title stringlengths 30 147 | content stringlengths 17 61.4k |
|---|---|
Xbox LIVE Achievement: How to Earn Free Microsoft Points with Social Engineering « Null Byte :: WonderHowTo | Sometimes, paying for the whole Xbox LIVE service might seem like a waste of money. You're constantly experiencing lag, you've got people modding and cheating, kids are being loud and obnoxious over the mic, and your kill-to-death ratio is getting dumped on. Basically, the whole multiplayer experience just isn't cuttin... |
How to Score Free Game Product Keys with Social Engineering « Null Byte :: WonderHowTo | Lost the product key for your game? If you have to reinstall the game and don't have that key anymore, you're out of luck, especially if you didn't "buy" the game. But never be in fear of losing product keys again with today's Null Byte, where we'll be practicing a little bit of mind-kung fu.Social manipulation is ahug... |
How to Inconspicuously Sniff Wi-Fi Data Packets Using an ESP8266 « Null Byte :: WonderHowTo | If you want to get startedsniffing Wi-Fi networks, you usually need to start witha wireless network adapter. But thanks to a Wi-Fi sniffing library written in Arduino and the ultra-cheap ESP8266 chip, you might not need one. For less than $10 in electronics, you can build a tiny Arduino Wi-Fi sniffer that savesWireshar... |
Linux Basics for the Aspiring Hacker: Configuring Apache « Null Byte :: WonderHowTo | Welcome back, my hacker novitiates!In an earlierLinux Basicstutorial, I had demonstratedthe basics of the Apache web server. Since Apache is the world's most widely used web server on the Internet (as of July 2015, Apache was 38%, IIS was 26%, and Nginx is 15%), the more you know about it and understand it, the more su... |
Hack Like a Pro: Metasploit for the Aspiring Hacker, Part 1 (Primer & Overview) « Null Byte :: WonderHowTo | Welcome back, my tenderfoot hackers!I have written many tutorials on hacking usingMetasploit, includingleaving no evidence behindandexploring the inner architecture. Also, there are my Metasploit cheat sheets forcommandsandhacking scripts.With this guide, I'm starting a sequential and cumulativeseriesfor learning and u... |
How to Hack Facebook & Gmail Accounts Owned by MacOS Targets « Null Byte :: WonderHowTo | It only takes a few commands to manipulate a MacBook's secure HTTPS traffic and pluck login passwords out of the encrypted data. Let's take Facebook and Gmail hacking to the next level by intercepting Safari and Google Chrome web traffic in real time.Both Facebook and Gmail have exceptional web application security pra... |
How to Use & Abuse the Address Resolution Protocol (ARP) to Locate Hosts on a Network « Null Byte :: WonderHowTo | When joining a new network, computers use the Address Resolution Protocol to discover the MAC address of other devices on the same network. A hacker can take advantage of ARP messages to silently discover the MAC and IP address of network devices or actively scan the network with spoofed ARP requests.Why Do We Need ARP... |
Use Upip to Load MicroPython Libraries onto a Microcontroller Over Wi-Fi « Null Byte :: WonderHowTo | MicroPython is an exciting language to use on ESP8266 boards and ESP32-based microcontrollers, but it doesn't always include all of the libraries you'll need for a specific project. This issue is less of a problem, thanks to the upip package manager.Upip lets you download any package in the standardMicroPythonlibrary o... |
Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 1 (Tools & Techniques) « Null Byte :: WonderHowTo | Welcome back, my tenderfoot hackers!So many readers in theNull Bytecommunity have been asking me questions about evading detection and hacking undetected that I decided to start a new series ondigital forensics.I applaud each of you for your concern, as the last thing I want to see is one of you getting caught and spen... |
Introduction to Botnets and RATs : Part 1 « Null Byte :: WonderHowTo | Hello everyone. I'm Calypsus and i've been around for a while learning from various tutorials, expanding my knowledge and this is one of the best platforms for newbies to sharpen the skills. Today i decided to register myself and contribute to this wonderful community. Since this is my first post, any kind of feedback ... |
Hack Like a Pro: How to Exploit Adobe Flash with a Corrupted Movie File to Hack Windows 7 « Null Byte :: WonderHowTo | Welcome back, my greenhorn hackers!In my continuing effort to demonstrate to you how to hack the ubiquitous Windows 7, we will going after that notoriously vulnerable Adobe Flash that is on nearly every client Windows system (you are not likely to find it on servers).Flash and the other Adobe products have had a reputa... |
Hack Like a Pro: How to Find Almost Every Known Vulnerability & Exploit Out There « Null Byte :: WonderHowTo | Welcome back, my nascent hackers!Earlier, I wrote a guide onfinding operating system and application vulnerabilitiesin Microsoft's own security bulletins/vulnerability database. In this tutorial, I will demonstrate another invaluable resource for finding vulnerabilities and exploits by using theSecurityFocusdatabase.Mo... |
How to Use Commix to Automate Exploiting Command Injection Flaws in Web Applications « Null Byte :: WonderHowTo | The ability to execute system commands via a vulnerable web application makescommand injectiona fruitful attack vector for any hacker. But while this type of vulnerability is highly prized, it can often take quite a bit of time to probe through an entire application to find these flaws. Luckily, there is a useful tool ... |
Hack Like a Pro: Metasploit for the Aspiring Hacker, Part 5 (Msfvenom) « Null Byte :: WonderHowTo | Welcome back, my hacker novitiates!Eluding andevading antivirus softwareand intrusion detection systems is one of the most critical tasks of the hacker. As soon as a new exploit is developed and discovered, the AV and IDS developers build a signature for the attack, which is then likely to be detected and prevented.One... |
Advanced Penetration Testing - Part 1 (Introduction) « Null Byte :: WonderHowTo | Hello! My name is An0nex. I am an ethical hacker who wants to share the art of hacking with all of you guys!Reconnaissance is a big part in the hacking community.Penetration testing is most effective when you have a good grasp on the environment being tested. If you're an ethical hacker, penetration testing as a job, e... |
How to Write Your Own Subdomain Enumeration Script for Better Recon « Null Byte :: WonderHowTo | There are tons of tools out there that do all kinds of recon, but it can be hard to narrow down what to use. A great way to be more efficient is by taking advantage of scripting. This doesn't have to mean writing everything from scratch — it can simply mean integrating existing tools into a single, comprehensive script... |
How to Use MSFconsole's Generate Command to Obfuscate Payloads & Evade Antivirus Detection « Null Byte :: WonderHowTo | One of the things that sets aseasoned hackerapart from thescript kiddiesis the ability to effectively sneak past antivirus defenses when executing an attack. One way to do this is to usecustom shellcodein an exploit. Not everyone is an expert at writing shellcode, but luckily there's an easy way to do this that is both... |
Hack Like a Pro: Snort IDS for the Aspiring Hacker, Part 3 (Sending Intrusion Alerts to MySQL) « Null Byte :: WonderHowTo | Welcome back, my hacker novitiates!If you have been following thisnew Snort series, you know that Snort is the world's most widely used intrusion detection/protection system. Now a part of the world's largest network equipment company, Cisco, it is likely to be found everywhere in one form or another. This makes a comp... |
Hack Like a Pro: How to Crash Your Roommate's Windows 7 PC with a Link « Null Byte :: WonderHowTo | In myfirst few articles, we focused on operating system hacks. These hacks have been primarily on older operating systems such as Windows XP, Windows Vista, and Windows Server 2003.Although these operating systems were first released, in some cases, almost 10 years ago, they are still in wide use. I have done consultin... |
Bypass Antivirus Software by Obfuscating Your Payloads with Graffiti « Null Byte :: WonderHowTo | It's exciting to get that reverse shell or execute a payload, but sometimes these things don't work as expected when there are certain defenses in play. One way to get around that issue is by obfuscating the payload, and encoding it using different techniques will usually bring varying degrees of success. Graffiti can ... |
Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 14 (MySQL) « Null Byte :: WonderHowTo | Welcome back, my greenhorn hackers!This tutorial will be the fourtenth in theLinux for hackersseries and will focus on the MySQL database. Although this is not strictly a Linux tutorial, MySQL is the database of choice on most Linux distributions. In addition, it is the most widely used database behind database driven ... |
How to Use a Directional Antenna with ESP8266-Based Microcontroller « Null Byte :: WonderHowTo | Microcontrollers likeESP8266-based boardshave built-in Wi-Fi, and that's really cool, but what's even cooler is that certain pro models of the D1 Mini also have a port where you can connect a directional antenna. This can give you exceptional range, but if you were to just plug one in after opening the package, it most... |
Turn Any Phone into a Hacking Super Weapon with the Sonic « Null Byte :: WonderHowTo | TheWatch Dogs video game seriescame out in 2014, enamoring audiences with the idea of a seemingly magical smartphone that could change traffic signals, hack web cameras, and even remotely control forklifts. This may sound like science fiction, butThe Sonicuses a customized flavor of Kali Linux to allow you to unleash t... |
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack « Null Byte :: WonderHowTo | Cracking the password for WPA2 networks has been roughly the same for many years, but a newer attack requires less interaction and info than previous techniques and has the added advantage of being able to target access points with no one connected. The latest attack against the PMKID uses Hashcat to crack WPA password... |
Break into Game Development with This $40 Bundle « Null Byte :: WonderHowTo | It's a common and unfortunate myth that you need to work in web or app development if you have a knack for coding and design. In fact, more and more development pros are entering the exciting and increasingly lucrative world of game design, thanks to a growing demand for strategy games that can be played on multiple pl... |
Take Control of Your iOS Data with This All-in-One Management App « Null Byte :: WonderHowTo | We know our Null Byte readers would like to see some iPhone-hacking scenarios on the site soon, but until we get some of those up, we understand that some of you actually use an iPhone as your primary phone. If that's you, and you would like an easier way to get information from point A (your iPhone) to point B (your c... |
Hack Like a Pro: Capturing Zero-Day Exploits in the Wild with a Dionaea Honeypot, Part 1 « Null Byte :: WonderHowTo | Welcome back, my greenhorn hackers!The Holy Grail of any hacker is to develop azero-day exploit—an exploit that has never been seen by antivirus (AV) and other software developers, as well as intrusion detection system (IDS) developers. In that way, you can exploit systems with your newly discovered vulnerability with ... |
Hack Like a Pro: How to Install & Use a Secure IRC Client with OTR « Null Byte :: WonderHowTo | Welcome back, my amateur hackers!As many of you know, Null Byte will soon be re-establishing its IRC channel. In preparation of that event, I want to show how to set up a secure IRC client with OTR, orOff the Record.OTR does all the right things to make your instant messages secure; AES encryption, Diffie-Hellman key e... |
How to Program a $6 NodeMCU to Detect Wi-Fi Jamming Attacks in the Arduino IDE « Null Byte :: WonderHowTo | Hackers and makers are often grouped under the same label. While hackers draw on computer science skills to write programs and find bugs, makers use electrical engineering to create hardware prototypes from microprocessor boards like theArduino. We'll exercise both sets of skills to program a $6 NodeMCU to display the ... |
Hack Like a Pro: Metasploit for the Aspiring Hacker, Part 14 (Creating Resource Script Files) « Null Byte :: WonderHowTo | Welcome back, my budding hackers!Inthis series, I have been trying to familiarize you with the many features of the world's best framework for exploitation, hacking, and pentesting, Metasploit. There are so many features, and techniques for using those features, that few pentesters/hackers are aware of all of them.Many... |
How to Attack Web Applications with Burp Suite & SQL Injection « Null Byte :: WonderHowTo | Web applications are becoming more and more popular, replacing traditional desktop programs at an accelerated rate. With all these new apps out on the web comes various security implications associated with being connected to the internet where anyone can poke and prod at them. One of the simplest, yet the most prevale... |
Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 17 (Client DNS) « Null Byte :: WonderHowTo | Welcome back, my aspiring hackers!Domain Name System (DNS) is one of those things we seldom think about unless it doesn't work. Then, it can be very frustrating when we attempt to navigate to a website and we get that frustrating error message.DNS enables us to type in a domain name in our browser, such aswonderhowto.c... |
Use Banner Grabbing to Aid in Reconnaissance & See What Services Are Running on the System « Null Byte :: WonderHowTo | As we've seen with other tools and utilities, administrators typically use certain things to do their job more efficiently, and those things are often abused by attackers for exploitation. After all, hacking is just the process of getting a computer to do things in unexpected ways. Today, we will be covering various me... |
How to Set Up a Headless Raspberry Pi Hacking Platform Running Kali Linux « Null Byte :: WonderHowTo | TheRaspberry Piis a credit card-sized computer that can crack Wi-Fi, clone key cards, break into laptops, and even clone an existing Wi-Fi network to trick users into connecting to the Pi instead. It can jam Wi-Fi for blocks, track cell phones, listen in on police scanners, broadcast an FM radio signal, andapparently e... |
Advice from a Real Hacker: How to Create Stronger Passwords « Null Byte :: WonderHowTo | People who know that I am aprofessional hackeroften ask me what they can do to make their computers and personal information safe from people like me. The answer, of course, is that nothing will make you completely safe, but there are a number of measures any computer user can take to reduce the chances of being a vict... |
Hack Like a Pro: How to Crack Passwords, Part 1 (Principles & Technologies) « Null Byte :: WonderHowTo | Welcome back, my neophyte hackers!I have already done a few tutorials on password cracking, including ones forLinuxandWindows,WEPandWPA2, and even online passwords usingTHC Hydra. Now, I thought it might be worthwhile to begina series on password crackingin general. Password cracking is both an art and a science, and I... |
Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 13 (Mounting Drives & Devices) « Null Byte :: WonderHowTo | Welcome back, my aspiring hackers!One of those areas ofLinuxthat Windows users invariably struggle with is the concept of "mounting" devices and drives. In the Windows world, drives and devices are automatically "mounted" without any user effort or knowledge. Well, maybe a bit of knowledge. Most Windows users know to u... |
How Hackers Use Hidden Data on Airline Boarding Passes to Hack Flights « Null Byte :: WonderHowTo | Millions of travelers pass through airports each day without understanding how powerful and insecure a boarding pass can be. Anyone can scan the boarding pass barcode with a mobile app, allowing access to frequent-flyer accounts and even a passenger's temporary airline account. In this guide, we will explore how hacker... |
Learn the Ins & Outs, Infrastructure & Vulnerabilities of Amazon's AWS Cloud Computing Platform « Null Byte :: WonderHowTo | While we haven't covered Amazon Web Services, or AWS, on Null Byte before, Amazon's cloud computing platform is ripe for attack by hackers, pentesters, and cybersecurity researchers. It's also an excellent cloud hosting service to build or usevulnerable-by-design AWS setups and frameworks.AWS buckets are aparticularly ... |
Recon: How to Research a Person or Organization Using the Operative Framework « Null Byte :: WonderHowTo | TheOperative Frameworkis a powerful Python-based open-source intelligence (OSINT) tool that can be used to find domains registered by the same email address, as well as many other investigative functions. This reconnaissance tool provides insight about your target through examining relationships in the domains they own... |
How to Use Websploit to Scan Websites for Hidden Directories « Null Byte :: WonderHowTo | Websites are often misconfigured in ways that allow an attacker to view directories that are not ordinarily meant to be seen. These directories can contain sensitive information such as private credentials or configuration files that can be used to devise an attack against the server. With a tool called Websploit, hack... |
How to Extract Bitcoin Wallet Addresses & Balances from Websites with SpiderFoot CLI « Null Byte :: WonderHowTo | While there are completely legitimate reasons to use Bitcoin, it's also used by terrorists, drug dealers, and other shady people that need to be investigated. That's where SpiderFoot comes in, which has a command-line interface to search for Bitcoin wallet addresses on a website and query the balances associated with t... |
The Hacks of Mr. Robot: How to Use the Shodan API with Python to Automate Scans for Vulnerable Devices « Null Byte :: WonderHowTo | Shodancalls itself "the search engine for internet-connected devices." With so many devices connected to the internet featuring varying levels of security, the special capabilities of this search engine mean it can provide a list of devices to test and attack. In this tutorial, we'll use Python to target specific softw... |
How to Wardrive with the Kali Raspberry Pi to Map Wi-Fi Devices « Null Byte :: WonderHowTo | Surveying a target's Wi-Fi infrastructure is the first step to understanding the wireless attack surface you have to work with.Wardriving has been around since the '90s and combines GPS data and Wi-Fi signal data to create accurate, in-depth maps of any nearby Wi-Fi networks you come within range of. Today, you'll lear... |
Weekend Homework: How to Become a Null Byte Contributor (2/10/2012) « Null Byte :: WonderHowTo | We're officially seeking Null Byters on a weekly basis who are willing to take the time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page ofWonderHowTo(IF up to par, of course). There is no need to be intimidated if you fear you lack the... |
Hacker Hurdles: DEP & ASLR « Null Byte :: WonderHowTo | This is the first installment in a new series that I am calling "Hacker Hurdles." These are things, methods, techniques that make our job as hackers more challenging and difficult. Don't misunderstand me, these items don't make our task impossible, but rather more challenging and, therefore, more gratifying when we are... |
SQL Injection 101: Common Defense Methods Hackers Should Be Aware Of « Null Byte :: WonderHowTo | Database technology has vastly improved the way we handle vast amounts of data, and almost every modern application utilizes it in one way or another. But the widespread use of databases naturally invites a slew ofvulnerabilitiesand attacks to occur.SQL injectionhas been around for awhile, and as such, there are many d... |
How to Advanced Techniques to Bypass & Defeat XSS Filters, Part 2 « Null Byte :: WonderHowTo | Cross-site scripting can be one of the easiest vulnerabilities to discover, but to be successful with this type of attack, it is essential to learn how to get past filters. In theprevious guide, we explored some ways to do this, such as abusing attributes and event handlers and tricking the application into accepting u... |
How to Wardrive on an Android Phone to Map Vulnerable Networks « Null Byte :: WonderHowTo | Tossing anold Android smartphonewith a decent battery into your hacking kit can let you quickly map hundreds of vulnerable networks in your area just by walking or driving by them. The practice of wardriving uses a Wi-Fi network card and GPS receiver to stealthily discover and record the location and settings of any ne... |
Hack Like a Pro: The Ultimate Social Engineering Hack « Null Byte :: WonderHowTo | Welcome back, my greenhorn hackers!Although we have focused primarily on technical hacks here, social engineering can sometimes be especially effective. This one requires a bit of technical skill, but not too much. In addition, it's limited by how specific a target you can choose—but itwillwork.What Is Social Engineeri... |
Weekend Homework: How to Become a Null Byte Contributor (2/17/2012) « Null Byte :: WonderHowTo | Grab your thinking caps and get your hack on. Null Byte is officially seeking contributors on a weekly basis who are willing to take the time to educate the Null Byte community on anything, from hardware hacks to life hacks. Contributors that write tutorials will be featured on theNull Byte blog, as well as the front p... |
How to Share Wi-Fi Adapters Across a Network with Airserv-Ng « Null Byte :: WonderHowTo | If you want to carry a variety of network adapters without looking suspicious, a perfect solution is accessing them through Airserv-ng. Tucked away in the Aircrack-ng suite, this tool allows a hacker to plug any number of network adapters into a Raspberry Pi and access them over a Wi-Fi or Ethernet connection.Hacking W... |
How to Use a Raspberry Pi as a Dead Drop for Anonymous Offline Communication « Null Byte :: WonderHowTo | APirateBoxcreates a network that allows users to communicate wirelessly, connecting smartphones and laptops even when surrounding infrastructure has been disabled on purpose or destroyed in a disaster. Using aRaspberry Pi, we will make a wireless offline server that hosts files and a chat room as an educational databas... |
The Beginner's Guide to Defending Against Wi-Fi Hacking « Null Byte :: WonderHowTo | Hacking Wi-Fiis a lot easier than most people think, but the ways of doing so are clustered around a few common techniques most hackers use. With a few simple actions, the average user can go a long way toward defending against the five most common methods of Wi-Fi hacking, which include password cracking, social engin... |
How to Play Emulated Games on Linux with Your Xbox 360 Controller « Null Byte :: WonderHowTo | I have to say, the Xbox 360 controller is the best controller ever created. When I first held it back in 2005, I swore that the dudes working at Microsoft came over and took a molding of my hands because of how great it felt. The thing felt like it wasborn there.What's even better about the 360 controller, is that the ... |
Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 2 (Creating Directories & Files) « Null Byte :: WonderHowTo | In myfirst tutorial on Linux basics, I discussed the importance of hackers using Linux and the structure of the directory system. We also looked briefly at thecdcommand. In this second Linux guide, I'll spend a bit more time with changing directories, listing directories, creating files and directories, and finally, ge... |
Tor « Null Byte :: WonderHowTo | No content found. |
Hack Like a Pro: Snort IDS for the Aspiring Hacker, Part 1 (Installing Snort) « Null Byte :: WonderHowTo | Welcome back, my neophyte hackers!In the world of information security, the most common intrusion detection system (IDS) you will ever encounter isSnort. As you probably already know, an IDS works similarly to antivirus (AV) software on your desktop; It attempts to identify malicious software on your network and warns ... |
How to Hack Wi-Fi Using Wifite in Kali « Null Byte :: WonderHowTo | Welcome, my aspiring hackers!In this tutorial I'm gonna be showing you how to hack Wi-Fi using the wps compatibility of a router, in , of course, Kali.First, fire up Kali.Then, open up a terminal and typewifite.Wait for a minute, and watch closely as the BSSIDs begin to appear.See if the router you wanna hack hasyesin ... |
How to Shorten URLs from the Command Line with Python « Null Byte :: WonderHowTo | Shortening URLs has become a necessity in this age ofTwitterand limited-character status updates. It not only allows us to cram more words into our oh-so-important Twitter statuses, but it also helps us with a few other things.Some Benefits of URL ShortenersWe can create temporary URLs. The URLs created by a URL shorte... |
How to Identify Antivirus Software Installed on a Target's Windows 10 PC « Null Byte :: WonderHowTo | Determining the antivirus and firewall software installed on a Windows computer is crucial to an attacker preparing to create a targeted stager or payload. With covert deep packet inspection, that information is easily identified.This attack assumes the Wi-Fi password to the target network isalready known. With the pas... |
How to Spy on the Web Traffic for Any Computers on Your Network: An Intro to ARP Poisoning « Null Byte :: WonderHowTo | When your computer first connects to a nework, it sends out a request on the network to lease an IP from the router. The router then leases your computer an unused IP address, which is used as a unique routing address for sending traffic that is meant foryou, to you. As everything tends to, this method has its flaws.Wh... |
How to Detect Misconfigurations in 'Anonymous' Dark Web Sites with OnionScan « Null Byte :: WonderHowTo | Configuring onion services for the first time can be tricky. A surprising number of system administrators make seemingly trivial mistakes that ultimately lead to catastrophic cases of de-anonymizing supposedlyanonymoussites on the dark web.OnionScanis a tool designed to identify common misconfigurations in onion servic... |
Hack Like a Pro: Advanced Nmap for Reconnaissance « Null Byte :: WonderHowTo | Welcome back, my novice hackers!Reconnaissanceis one of the most important preparatory steps to hacking. As I have emphasized many times before here on Null Byte, you must know the operating system, the ports, the services, the applications, and sometimes even the language of the target to be effective. If you haven't ... |
How to Take Control of Sonos IoT Devices with Python « Null Byte :: WonderHowTo | Many popular IoT devices have terrible security. For instance, a hacker who's on the same Wi-Fi network as aSonos speakercan assume direct control over the device's behavior. If an IoT device doesn't secure the messages used to control it over a network, it's easy for somebody to write a few Python scripts to make it d... |
Hacking macOS: How to Hide Payloads Inside Photo Metadata « Null Byte :: WonderHowTo | Complex shell scripts can be implanted into photo metadata and later used to exploit a MacBook. In addition to obfuscating the true nature of an attack, this technique can be used to evade network firewalls as well as vigilant sysadmins.In this attack scenario, a malicious command will be embedded directly into the EXI... |
Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 2 (Network Forensics) « Null Byte :: WonderHowTo | Welcome back, my hacker apprentices!I recentlybegana new series ondigital forensicsto show aspiring hackers what the forensic investigator can do and see while investigating a cyber attack. This is the second installment in that series and will focus upon network forensics. In other words, what can a network forensic i... |
Scripting « Null Byte :: WonderHowTo | No content found. |
How to Find Anyone's Private Phone Number Using Facebook « Null Byte :: WonderHowTo | Facebookreally wants your phone number, nagging you for one as soon as you join. This isn't all bad since it can help secure your account withtwo-factor authentication. On the flipside, this makes it easy to reveal the private phone numbers of virtually anyone on Facebook, including celebrities and politicians. We're g... |
DB Hacking « Null Byte :: WonderHowTo | No content found. |
How to Hack Wi-Fi: Getting Started with the Aircrack-Ng Suite of Wi-Fi Hacking Tools « Null Byte :: WonderHowTo | Welcome back, my fledgling hackers!In the first part of my series onWi-Fi hacking, we discussed thebasic terms and technologiesassociated with Wi-Fi. Now that you have a firm grip on what Wi-Fi is exactly and how it works, we can start diving into more advance topics onhow to hack Wi-Fi.In this article, we'll take a lo... |
Fingerprint Web Apps & Servers for Better Recon & More Successful Hacks « Null Byte :: WonderHowTo | Web applicationsare ubiquitous in the modern online world, and knowing how to attack them is an increasingly valuable skill. But the key to a successful attack is good recon since it's easier to be focused and efficient with the more information you have. There are many fingerprinting tools available, such ashttprintan... |
How to Set Up Network Implants with a Cheap SBC (Single-Board Computer) « Null Byte :: WonderHowTo | With a cheap computer,smaller than the Raspberry Pi, an attacker can create a remote hacking device. The device can be attached to a target router without anyone's knowledge and enable the hacker to perform a variety of network-based attacks from anywhere in the world.As the name infers,network implantsare small, physi... |
Punchabunch Just Made SSH Local Forwarding Stupid Easy « Null Byte :: WonderHowTo | SSH local forwarding is a must for covering your tracks and getting out there to do your work. Also called SSH tunneling, this process will put one or more steps between your machine and the machine you're working on, for security and other purposes. It can be a bit daunting for newbies to get down, and that's wherePun... |
Hack Like a Pro: How to Fingerprint Web Servers Using Httprint « Null Byte :: WonderHowTo | Welcome back, my greenhorn hackers!Earlier inthis series, I showed a you a couple of different ways of fingerprinting webservers. Probably the easiest way, is to usenetcatand connect to port 80 and pull the webserver banner.The banner is simply the application advertising what it is. Webserver administrators who are vi... |
Electricity Basics « Null Byte :: WonderHowTo | No content found. |
How to Push and Pull Remote Files Securely Over SSH with Pipes « Null Byte :: WonderHowTo | You can use a secure shell to route traffic or access files, but there's something else you can do. Transfer files. There are loads of solutions for transferring files, like Dropbox, FTP, torrents, etc., but what about for a special ordeal? Most commonly, the way people get shells are from free servers online.The reaso... |
Discover XSS Security Flaws by Fuzzing with Burp Suite, Wfuzz & XSStrike « Null Byte :: WonderHowTo | Cross-site scriptingis one of the most common vulnerabilities found on the web today, with repercussions of this type of flaw ranging from harmless defacement to sensitive data exposure. Probing for XSS can be tedious and time-consuming for an attacker, but luckily there are tools available to make things a little easi... |
How to Get Free Wi-Fi from Hotels & More « Null Byte :: WonderHowTo | Often times when staying at a hotel or anywhere for that matter, you'll whip out your laptop and check the local area for Wi-Fi. I know you've all been in my shoes when you find an unsecured network that appears to be public Wi-Fi belonging to the hotel or airport, and you connect to it. You connect fast and perfectly,... |
Hack Like a Pro: How to Use the New p0f 3.0 for OS Fingerprinting & Forensics « Null Byte :: WonderHowTo | Welcome back, my fledgling hackers!A short while ago, I did a tutorial onconducting passive OS fingerprinting with p0f. As you remember, p0f is different from other operating system fingerprinting tools as it does not send any packets to the target, instead it simply takes packets off the wire and examines them to dete... |
Lock Down Your DNS with a Pi-Hole to Avoid Trackers, Phishing Sites & More « Null Byte :: WonderHowTo | ThePi-holeproject is a popular DNS-level ad blocker, but it can be much more than that. Its DNS-level filtering can also be used as a firewall of sorts to prevent malicious websites from resolving, as well as to keep privacy-killing trackers such as Google Analytics from ever loading in the browser. Let's take a look a... |
Play Wi-Fi Hacking Games Using Microcontrollers to Practice Wi-Fi Attacks Legally « Null Byte :: WonderHowTo | ESP8266-based microcontrollerscan be used to create exciting and legal Wi-Fi hacking games to test your or your friends' Wi-Fi hacking skills.When you first start learninghow to hack Wi-Fi, it can be tempting to use your powers on Wi-Fi networks you don't have permission to use. Needless to say, this can get you into a... |
Top 10 Browser Extensions for Hackers & OSINT Researchers « Null Byte :: WonderHowTo | While modern browsers are robust and provide a lot of functionality, they can be unlocked to do some pretty spectacular things with browser extensions. For hackers and OSINT researchers, these tools can be used to defeat online tracking, log in to SSH devices, and search the internet for clues during an investigation. ... |
How to Hack Any Account That Has Recovery via Phone Option Enabled (SMS) On Android: « Null Byte :: WonderHowTo | Hello Elite Hackers! Welcome to my 3rd Post, which explains how to hack any account like G-mail,Facebook, etc.You can also use this technique to hack/spoof messengers like Facebook or WhatsApp etc.Step 1: Fire-Up Kali:I hope you know how to hack android and gain access to it, if not follow my guide:HEREI am hacking on ... |
How to Discover & Attack Raspberry Pis Using Default Credentials with Rpi-hunter « Null Byte :: WonderHowTo | When setting up aRaspberry Pi, it's easy to overlook changing the default password. Like manyIoT devices, the Raspberry Pi's default Raspbian operating system installs with a widely-known default password, leaving the device vulnerable to remote access. Using a tool calledrpi-hunter, hackers can discover, access, and d... |
How to Easily Detect CVEs with Nmap Scripts « Null Byte :: WonderHowTo | Nmapis possibly the most widely used security scanner of its kind, in part because of its appearances in films such asThe Matrix ReloadedandLive Free or Die Hard. Still, most of Nmap's best features are under-appreciated by hackers and pentesters, one of which will improve one's abilities to quickly identify exploits a... |
How to Track a Target Using Canary Token Tracking Links « Null Byte :: WonderHowTo | Canary tokens are customizable tracking links useful for learning about who is clicking on a link and where it's being shared. Thanks to the way many apps fetch a URL preview for links shared in private chats, canary tokens can even phone home when someone checks a private chat without clicking the link. Canary tokens ... |
How to Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection « Null Byte :: WonderHowTo | Tohack a Wi-Fi network, you needyour wireless cardto support monitor mode and packet injection. Not all wireless cards can do this, but you can quickly test one you already own for compatibility, and you can verify that the chipset inside an adapter you're thinking of purchasing will work for Wi-Fi hacking.Wireless car... |
How to Flood Your ISP with Random, Noisy Data to Protect Your Privacy on the Internet « Null Byte :: WonderHowTo | Net neutrality is dead and your internet service providers can collect all the data they want. WhileVPNsare a great way to protect some of that privacy, they're not perfect. There is another option, though, calledNoisy, which was created byItay Hury. It floods your ISP with so much random HTTP/DNS noise that your data ... |
How to Spy on Your "Buddy's" Network Traffic: An Intro to Wireshark and the OSI Model « Null Byte :: WonderHowTo | Wouldn't it be nice to just sit at your buddy's house, plug into his network, and see exactly what he's doing? What if itwasas easy as that? What makes packet sniffers likeWiresharksuch potent tools is that a majority of local area networks (LANs) are based on the shared Ethernet notion.In a shared Ethernet, you can th... |
How to Use Metasploit's Web Delivery Script & Command Injection to Pop a Shell « Null Byte :: WonderHowTo | One of the best ways to improve your skills as a hacker is to learn to combine different avenues of attack to achieve success. What if it were possible to get a victim to connect to our machine and execute a chosen payload on our behalf? This is indeed possible with the almightyMetasploitand the aid of a technique know... |
How to Set Up Kali Linux on the New $10 Raspberry Pi Zero W « Null Byte :: WonderHowTo | In five short years, three generations of ultra-low-cost Raspberry Pi devices have challenged the boundaries of what a person can do with a $35 computer — especially with Kali Linux.With each Pi more powerful and cheaper than the last, the addition of thePi Zeroin 2015 took the same Broadcom BCM2835 processor from the ... |
Weekend Homework: How to Become a Null Byte Contributor (3/2/2012) « Null Byte :: WonderHowTo | Last week, we had a great contribution fromChristopher Voute, who introduced us all on some of thebasic moves in Python. Now, who else will share their knowledge and tackle some of the topics below?If you know a thing or two, don't hesitate to teach us what you've got, because we're looking for Null Byters on a weekly ... |
SPLOIT: How to Make a Proxy Server in Python « Null Byte :: WonderHowTo | NOTICE: Ciuffy will be answering questions related to my articles on my behalf as I am very busy. Hope You Have Fun !!!Hello Guys,Welcome to my tutorial and in this tutorial, We are basically going tocreate a python script that serves as a proxy server ( Without External Libraries ).I made this script when I had some k... |
How to Phish for Social Media & Other Account Passwords with BlackEye « Null Byte :: WonderHowTo | Social media accounts are a favorite target for hackers, and the most effective tactics for attacking accounts on websites likeFacebook,Instagram, andTwitterare often based on phishing. These password-stealing attacks rely on tricking users into entering their passwords into a convincing fake webpage, and they have bec... |
How to Hack Wi-Fi: Hunting Down & Cracking WEP Networks « Null Byte :: WonderHowTo | While the security behind WEP networks was broken in 2005, modern tools have made cracking them incredibly simple. In densely populated areas, WEP networks can be found in surprising and important places to this day, and they can be cracked in a matter of minutes. We'll show you how a hacker would do so and explain why... |
Hack Like a Pro: Digital Forensics Using Kali, Part 1 (The Tools of a Forensic Investigator) « Null Byte :: WonderHowTo | Welcome back, my greenhorn hackers!Lately, much of the discussion here on Null Byte has revolved around evading detection andnot getting caughthacking. Several of you have written me asking for a series on evading detection and forensics, and while Ibegan a series5 months ago on just that, we have changed hacking platf... |
How to Install Kali Live on a USB Drive (With Persistence, Optional) « Null Byte :: WonderHowTo | Hi there, nullbytes :) I've recently seen many questions regarding VMs with Kali, and personally I prefer using a Live Boot USB to get Kali without removing my system (and for many reasons).Some of the reasons for using a Live USB are:· You use all of your system resources (CPU, RAM, GPU, etc)· You take no space of you... |
How Hackers Use Your IP Address to Hack Your Computer & How to Stop It « Null Byte :: WonderHowTo | Your IP (InternetProtocol) address is your unique ID on the internet. It's synonymous with your home address. Anyone in the world can contact your computer through its IP address, and send a retrieve information with it.I'm sure at one time or another you've heard that hackers can hack your computer via your IP address... |
How to Hack Wi-Fi: Automating Wi-Fi Hacking with Besside-ng « Null Byte :: WonderHowTo | Besside-ngis the hidden gem of theAircrack-ngsuite ofWi-Fi hacking tools. When run with a wireless network adapter capable of packet injection, Besside-ng can harvest WPA handshakes from any network with an active user — and crack WEP passwords outright. Unlike many tools, it requires no special dependencies and can be... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.