Header Banner
Null Byte Logo
Null Byte
Cyber Weapons LabForumMetasploit BasicsFacebook HacksPassword CrackingTop Wi-Fi AdaptersWi-Fi HackingLinux BasicsMr. Robot Hacks Hack Like a Pro Forensics Recon Social Engineering Networking Basics Antivirus Evasion Spy Tactics MitM Advice from a Hacker
nullbyte.png

Recon

Lines of code displaying contact and credential information in a technical format.
Mar 29, 2016

Welcome back, my novice hackers! As many of you know, recon is crucial to a successful hack/pentest. In most cases, hackers spend more time doing good reconnaissance than actually hacking. Without pro ...

Code snippet showcasing a vulnerability in Ruby on Rails servers related to object injection and denial of service attacks.
Nov 25, 2014

Welcome back, my tenderfoot hackers! Those of you who have been reading my posts here for awhile know how much I emphasize good reconnaissance. Novice hackers often jump into a hack/exploit without do ...

Wolfram (tungsten) molecular structure with colored spheres on a gradient background.
Nov 10, 2014

Welcome back, my greenhorn hackers! Before we attempt to exploit any target, it is wise to do proper reconnaissance. Without doing reconnaissance, you will likely be wasting your time and energy as we ...

Error log from a web server displaying file directory structure and response codes.
Sep 28, 2014

Welcome back, my novice hackers! Before we try to attack a website, it's worthwhile understanding the structure, directories, and files that the website uses. In this way, we can begin to map an attac ...

Code snippet from a computer terminal displaying commands and options.
Sep 21, 2014

Welcome back, my tenderfoot hackers! As you know, DNS, or Domain Name System, is critical to the operation of the Internet. It provides us with the ability to type in domain names such as www.wonderho ...

Cartoon character with a round pink body and the text "Fear the Foca" in bold letters.
May 28, 2014

Welcome back, my greenhorn hackers! My preference for Linux as a hacking platform is well documented, and I have even created a series of tutorials to train new hackers. Without being proficient in Li ...

Abstract binary code pattern on a gradient background.
Mar 2, 2014

Welcome back, my greenhorn hackers! Earlier in this series, I showed a you a couple of different ways of fingerprinting webservers. Probably the easiest way, is to use netcat and connect to port 80 an ...

Fingerprint analysis and digital rendering background.
Feb 27, 2014

Welcome back, my novice hackers! I have tried to emphasize throughout this "Hack Like a Pro" series that good reconnaissance is critical to effective hacking. As you have seen in many of these hacks, ...

Installed software on a computer screen.
Jan 3, 2014

Welcome back, my rookie hackers! The more we know about a system or network, the better our chances of owning it and not leaving a trace for investigators to follow. One of the often overlooked source ...

"Hack Like a Pro: How to Find Almost Every Known Vulnerability & Exploit Out There" cover image
Oct 7, 2013

Welcome back, my nascent hackers! Earlier, I wrote a guide on finding operating system and application vulnerabilities in Microsoft's own security bulletins/vulnerability database. In this tutorial, I ...