Forum Thread : I Forgot My Windows 8.1 Password and I Don't Have Recovery Cd/Dvd So How Can I Reset It...
hi there i have a problem caused by my internet connection i was simply using commads "apt-get update && apt-get upgrade" while doing that my internet connection went down so when it came back kali were already skipped the download part and started patching.After that i tried ...more
Whenever i try to set a multi handler this error occurs. It Used to work for me but not working anymore I thought that the port is still listening so i try to close it with Kill command but it didn't work for me so try fuser command but both didn't work for me please help what ...more
What are the basics to white hat hacking? Are there any tutorials or anything?
There are no tutorials for metasploit windows 8. How do i use it for penetration testing?
Hi people! I have been interested in hacking for a quite a while now. However, I never really had time to start. Until now. So, I have been reading some guides from here - the one about Linux from occupytheweb, for instance - and reading in general about networks. But I don't ...more
Hey guys. Im working on some code for a keylogger and wanted to add a unique feature. I wanted to make my log file auto export to USB when a USB plugged in. Then I realised this was very insecure. So I decided to make it so that the log file only exports when a specific file i ...more
Hi all Persistent backdoor Payload in an Original .Apk File?? Ive i just sucessfully backdoored and apk over the internet and moblie internet. using the guide: Embed a Metasploit Payload in an Original .Apk File http://null-byte.wonderhowto.com/how-to/embed-metasploit-paylo ...more
Whenever I attach a malicious PDF to an email with the Social Engineering Toolkit, it is caught by Google, and the message is not sent. Also, sometimes the emails say that they were sent, but they never go through. Any help is appreciated
Hey, i wanna find a ip adress with snapchat. I already gave the person a link, which led to somewhere in canada, and that is obviously not where that person lives. Help?
There's lots of people in this world want to know how to hack wifi networks. You must search for CMD and run as administrator. But you need to trick your victim to connect his Wifi to your PC or Laptop. NOTICE: This for education only. Note: Even if the victim has logged you o ...more
im trying to get a wpa2 wifis password using kali linux but when i type airomong-ng won0 it says no such device found. i have a tp-link wn722n usb wifi adapter, when i accses the internet on kali it works and i can search as on chrome. what do i have to do so it shows up and ...more
I'm trying to hack a system on Kali over WAN but i can't get the reverse connection even my port forward is working fine ? And I'm practicing over a friend's computer so nothing illegal here.
Using Kali Linux. I right clicked my folder which had a few txt files in it and clicked compress, selected .ZIP and set the password to 'grass'. I ran "fcrackzip -b -l 5-5 -u Testfile.zip". I get no output for a few minutes and then the prompt is back ready for a new command. ...more
This is a pretty fun read on using a polyglot jpeg to bypass CSP leading to a XSS vuln. http://blog.portswigger.net/2016/12/bypassing-csp-using-polyglot-jpegs.html
Hello, I'm trying to get THC-Hydra working on a website form which doesn't require a username but hydra wants me to specify it with either –l or –L. The form field in question needs the following parameters, as far as I've found out using Burp Suite Free Edition: password=te ...more
Hi, I have a live boot of Kali Linux on a USB 8G set up with persistence. My issue is that whenever I boot up Kali, all of my files saved to my desktop move to a single location in the upper left hand corner... How can I stop this from happening to maintain my organized desktop?
Hi all! Please help me to solve my problem with WinRar file archiver. The following error message is displayed, when I try to use the WinRar to extract a compressed file with the rar file name extension: The archive is either in unknown format. How to repair winrar. Hopefully ...more
HI, Can anyone tell me what is the fastest method to crack a .cap file in kali i already tried crunch but it was very slow it could takes days in it . and also recommend a good word list for cracking .cap files
Hello everyone! I thought I'd help a few people out by writing a written tutorial on how to install Kali Linux on your chromebook, as well as Metasploit-Framework, so let's begin! If you would like a video version instead, watch my YouTube video at the bottom of the page. Alth ...more
Hello All, I have been struggling to get all the port open on my external IP. I tried, no-ip, port forwarding in router, third party vpn to open ports on my external IP. All failed for some reasons. So finally, I created AWS account to create my VPN server. I Launched Ubuntu ...more
Hi, title says it all. Trying to change the extension of a leafpad text file to a .rc, can anyone provide details on how to accomplish this? Seems like an easy task but I have been struggling with it. Here is the code for my leafpad file: use exploit/multi/handler set payload ...more
Hi! I found a session using javajre17jmxbean but then i wanted to make it persistence.. Then after running the persistence command, it said :"Java/java version of meterpreter is not supported with this script". What can i do then? Thanks! I simply want to make the session pe ...more
Hello, I can't seem to figure out how to unluck some files I downloaded. Tried some things, but I'm a real noob... srry in advance. If I unpack them, I get a new folder. Within this folder, are a couple more folders, which hold the information I want. This info is put in a ...more
hello again, to make a FUD payload we can use ,msfencod or veil-framework or shellter, and we can get the meterpreter session successfully..., after the meterpreter session ,when we try to make Persistence using metasploit , it is always caught by AV soft wares, so my quest ...more
Hello everyone, this is my first post so play nice with me. We are going to create an undetectable (meterpreter/shell/vnc) executable in under 15 minutes. Hence forth, what I mean by undetectable is that it is undetected by 0 antivirus. Trust me I 've tried and it's possible. ...more
I need help to hack a school pc. They block everyhting (cmd, apps from usb, bat files,bios). All I want to do is gain admin access. I need to get admin access for a reason I can't tell. But if any one has an idea on how to do this, it woulod be great. I kind of figured a way b ...more
Hello null-byte, I tried a few time to click on our beloved OTW's pages to be redirected to his profile page in order to have all his tutorials in one menu. But it appears that /occupythewebotw is for some reason down. Other profiles pages seem to be working so I was wonderin ...more
I am having a problem with mysql socket when i try to connect to mysql database it says: ERROR 2002 (HY000): Can't connect to local MySQL server through socket '/var/run/mysqld/mysqld.sock' (2) HAS ANYONE HAD THE SAME PROBLEM AND CAN YOU HELP ME
So I have a few WPA2 capture files which I got using Aircrack-ng on my home network. I was wondering if I can somehow change the password associated with these capture files without changing my home network password and re-capturing. This is so I can experiment with bruteforci ...more
I am using this command mitmf -i wlan0 --arp --spoof --gateway 192.168.1.1 --target 192.168.1.108 --jskeylogger The tartget is windows on my VM ware station.Using dual boot with kali linux and get this error when start browsing. 2016-06-11 17:23:07 ProxyPlugins Exception occu ...more
Hey, guys! How can we dump whatsapp messages after getting a meterpreter session for android? https://twitter.com/segofensiva/status/444390608015462400 https://goo.gl/C6Hst4 I found this after googling a lot. But how do I use it ? Thank You.
I have been researching WAN Reverse TCP attacks on Nullbyte for quite some time and i have come across a huge gap in security, that being the information that your ISP / DDNS service retains about your identity. Now im confident most ISPs will leak information but what about ...more
i have a android phone and im wondering if i could get remote access to it with just the ip of the device and being able to look to whatsapp etc . i would like to preform actions like in a metasploit session but just without an file that needs to be installed on the device
I am working with an open source pc locker code is below. As you can see the password is ''cat'' to unlcock it, but how do i make the inputbox pop up once the pc locker is executed. What is the hot key If IsPressed("10", $hDLL) and IsPressed("12",$hDLL) and _IsPressed("78",$h ...more
I just got a macro programmable mouse and was thinking that it could be interesting to create a macro so that when run on someone elses computer could allow remote access, or do something else of interest. Any ideas out there? It would have to be some command that could be rec ...more
I was wondering if anybody knew some good proxy servers that I could use to route terminal traffic through Proxychains. I want to set up a chain of proxies - hence the name, but I don't want to use Tor. Anonymous proxies would be even better. Thanks, Tacocat