title
stringlengths
30
147
content
stringlengths
17
61.4k
Got Beef? Getting Started with BeEF « Null Byte :: WonderHowTo
With the the general computer users understanding of Information security rising (at least to the point of not clicking on unknown links), and operating system security getting better by default. We need to look for new and creative ways to gain a foothold in a system.Luckily there are tools available to us, such as th...
Advice from a Real Hacker: How I Would Build the God's Eye of Furious 7 « Null Byte :: WonderHowTo
In the recent hit movieFurious 7, the storyline revolves around the acquisition of a hacking system known as "God's Eye" that is capable of finding and tracking anyone in real time. Both the U.S. spy agencies and an adversarial spy agency (it's not clear who the adversary is, but the location is "beyond the Caucasus mo...
How to Create a Native SSH Server on Your Windows 10 System « Null Byte :: WonderHowTo
With the addition of theOpenSSHclient and server in theWindows 10 Fall Creators Update, you no longer have to rely on third-party programs to open an SSH server and connect to a Windows machine. While still a beta feature, this represents a long-overdue update fulfilling apromisemade back in 2015.TheOpenSSH clientallow...
Hack Like a Pro: How to Hack Web Apps, Part 2 (Website Spidering with WebScarab) « Null Byte :: WonderHowTo
Welcome back, my tenderfoot hackers!Now that we have begun this trip downweb app hacking lane, we need to first address target reconnaissance. Like any hack,reconnaissanceis critical. (Are you tired of me saying that yet?)There is no better telltale sign of a script-kiddie than a hacker who runs willy-nilly into trying...
How to Use Maltego to Target Company Email Addresses That May Be Vulnerable from Third-Party Breaches « Null Byte :: WonderHowTo
The easiest way around a security policy is to find users who don't follow it. TheHave I Been Pwneddatabase identifies accounts with information breached by major third parties like Yahoo and LinkedIn. With Maltego, hackers can locate breached accounts created using company email addresses, potentially giving attackers...
Hack Like a Pro: Networking Basics for the Aspiring Hacker, Part 2 (TCP/IP) « Null Byte :: WonderHowTo
Welcome back, my greenhorn hackers!Inthe first partofthis series, I introduced you to the basics of networking including IP addresses, ports, NAT, and DHCP. In this lesson, I want to introduce you to the basics of TCP/IP, i.e., Transmission Control Protocol (TCP) and Internet Protocol (IP). These are the most common pr...
How to Code a Basic TCP/IP Client & Server Duo in Python « Null Byte :: WonderHowTo
TCP/IP Client / Server ApplicationHello! Today's blog post will be about coding a very rudimentary Client and Server application duo, which will communicate by using TCP Sockets.It is, as illustrated, in principle, just two cans and a string that ties them together. The server will listen for clients and accept incomin...
Hack Like a Pro: Metasploit for the Aspiring Hacker, Part 12 (Web Delivery for Linux or Mac) « Null Byte :: WonderHowTo
Welcome back, my budding hackers!Metasploit, one of my favorite hacking/pentesting tools, has so many capabilities that even aftermy many tutorialson it, I have only scratched the surface of it capabilities. For instance, it can be used withNexposefor vulnerability scanning, withNmapfor port scanning, and with its nume...
Learn to Code Today with This $20 Web Development Course « Null Byte :: WonderHowTo
Learning to code is difficult, particularly if you're doing it alone. While coding may be amongthe most valued job skillsin many markets, the education is sometimes inaccessible.However, theIntroduction to Coding with HTML, CSS & JavaScriptcourse provides five hours of introductory content that can get you started codi...
How to Remove a Windows Password with a Linux Live CD « Null Byte :: WonderHowTo
Back when I was a Windows user, I know I'm not the only one who has experienced password loss—that moment where you just can't remember your password. Sometimes it happens to the best of us. So, how can we get into the system without paying a local geek or geeksquad to do it? First, we have to look into how Windows sto...
How Hackers Steal Your Internet & How to Defend Against It « Null Byte :: WonderHowTo
I have had a lot of people ask me, "How does my neighbor keep getting into my wireless?!". Chances are, these people are all using WEP, a deprecated wireless encryption protocol. Either that, or you are using oneweakWPA passphrase.If someone can access your wireless network that easily, this isNOTa good thing. After so...
How to Mine Twitter for Targeted Information with Twint « Null Byte :: WonderHowTo
Open-source intelligence researchers and hackers alike love social media for reconnaissance. Websites likeTwitteroffer vast, searchable databases updated in real time by millions of users, but it can be incredibly time-consuming to sift through manually. Thankfully, tools like Twint can crawl through years of Twitter d...
How to Post to Null Byte [4.10.15 Revision] « Null Byte :: WonderHowTo
Hello readers, and welcome to Null Byte.Before we start, for those of you who may not know me, my name is ghost_; I'm a relatively active member of our community and have been around for a while.During my time here, I've seen our community cultivate into the brilliant one we have today, people from all over the world w...
Become an In-Demand Ethical Hacker with This $15 CompTIA Course « Null Byte :: WonderHowTo
If you're interested in joining the increasingly popular and lucrative world of ethical or "white hat" hacking, you're far from alone. More and more coding and programming pros are turning to this field thanks to the high pay, countless opportunities, and exciting work environment.But this means that if you want to be ...
Learn C# & Start Designing Games & Apps « Null Byte :: WonderHowTo
Learning different coding languages can be difficult. You spend so much time mastering one and getting used to thinking along the channels you need for it that learning something new can sometimes be more difficult than starting from scratch. Starting from scratch, notably, is also difficult.The Complete C# Programming...
Hack Like a Pro: How to Create a Virtual Hacking Lab « Null Byte :: WonderHowTo
Welcome back, my amateur hackers!Many of you here are new tohacking. If so, I strongly recommend that each of you set up a "laboratory" to practice your hacks. Just like any discipline, you need to practice, practice, and practice some more before you take it out to the real world.In many disciplines, if you don't prac...
Advanced Nmap: Top 5 Intrusive Nmap Scripts Hackers & Pentesters Should Know « Null Byte :: WonderHowTo
Nmap is more powerful than you know. With a few scripts, we can extend its functionality beyond a simple port scanner and start to identify details about target servers sysadmins don't want us to know.Possibly the most popular and well-known reconnaissance tool currently available in the hacking world, Nmap has beencov...
Kali Forensics « Null Byte :: WonderHowTo
No content found.
Use Hash-Identifier to Determine Hash Types for Password Cracking « Null Byte :: WonderHowTo
Hashes are commonly used to store sensitive information like credentials to avoid storing them in plaintext. With tools likeHashcat, it's possible to crack these hashes, but only if we know the algorithm used to generate the hash. Using a tool called hash-identifier, we can easily fingerprint any hashes to discover the...
How to Audit Web Applications & Servers with Tishna « Null Byte :: WonderHowTo
Penetration-testing frameworks can be incredibly useful since they often streamline certain processes and save time by having a lot of tools available in one place. Of course, the most popular pentesting framework is undoubtedlyMetasploit, but there are many others out there that cater to particular needs. For auditing...
How to Install Linux to a Thumb Drive « Null Byte :: WonderHowTo
Let's face it, CDs and DVDs are a thing of the past. We no longer use them as a storage medium because they are slow, prone to failure in burning, and non-reusable. The future isflash memory. Flash memory is cheap, fast, and efficient. Eventually, flash drives might even replace discs as the preferred prerecorded selli...
Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 15 (Creating a Secure Tunnel to MySQL) « Null Byte :: WonderHowTo
Welcome back, my budding hackers!In my continuing effort tobuild your basic Linux skills for hacking, I want to show you how to build a secure "tunnel" to MySQL.Of course, the techniques I use here could be used for any application, but since MySQL is such a critical app on most Linux installations, and since un-encryp...
Hack Like a Pro: Scripting for the Aspiring Hacker, Part 3 (Windows PowerShell) « Null Byte :: WonderHowTo
Welcome back, my budding hackers!As you know, I firmly believe that to be a true professional hacker, you need to be proficient inLinux. This is for a number of good reasons.Most hacker tools are developed in Linux (well over 90 percent).Linux offers us greater granularity of control.The terminal in Linux gives us comp...
How to Crack Password-Protected Microsoft Office Files, Including Word Docs & Excel Spreadsheets « Null Byte :: WonderHowTo
Microsoft Office files can be password-protected in order to prevent tampering and ensure data integrity. But password-protected documents from earlier versions of Office are susceptible to having their hashes extracted with a simple program called office2john. Those extracted hashes can then be cracked using John the ...
Have Your Passwords Ever Been Leaked Online? Find Out with PwnedList « Null Byte :: WonderHowTo
It seems like every other day there's a new security threat or data leak in the news. Whether it's yourcredit card PINor your smartphone's appsleaking your email address, no one wants their personal information out there, especially passwords. And if you use the same email address and/or password for more than one site...
How to Become a Hacker « Null Byte :: WonderHowTo
Many of our members here at Null Byte are aspiring hackers looking to gain skills and credentials to enter the most-valued profession of the 21st century. Hackers are being hired by IT security firms, antivirus developers, national military and espionage organizations, private detectives, and many other organizations.P...
Advice from a Real Hacker: Why I'm Skeptical That North Korea Hacked Sony « Null Byte :: WonderHowTo
Seldom in recent history has a cyber security event caused so much media stir (maybe because it happened to a media company?) and international relations upheaval. Cyber security breaches seem to take place daily of major corporations, but the Sony hack seems to have captured the American imagination and, for that matt...
Listeners « Null Byte :: WonderHowTo
No content found.
How to Hack Wi-Fi & Networks More Easily with Lazy Script « Null Byte :: WonderHowTo
Wi-Fi tools keep getting more and more accessible to beginners, and the LAZY script is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's ...
Hack Like a Pro: How to Exploit SNMP for Reconnaissance « Null Byte :: WonderHowTo
Welcome back, my rookie hackers!The more we know about a system or network, the better our chances of owning it and not leaving a trace for investigators to follow. One of the often overlooked sources for information is the Simple Network Management Protocol (SNMP). Many rookie hackers are not even aware of it, but it ...
Networking Basics « Null Byte :: WonderHowTo
No content found.
How to Use UFONet « Null Byte :: WonderHowTo
With therelease of the Mirai source code, botnets are back in a big way. In the early days of botnets, zombies (infected hosts) would report to IRC (Internet Relay Chat) channels for CNC (command and control) instructions. Modern botnets have evolved, but they continue to use the same concepts as their predecessors.The...
Hacking macOS: How to Identify Antivirus & Firewall Software Installed on Someone's MacBook « Null Byte :: WonderHowTo
Identifying security software installed on a MacBook or other Apple computer is important to hackers and penetration testers needing to compromise a device on the network. With man-in-the-middle attacks, packets leaving the Mac will tell us a lot about what kind of antivirus and firewall software is installed.After gai...
Hack Like a Pro: How to Find Directories in Websites Using DirBuster « Null Byte :: WonderHowTo
Welcome back, my novice hackers!Before we try to attack a website, it's worthwhile understanding the structure, directories, and files that the website uses. In this way, we can begin to map an attack strategy that will be most effective.In addition, by knowing what files and directories are there, we may be able to fi...
Hack Like a Pro: Hacking Samba on Ubuntu and Installing the Meterpreter « Null Byte :: WonderHowTo
Hey, hackers! Now that you've hacked/owned your first "box" inmy last article, let's look a little closer at another great feature of Metasploit, the Meterpreter, and then let's move on to hacking a Linux system and using the Meterpreter to control and own it.Why Meterpreter?Most exploits are only capable of doing one ...
Hack Like a Pro: How to Crack Passwords, Part 2 (Cracking Strategy) « Null Byte :: WonderHowTo
Welcome back, my hacker apprentices!Last week, I started off mypassword cracking serieswith anintroduction on the principles and technologiesinvolved in the art of cracking passwords. In past guides, I showed some specific tools and techniques for crackingWindows,online,Wi-Fi,Linux, and evenSNMPpasswords. This series i...
How to SQL Injection! -- Detailed Introduction. « Null Byte :: WonderHowTo
Hello NullByte!This will be my first How To series.In this tutorial you'll learn what SQL is, what SQL injection is and how it benefits you as a hacker.I strongly recommend learning at least the basics of PHP before attempting to learn/use SQL Injection.list of references;SQL WikipediaDVWALearn by trying!PHPTable of Co...
Supercharge Your Excel Skills with This Expert-Led Bundle « Null Byte :: WonderHowTo
We've already highlightedthe importance of learning Microsoft Excel from a hacker's standpoint, but it's also just a good skill to have as you'll likely come across the number-crunching powerhouse at school and work, as well as in other areas of your life, such as budgeting.Excel has earned its reputation as being one ...
Hacking Windows 10: How to Dump NTLM Hashes & Crack Windows Passwords « Null Byte :: WonderHowTo
Windows 10 passwords stored as NTLM hashes can be dumped and exfiltrated to an attacker's system in seconds. The hashes can be very easily brute-forced and cracked to reveal the passwords in plaintext using a combination of tools, including Mimikatz, ProcDump, John the Ripper, and Hashcat.Before we get to any of that, ...
How to Get Root with Metasploit's Local Exploit Suggester « Null Byte :: WonderHowTo
So you've managed toget a shellon the target, but you only have measly low-level privileges. Now what? Privilege escalation is a vast field and can be one of the most rewarding yet frustrating phases of an attack. We could go the manual route, but like always,Metasploitmakes it easy to performlocal privilege escalation...
How to Attend Defcon Without Looking Like a Noob or Spending a Fortune « Null Byte :: WonderHowTo
Defconis the largest hacker conference with something for everyone, whether it be the talks, parties, villages, or any of the hundreds of events. In this guide, we'll take a holistic view at everything that goes into attending the con for the first time, from securing your electronics and making the most of your time t...
Hack Like a Pro: How to Anonymously Torrent Files with Tribler « Null Byte :: WonderHowTo
Welcome back, my nascent hackers!One of the many reasons I write this blog is to help you keep the Internet free and open. Throughout human history, whenever a government or other powerful entity has wanted to subjugate a people or group, the first thing they do is isolate that group from others and control the flow of...
Password Cracking « Null Byte :: WonderHowTo
No content found.
Windows 7 Won't Boot? Here's How To Fix Your Master Boot Record « Null Byte :: WonderHowTo
With a lot of Null Byters playing around with Linux because of its excessive use in the hacking world, some of you are bound to run into some trouble with the installation at some point or another. If you make a mistake, or you're intimidated by the wonky-looking installation screen, you may want to just stick with Win...
Hack Like a Pro: Using TFTP to Install Malicious Software on the Target « Null Byte :: WonderHowTo
Welcome back, my fledgling hackers!Sometimes, for a variety of reasons, we can only get a command shell on our target system. For instance, withMetasploit, it's not always possible to get the all powerfulMeterpreteron our target system. In other cases, we may be able to connect to a command shell viaNetcatorCryptcat.In...
How to Locate & Exploit Devices Vulnerable to the Libssh Security Flaw « Null Byte :: WonderHowTo
Computers all over the world rely on a program called "libssh" to use the SSH communications protocol, which allows trusted users to log in and administer computers remotely. Due to a flaw in libssh, fooling a computer into granting SSH access is as easy as telling it you already have permission. The vulnerability can ...
How to Use Private Encrypted Messaging Over Tor « Null Byte :: WonderHowTo
Tor is an excellent obfuscation network for web traffic, and while instant messaging over the network is very useful, it can be relatively difficult to configure. In this guide, we'll look at two synchronous communications platforms (instant messengers) which can be routed over the Tor network,RicochetandXMPP.Ricochet,...
Hack Like a Pro: Exploring the Inner Architecture of Metasploit « Null Byte :: WonderHowTo
Welcome back, my novice hackers!We've done a number of tutorials using one of my favorite hacking tools,Metasploit. In each of them, we've used themsfconsole, which can be reached through either the menu system or through simply typing "msfconsole" from the terminal.This msfconsole puts us into an interactive mode comm...
Kali Is Your New Pet; The Ultimate Guide About Kali Linux Portability. « Null Byte :: WonderHowTo
Did you know Kali 1.0.8? You probably did, and you probably know about the EFI boot option that has been added.That's a very interesting new feature because it allows Kali to be easily booted on Mac too, and every EFI-supported device.First three preview lines gone? As always, sorry for any eventual grammar error or un...
How to Find & Exploit SUID Binaries with SUID3NUM « Null Byte :: WonderHowTo
File permissions can get tricky on Linux and can be a valuable avenue of attack during privilege escalation if things aren't configured correctly. SUID binaries can often be an easy path to root, but sifting through all of the defaults can be a massive waste of time. Luckily, there's a simple script that can sort thing...
How to Compromise a Web Server & Upload Files to Check for Privilege Escalation, Part 1 « Null Byte :: WonderHowTo
Information gathering is one of the most important steps in pentesting or hacking, and it can often be more rewarding to run things on the target itself as opposed to just running scripts against it remotely. With an SQL injection, a hacker can compromise a server and, ultimately, upload and run the "unix-privesc-check...
How to Create a Reverse Shell to Remotely Execute Root Commands Over Any Open Port Using NetCat or BASH « Null Byte :: WonderHowTo
Reverse shells are useful for issuing commands to a remote client when the client is behind something such as a NAT. You might say, "But can't a normal shell or simple SSH tunnel do the same thing?". No, it can't. All over the internet I see a lot of confusion regarding the difference between a normal shell and a rever...
Here's Why You Need to Add Python to Your Hacking & Programming Arsenal « Null Byte :: WonderHowTo
Choosing which programming language to learn next can be a truly daunting task. That's the case regardless of whether you're a Null Byter just beginning a career in development and cybersecurity or you're a seasoned ethical hacking and penetration tester with years of extensive coding experience under your belt. On tha...
How to Hack TOR Hidden Services « Null Byte :: WonderHowTo
A lot of people think that TOR services are unhackable because they are on a "secure environment", but the truth is that those services are exactly the same that run on any normal server, and can be hacked with the same tools (metasploit,hydra,sqlmap...), the only thing you have to do is launch a transparent proxy that...
Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 11 (Apache Web Servers) « Null Byte :: WonderHowTo
Welcome back, my aspiring hackers!In this series onLinux for aspiring hackers, I'm trying to provide you with the basic skills needed to be capable in Linux as a hacker. One area that's critical that we haven't covered yet is building and managing an Apache web server.Apache is found on over 60% of the globe's web serv...
How to Crack Password-Protected ZIP Files, PDFs & More with Zydra « Null Byte :: WonderHowTo
Everybody knows not to store sensitive information in unencrypted files, right? PDFs and ZIP files can often contain a treasure trove of information, such as network diagrams, IP addresses, and login credentials. Sometimes, even certain files that are encrypted aren't safe from attackers. That's where Zydra comes in — ...
Get a Jump Start into Cybersecurity with This Bundle « Null Byte :: WonderHowTo
Cybersecurity is an industry that isn't going anywhere. After the mass move to online work, the need for more cybersecurity professionals skyrocketed. That demand isn't going away because more andmore industries are keeping onlineand cloud services going for their workers.The 2021 All-in-One Ethical Hacking & Penetrati...
Android « Null Byte :: WonderHowTo
No content found.
The Hacks of Mr. Robot: How to Spy on Anyone's Smartphone Activity « Null Byte :: WonderHowTo
Welcome back, my greenhorn hackers!As all you know by now, I'm loving this new show,Mr. Robot. Among the many things going for this innovative and captivating program is the realism of the hacking. I am using this series titled "The Hacks of Mr. Robot" to demonstrate the hacks that are used on this program.In thethird ...
How to Track Government Aircraft 200 Miles Away with a Raspberry Pi « Null Byte :: WonderHowTo
Aircraft equipped with ADS-B areconstantly shouting their location into the radio void, along with other useful unauthenticated and unencrypted data. In this guide, we will make an ADS-B receiver using a Raspberry Pi with a software-defined radio (SDR) dongle, which we can use to track aircraft anywhere in real time.In...
Recon « Null Byte :: WonderHowTo
No content found.
How to Get an Internet Connection in the Middle of Nowhere to Hack Remotely « Null Byte :: WonderHowTo
If you're living or staying out in the middle of nowhere or a rural area outside of a big city or town — where there are no reliable cable, fiber, or wireless networks available — how can you get an internet connection? There are several possibilities, but they all come with tradeoffs, which we'll go over in detail.Nor...
Linux Basics for the Aspiring Hacker: Using Start-Up Scripts « Null Byte :: WonderHowTo
Very often we have processes in Linux that we want to always run in the background at startup. These would be processes that we need to start at bootup and always be available to us.If we are running a Linux distribution with a GUI (graphical user interface) likeKaliorUbuntu, we need the X11 process to be always runnin...
Hack Like a Pro: Metasploit for the Aspiring Hacker, Part 6 (Gaining Access to Tokens) « Null Byte :: WonderHowTo
Welcome back, my tenderfoot hackers!Hacker newbies have an inordinate fixation onpassword cracking. They believe that cracking the password is the only way to gain access to the target account and its privileges. If what we really want is access to a system or other resources, sometimes we can get it without a password...
Null Byte & Null Space Labs Present: Wi-Fi Hacking, MITM Attacks & the USB Rubber Ducky « Null Byte :: WonderHowTo
Null Byte users have often requested video content, but the question has always been what format would best serve our community. This week, we partnered withNull Space Labs, a hackerspace in Los Angeles, to test the waters by hosting a series of talks on ethical hacking for students in Pasadena Computer Science Club. W...
Hack Web Browsers with BeEF to Control Webcams, Phish for Credentials & More « Null Byte :: WonderHowTo
People use browsers for all types of things, and in general, we trust a lot of personal information to them. That's why browsers are a perfect attack surface for a hacker, because the target may not even know they are infected and feed you all of the information you could want.To do this, you need to first trick the us...
How to Run Kali Linux as a Windows Subsystem « Null Byte :: WonderHowTo
Kali Linuxis known as being the de facto penetration-testing Linux distribution but can be a pain to use as an everyday OS — even more of a pain if that means carrying around a second laptop or the constant frustration of using the finicky Wi-Fi on virtual machines. But there's another option: installing a Kali subsyst...
Hacking Web Apps « Null Byte :: WonderHowTo
No content found.
Hack Like a Pro: How to Evade Detection Using Proxychains « Null Byte :: WonderHowTo
Welcome back, my novice hackers!The worst thing that can happen to any hacker is being detected by a security admin, the security technologies (IDS, firewall, etc.), or a forensic investigator.Every time we send a packet to our intended target, that packet contains our IP address in the IP header. When we make a TCP co...
Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 7 (Managing Permissions) « Null Byte :: WonderHowTo
Welcome back, my greenhorn hackers!I've been writingthese Linux tutorialsin an attempt to fill the void in the education of some aspiring hackers into the Linux operating system. There is a lot to know, and in this tutorial, we'll look at Linux file permissions.Step 1: Checking PermissionsWhen we want to find the permi...
Python Training « Null Byte :: WonderHowTo
No content found.
Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 19 (Linking Files) « Null Byte :: WonderHowTo
Welcome back, my aspiring hackers!As you have probably discovered by now, the file system inLinuxis structured differently from Windows. There are no physical drives—just a logical file system tree with root at the top (yes, I know, roots should be at the bottom, but this is an upside-down tree).In addition, filenames ...
How to Get Packet Injection Capable Drivers in Linux « Null Byte :: WonderHowTo
In thisNull Byte, we are going to be installing Packet Injection capable drivers in Linux. These are the open-source drivers required to sniff wireless traffic, inject packets to crack a wireless access point, and go into "monitor-mode". These drivers are superior because they are the fastest available drivers.I did th...
The Hacks of Mr. Robot: How to Send a Spoofed SMS Text Message « Null Byte :: WonderHowTo
Welcome back, my rookie hackers!As most of you know,Mr. Robotis probably the best hacker TV show ever! This is a great show about a cyber security engineer who is being enticed to hack the very corporation he's being paid to protect. This show is so good, I begana seriesto demonstrate how to do the hacks he uses in the...
Linux Basics « Null Byte :: WonderHowTo
No content found.
How to Hack Databases: Hunting for Microsoft's SQL Server « Null Byte :: WonderHowTo
Welcome back, my fledgling hackers!The database is the hacker's "pot-of-gold," as it contains information that is very valuable to both the business and the hacker. In this, the second of myseries on hacking databases, we're on the "hunt" for Microsoft's SQL Server.Although far from the most commonly used database (Ora...
How to Hijack Chromecasts with CATT to Display Images, Messages, Videos, Sites & More « Null Byte :: WonderHowTo
Giving up your Wi-Fi password can be giving up more control than you think. Because of the wayChromecastand other IoT devices communicate, anyone on the same Wi-Fi network as your device can often make it do whatever they want. With a script called "Cast All the Things," we can hijack a Chromecast to play nearly any ki...
How to GPU Accelerate Cracking Passwords with Hashcat « Null Byte :: WonderHowTo
How to Crack Passwords Faster by Putting Your GPU to Work with HashcatSecurity on the internet isalwayschanging. Not too long ago, having a 10 character password meant that you were safe from all forms of hash cracking. Hash cracking is when you take a string of characters that have been passed through a cryptographic ...
How to Use Metasploit's Timestomp to Modify File Attributes & Avoid Detection « Null Byte :: WonderHowTo
It is said that the best way toavoid detectionwhen hacking is to leave no trace, and often that means not touching thefilesystemat all. But realistically, in most cases, it's impossible not to interact with the filesystem in one way or another. The next best thing to do to throw off any investigators is to change the f...
How to Hack Radio Frequencies: Hijacking FM Radio with a Raspberry Pi & Wire « Null Byte :: WonderHowTo
Inour first part on software-defined radio and signals intelligence, we learned how to set up a radio listening station to find and decode hidden radio signals — just like the hackers who triggered the emergency siren system in Dallas, Texas, probably did. Now that we can hear in the radio spectrum, it's time to explor...
How to Generate Private Encryption Keys with the Diffie-Hellman Key Exchange « Null Byte :: WonderHowTo
When we are building programs that communicate over a network, how can we keep our data private? The last thing we want is some other lousy hacker sniffing our packets, so how do we stop them? The easy answer: encryption. However, this is a very wide-ranging answer. Today we're going to look specifically at how to encr...
How to Exploit EternalBlue on Windows Server with Metasploit « Null Byte :: WonderHowTo
Particular vulnerabilities and exploits come along and make headlines with their catchy names and impressive potential for damage. EternalBlue is one of those exploits. Originally tied to the NSA, this zero-day exploited a flaw in the SMB protocol, affecting many Windows machines and wreaking havoc everywhere. Here, we...
Hack Web Browsers with BeEF to Control Webcams, Phish for Credentials & More « Null Byte :: WonderHowTo
People use browsers for all types of things, and in general, we trust a lot of personal information to them. That's why browsers are a perfect attack surface for a hacker, because the target may not even know they are infected and feed you all of the information you could want.To do this, you need to first trick the us...
The Top 80+ Websites Available in the Tor Network « Null Byte :: WonderHowTo
There are nearly100,000 unique onion service addressesonline withover two million peopleusing Tor every single day. Join me as I explore a small fraction of what the Tor network has to offer.It's puzzling to imagine about 100,000 .onion websites in existence. Readers who use Tor daily might think this number is inaccur...
Hack Like a Pro: How Antivirus Software Works & How to Evade It, Pt. 1 « Null Byte :: WonderHowTo
Welcome back, my tenderfoot hackers!As hackers, we often are required to get past antivirus (AV) software or other security measures. To do so effectively, we need to have some understanding of how AV software works. In this tutorial, we will take a cursory view of how AV software works so that you can better strategiz...
Prep for a Lucrative Project Management Career with These Courses « Null Byte :: WonderHowTo
More and more tech-savvy leaders are flocking to the lucrative and exciting world of project management thanks to the high-pay, analytical environment, and nearly unparalleled flexibility. But this means that competition for the best positions in this dynamic field is fierce. If you want to stand out from the crowd, yo...
Hack Like a Pro: How to Conduct Active Reconnaissance on Your Target with hping3 « Null Byte :: WonderHowTo
Welcome back, my budding hackers!One of the most time-consuming, but necessary, activities in hacking isreconnaissance. Before we can hack a system, we need to know what operating system it's running, what ports are open, what services are running, and hopefully, what applications are installed and running.Good reconna...
Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 22 (Samba) « Null Byte :: WonderHowTo
Welcome back, my aspiring hackers!Those of you who use Windows in a LAN environment understand that Windows machines can share directories, files, printers, etc. using "shares." This protocol dates back to the 1980s when the then dominant computer firm, IBM, developed a way for computers to communicate over the LAN by ...
Top 10 Things to Do After Installing Kali Linux « Null Byte :: WonderHowTo
Kali Linux, by default, probably doesn't have everything you need to get you through day-to-day penetration testing with ease. With a few tips, tricks, and applications, we can quickly get started using Kali like a professional white hat.Most Linux distributions are highly customizable. This makes personalizing your pe...
How to Hunt Down Wi-Fi Devices with a Directional Antenna « Null Byte :: WonderHowTo
If you've ever wanted to track down the source of a Wi-Fi transmission, doing so can be relatively easy with the right equipment.Using adirectional Wi-Fi antennaandWireshark, we can create a display filter to target any device in range to plot the signal strength on a graph. By sweeping the antenna back and forth, we c...
SQL Injection 101: How to Fingerprint Databases & Perform General Reconnaissance for a More Successful Attack « Null Byte :: WonderHowTo
Know thy enemy — wise words that can be applied to many different situations, includingdatabase hacking. It is essential to performing adequatereconnaissanceon a system before even thinking about launching an attack — any type of attack — and this is no different for SQL injection.The first part of this series covered ...
How to Use Meterpeter on OS X « Null Byte :: WonderHowTo
Hello all, this is my first submission to null byte! I noticed something a little strange, particularly that whenever Meterpreter is discussed, it is virtually always in the context of Windows. Granted, the Windows Meterpreter is more powerful than the version that can run on OS X (it has several more commands/options)...
Is Your Website Vulnerable to XSS Injections? Here's How to Protect Your Visitors « Null Byte :: WonderHowTo
Injectionis an attack vector that involves breaking out of a data context and switching into a programming context through the use of special characters. These characters are significant to the interpreter being used, but not needed for the general user input being asked for.Cross-site scripting, commonly known asXSS, ...
Hacking Windows 10: How to Use SSH Tunnels to Forward Requests & Hack Remote Routers « Null Byte :: WonderHowTo
Without admin privileges, installing additional software, or modifying the Windows 10 firewall, an attacker can alter a router and perform avariety of exploits. It's accomplished by forwarding requests from Kali through a backdoored Windows computer to the router gateway with simple SSH tunnels.The attack I'll be outli...
Hack Like a Pro: The Basics of the Hexadecimal System « Null Byte :: WonderHowTo
Welcome back, my novice hackers!It has become clear from some of your questions that quite a few of you are unfamiliar with the hexadecimal system, or simply, hex. The hexadecimal system is used throughout computing and if you have never studied this Base16 numering system, it may appear relatively opaque.For those of ...
How to Find Passwords in Exposed Log Files with Google Dorks « Null Byte :: WonderHowTo
You may not have thought of dorks as powerful, but with the right dorks, you can hack devices just by Googling the password to log in. Because Google is fantastic at indexing everything connected to the internet, it's possible to find files that are exposed accidentally and contain critical information for anyone to se...
Raspberry Pi: Physical Backdoor Part 2 « Null Byte :: WonderHowTo
In my lastpostI introduced how to use ncat to connect to your Pi remotely, but what's the point to if you can't actually hack? This tutorial I'm gonna show you how to use very simple tools for a much bigger purpose. With that said, boot up our Pi and lets wreck havoc.ReconI should say that this is a experimental concep...
Hack Like a Pro: How to Crack Passwords, Part 5 (Creating a Custom Wordlist with CeWL) « Null Byte :: WonderHowTo
Welcome back, my novice hackers!In my series oncracking passwords, I began by showing off some basicpassword-cracking principles; developed anefficient password-cracking strategy; demonstrated how to useHashcat, one of the most powerful password-cracking programs; and showed how to create a custom wordlist usingCrunch....
How to Write Your Own Bash Scripts to Automate Tasks on Linux « Null Byte :: WonderHowTo
Bash scripting is a convenient way to automate things on any Linux system, and we're going to use it here to automate certain tasks we use all the time.Bash is a simple language for stringing together several different Linux utilities. Its simplicity makes it easy for beginners to create lots of scripts that would othe...
Hack Like a Pro: Metasploit for the Aspiring Hacker, Part 10 (Finding Deleted Webpages) « Null Byte :: WonderHowTo
Welcome back, my greenhorn hackers!Throughoutthis series on Metasploit, and in most of my hacking tutorials here on Null Byte that use Metasploit (there are many; type "metasploit" into the search bar and you will find dozens), I have focused primarily on just two types of modules: exploits and payloads. Remember, Meta...