Header Banner
Null Byte Logo
Null Byte
Cyber Weapons LabForumMetasploit BasicsFacebook HacksPassword CrackingTop Wi-Fi AdaptersWi-Fi HackingLinux BasicsMr. Robot Hacks Hack Like a Pro Forensics Recon Social Engineering Networking Basics Antivirus Evasion Spy Tactics MitM Advice from a Hacker
nullbyte.png

Recon

Code snippet displaying reconnaissance data with phone number and URLs.
Jun 7, 2019

Phone numbers often contain clues to the owner's identity and can bring up a lot of data during an OSINT investigation. Starting with a phone number, we can search through a large number of online dat ...

Code displayed on a computer screen with graphical elements and text in pink and green.
Apr 18, 2019

Websites and web applications power the internet as we know it, representing a juicy target for any hacker or red team. TIDoS is a framework of modules brought together for their usefulness in hacking ...

Abstract digital data stream with numbers and binary code.
Apr 9, 2019

When joining a new network, computers use the Address Resolution Protocol to discover the MAC address of other devices on the same network. A hacker can take advantage of ARP messages to silently disc ...

Code snippet displaying HTTP methods and server debugging information.
Mar 13, 2019

Before attacking any website, a hacker or penetration tester will first compile a list of target surfaces. After they've used some good recon and found the right places to point their scope at, they'l ...

Map interface displaying data and locations in Europe.
Jan 2, 2019

Welcome back, my novice hackers! Reconnaissance is one of the most important preparatory steps to hacking. As I have emphasized many times before here on Null Byte, you must know the operating system, ...

Person using a smartphone with a soft, blurred background of warm lights.
Oct 3, 2018

Sharing your Wi-Fi password is like giving an unlimited pass to snoop around your network, allowing direct access even to LAN-connected devices like printers, routers, and security cameras. Most netwo ...

Network visualization of IP address connections with labeled nodes.
May 31, 2018

Hackers rely on good data to be able to pull off an attack, and reconnaissance is the stage of the hack in which they must learn as much as they can to devise a plan of action. Technical details are a ...

Code on a computer screen displaying programming text.
Jul 13, 2017

The Operative Framework is a powerful Python-based open-source intelligence (OSINT) tool that can be used to find domains registered by the same email address, as well as many other investigative func ...

TheHarvester tool interface on a computer screen, displaying code and search functionality.
Jun 27, 2017

Open-source data scraping is an essential reconnaissance tool for government agencies and hackers alike, with big data turning our digital fingerprints into giant neon signs. The problem is no longer ...

Fingerprint with labels of different operating systems: Windows 7, Windows XP, Ubuntu, Windows Server 2008, and Mac OS X.
Jul 21, 2016

Welcome back, my fledgling hackers! A short while ago, I did a tutorial on conducting passive OS fingerprinting with p0f. As you remember, p0f is different from other operating system fingerprinting t ...