if they do not have their own presence online; this can allow an attacker to craft a much more convincing attack to get the information they need. It would appear that the custom search engine owner/ creator and the individual using the searches are both only limited by the content in the search engine and their imagination. The possibilities on what you can find with the appropriate search are endless.
-
-
11:25
»
Hack a Day
If you’re looking for a custom controller for a MAME cabinet build, CNC machine, or just want to control a robot build, you’re going to need to wire up some buttons. You could wire up a bunch of buttons to a microcontroller, but if you use an old computer keyboard the work is already done [...]
-
-
10:01
»
Hack a Day
[Kubbur87] put together a guide to replacing the Non-touch Kindle 4 screensavers with your own images. We’ve already seen a way to remove the Special Offers banners from the newest version of Kindle Hardware, this hack lets you use your own 600×800 Portable Network Graphics (.png) file instead of the images pushed to the device by [...]
-
-
15:01
»
Hack a Day
The guys at BuildLounge wrote us to share a giant LED sign they came across in the submission pile for their “Win a Laser Cutter” contest that’s currently under way. [Stephen Shaffer] helps run a huge party called Fantastic Planet, for which the group typically outsources the lighting arrangements. They got tired of hiring light [...]
-
-
14:01
»
Hack a Day
Siri can make appointments, tell you the weather, but now she can start your car as well! After we showed you how Siri could be hacked to use a custom proxy and execute custom commands, we knew it wouldn’t be long before additional hacks would start rolling in. [Brandon Fiquett] thought it would be great [...]
-
-
10:01
»
Hack a Day
[Koogar] came up with a useful tool for checking the measurements of your layouts in Eagle CAD. He calls it the Gridrunner; a custom part that adds a 200mm ruler to your design. Tick marks are in 1/10th of a millimeter increments for great accuracy when used with the zoom feature of Eagle. Once you’ve [...]
-
-
11:29
»
Hack a Day
[Cosimo Orlando] has a Motorola Xoom tablet. It’s an Android device that works great as a tablet, but can double as a Laptop when you need it to by adding a keyboard. The problem he was having is that the USB On-The-Go cables that he tried were never the right size or orientation. So he [...]
-
-
7:46
»
Packet Storm Security Recent Files
This is a whitepaper called Security Issues in Android Custom ROMs. This paper keeps a special focus on custom ROMs by checking for security misconfigurations that can lead to device compromise.
-
7:46
»
Packet Storm Security Recent Files
This is a whitepaper called Security Issues in Android Custom ROMs. This paper keeps a special focus on custom ROMs by checking for security misconfigurations that can lead to device compromise.
-
7:46
»
Packet Storm Security Misc. Files
This is a whitepaper called Security Issues in Android Custom ROMs. This paper keeps a special focus on custom ROMs by checking for security misconfigurations that can lead to device compromise.
-
7:46
»
Packet Storm Security Misc. Files
This is a whitepaper called Security Issues in Android Custom ROMs. This paper keeps a special focus on custom ROMs by checking for security misconfigurations that can lead to device compromise.
-
-
15:23
»
Hack a Day
Hot glue guns can be very handy tools for bonding all sorts of surfaces, while getting you accustomed to plastic burns. The one thing they lack though is color, and while yes, you can on occasion find colored glue sticks, there is usually only a limited selection and they cost way more than the normal [...]
-
-
15:01
»
Hack a Day
[Evan] is one of those neighbors you only wish you had. His neighbors were renovating their basement for use as home theater, and he stopped by to check out how things were coming along. While there, he suggested they add some LED lighting to their shelving unit to make them pop. His neighbors were game, so [...]
-
-
5:54
»
Hack a Day
[Sivan Toledo] needed a enclosure for a unique sized electronic project, not finding what he needed in off the shelf solutions, he went to the next best thing, … Papier Mâché! Using a mold made out of standard corrugated cardboard, he slowly built up layers made of magazine paper, and ordinary “white glue” diluted with [...]
-
-
4:17
»
Hack a Day
Custom displays are a lot of fun to look at, but this one is something we’d expect to see at a trade show and not on someone’s kitchen table. [Taha Bintahir] built a 3D volumetric display and is showing it off in the image above using a 3DS file of the Superman logo exported from [...]
-
-
9:00
»
Hack a Day
Since their invention in the 1500s, Hookahs have always been a way for craftsmen to show off skills by creating ornate, elaborate, and functional pieces of art. This still holds true today, as easily seen above. Found on the Hookah subreddit, this pipe was pieced together by recycling an old vodka bottle, as well decorating [...]
-
-
12:00
»
Hack a Day
i.materialise, a custom 3D printing fabrication house are looking for talented robotics enthusiasts with the skills to design custom robotics parts such as functional frames, decorative shells, as well as unique parts required by robots to look and perform their best. The best part? They are offering free 3D printing of parts to the people they [...]
-
-
12:05
»
Hack a Day
[Birdman] has managed to push a custom recovery image to the DroidX. This previously impossible action opens the doors to all kinds of fun hacking. While you can’t just drop a custom Rom on the phone right now, this is the first step in making that happen. You can find the directions in the post, [...]
-
-
13:00
»
Hack a Day
This is a custom back plate with induction charging circuitry that [Derek Hughes] build for his HTC HD2 cellphone. When we checked in with him last week he showed us how to add an inductive charger without voiding the warranty but it wasn’t very pretty because the stock back plate blocked the inductive field and [...]
-
-
6:32
»
Hack a Day
In this video from Maker Faire, [Jon Beck] of CLUE — the Columbia Laboratory for Unconventional Electronics — demonstrates the unexpected ease of creating custom electroluminescent (EL) displays using materials from DuPont and common t-shirt screen printing tools. Eagle-eyed reader [ithon] recognized the Hack a Day logo among the custom shapes, which escaped our notice at the time. Sorry, Jon! Very cool [...]
-
-
12:33
»
Hack a Day
[Riley Porter] has been working on several different custom enclosure designs. Above, you can see his Proto Desk which holds a breadboard, Arduino, and has two recessed boxes with sliding tops for components and patch wires. He’s got a miniature version that gets rid of the breadboard, as well as slick-looking cases for the Bus [...]
-
-
9:25
»
Hack a Day
[Freeload] sent us his custom MagSafe adapter build for laptops. MagSafe for those unaware is Apples (patented) power adapters that prevent damage to laptops when the cord is accidentally yanked from the socket. While we’ve seen some custom versions before of MagSafes they were usually bulky, ugly, and used a ton of unremovable glue. We [...]
-
-
2:03
»
remote-exploit & backtrack
I've extracted the .iso and have been using grub to boot the kernel and initrd, but I'd like to make a few changes to the live cd. I've extracted the squashfs, copied my /root folder to save my configuration changes and compressed it again (while in backtrack to make sure I use the proper version of mksquashfs) and re-generated the manifest, using instructions from the ubuntu community docs on live cd customization (can't post link sorry)
However, the changes I made don't show up when I boot, its just a regular bt4 desktop and none of my personal files are on it. I'm positive that the right .squashfs is being used and that it's in the right place, so I'm guessing it's the manifest maybe?
If someone can help me along I'd like to write all this up into a tutorial because a lot of people here seem to be interested in customizing live cds but haven't been having luck with things like linux-live or reconstructor.