Header Banner
Null Byte Logo
Null Byte
Cyber Weapons LabForumMetasploit BasicsFacebook HacksPassword CrackingTop Wi-Fi AdaptersWi-Fi HackingLinux BasicsMr. Robot Hacks Hack Like a Pro Forensics Recon Social Engineering Networking Basics Antivirus Evasion Spy Tactics MitM Advice from a Hacker
nullbyte.png

Recon

Person using tweezers to remove a key from a laptop keyboard.
Oct 3, 2013

Welcome back, my budding hackers! One of the most time-consuming, but necessary, activities in hacking is reconnaissance. Before we can hack a system, we need to know what operating system it's runnin ...

Digital fingerprint illustration
Sep 3, 2013

Welcome back, my novice hackers! I've written a couple of articles on reconnaissance and its importance, and as I've said before, a good hacker will spend 3 to 4 more times doing reconnaissance than a ...

Person working on a computer with code and software applications displayed on the screen.
May 22, 2013

Welcome back, my nascent Hackers! In my last blog, we looked at a passive way to gather information necessary for a hack. The advantage of using passive recon is that it's totally undetectable, meanin ...

"Hack Like a Pro: How to Conduct Passive Reconnaissance of a Potential Target" cover image
May 21, 2013

Welcome back, my novice hackers! Most of my tutorials up until this point have addressed how to exploit a target assuming that we already know some basic information about their system. These include ...

"Hacking Reconnaissance: Finding Vulnerabilities in Your Target Using Nmap" cover image
Feb 28, 2012

Remember that scene in The Matrix when Trinity uses a realistic Nmap port scan, followed by an actual SSH exploit (long since patched) to break into a power company? Well, believe it or not, but that ...