nullbyte.png

Hack Like a Pro

Article cover image
Aug 23, 2019

Welcome back, my tenderfoot hackers!As most of you know, I am strong advocate for using Linux as a hacking platform. In fact, I would say that without knowing Linux, you will never become a profession ...

Article cover image
May 26, 2016

Welcome back, my fledgling hackers!There's an evil dictator hellbent on destroying the world, and in one of our last hacks, we successfully compromised his computer and saved the world from nuclear an ...

Article cover image
May 26, 2016

Welcome back, my newbie hackers!We've already saved the world from nuclear annihilation and covered our tracks afterwards, but the world is still threatened by a malicious, megalomaniacal dictator wit ...

Article cover image
Oct 27, 2015

Welcome back, my amateur hackers!With Halloween right around the corner, I thought you could have a little fun with your newfound hacking skills using a hack that is guaranteed to freak out your boss, ...

Article cover image
Oct 24, 2015

Welcome back, my tenderfoot hackers!WordPress-based websites are among the most numerous on this planet (maybe other planets too, but I can't vouch for that). According to WordPress's own website, Wor ...

Article cover image
Jul 13, 2015

Welcome back, my novice hackers!As most of you know by now, a notorious commercial, legal hacking group named "Hacking Team" was recently hacked. As part of the hack, thousands of emails and other mat ...

Article cover image
Apr 4, 2015

Welcome back, my budding hackers!With this article, I am initiating a new series that so many of you have been asking for: Hacking Web Applications.In previous tutorials, we have touched on some of th ...

Article cover image
Jul 10, 2014

Welcome back, my tenderfoot hackers!I have written many tutorials on hacking using Metasploit, including leaving no evidence behind and exploring the inner architecture. Also, there are my Metasploit ...

Article cover image
Feb 12, 2013

Welcome back, my greenhorn hackers!Several of you have you have emailed me asking whether it's possible to install a keylogger on a victim's computer using Metasploit. The answer is a resounding "YES" ...

Article cover image
Oct 5, 2012

In my first few articles, we focused on operating system hacks. These hacks have been primarily on older operating systems such as Windows XP, Windows Vista, and Windows Server 2003.Although these ope ...