Null Byte Forum

Forum Thread: Create a FUD C++ Backdoor with Madwin

Hey everyone, I'm mado. This is my first post in the community, though I've been digesting material here for years, and now I'm happy I can start creating it. The first few paragraphs will just be a general overview of the software; feel free to skip f you want to get straight to the installation and usage.

Forum Thread: TL WN722N Usb Not Detected in Kali Linux 2017.1

Hi, i bought a new tp-link Tl WN722N V.2 wifi dongle for wifi hacking but when typed ifconfig, there is no wlan0 interface,so i checked if the system is even detecting my usb by typing # lsusb but there was no mention of the chipset or vendor name, just some ID 2357:010c. First i typed # lsusb without the usb and the i typed it after plugging in the usb. I searched a lot of forums but none of them worked for me. Im am runing kali 2017.1 live with persistence on a usb. The Linux version is 4.9...

Forum Thread: Does Anybody Know Any Tools or How to Crack Ipad/Iphone Passcode with Kali Linux?

I've been surfing the web for a info on " how to crack Iphone/Ipad passwords with kali linux Hard wired" most of the searches just give typical stuff but i want to know how to crack the passcode hardwired (via USB cable) Is there a tool in Kali Linux to do this or in the repositories of Kali linux {By the way this is legal as it's my cousin's iPad and he needs his Passcode recovered and he requested me to do this}

Forum Thread: Gaining Access to an IP Camera.

I have an IP web cam that I wish to see if it is vunerable to "hacking". It is one of those chinese cameras that have been been exposed as having a" back door". It is accessible via wifi only. The only open ports are 99/tcp open metagram and 8600/tcp open asterix . There is no telnet or ftp access. What other avenues can I test to see if my IP cam has "issues" with backdoor exploits?

Forum Thread: Kali Proxychains Configuring Dns Proxy

Let me start by saying I'm a complete noobie with kali and linux in general. I figure there's no point in learning how to operate Kali unless i first Learn how to become anonymous. I've configured proxychains and it seems to work fine until i enable dns proxy. I've read every tutorial i could find, followed every suggestion but the dns proxy absolutely will not work. Ive enabled dns tcp proxy in the dns config (not proxyresolv) I've added port 9050 to the dig part of proxyresolv( along with a...

Forum Thread: How to Hack Wifi Network with CMD

There's lots of people in this world want to know how to hack wifi networks. You must search for CMD and run as administrator. But you need to trick your victim to connect his Wifi to your PC or Laptop. NOTICE: This for education only. Note: Even if the victim has logged you out from the Wifi long time ago you still can hack the password.

Forum Thread: Installing Kali on Android Phone Storage

My phone storage(8gb) has larger capacity than my sd card(4gb). But all the tutorials I found is about installing kali on an sd card. I don't know how to direct the installation path to my phone storage. I tried /storage/sdcard1/linux.img but when I start installing it, I always get the error "Making file disk image.. /fail"

Forum Thread: New Device Signed In

Hi! I have a question, we say that you have hacked a instagram account for example and you want to log in to see or Edit the profile. But when you have logged in the person that you hacked gets an email that says that a New device have signed in.

Forum Thread: How to Hack into a Gmail Account for an ABSOLUTE Beginner

Hi everyone! One of my gmail accounts has been hacked and the hacker changed my password. Google aren't helping me to regain control of the account at all and I was wondering if anyone can help me to regain access. Like I said I am an absolute beginner and not necessarily skilled with computers so step by step instructions and explanation in layman's terms would be best. Thanks!

Forum Thread: Complete Guide to Creating and Hosting a Phishing Page for Beginners

Hello there, Recently I have come across many guides about creating phishing pages. Although the principles behind each guide is similar, most of the hosting solutions provided in the guide does not work anymore due to an increase in the crackdown of phishing pages by the hosting companies. In this guide, I will go through every step necessary to create and host a phishing page of your choice. Enjoy!

Forum Thread: IPV4 and IPV6

I was wondering: Will hacking change in a few years when we run out of IPV4 addresses and have to change to IPV6 addresses? i mean that surely is gonna have a great impact on Hacking, right? well maybe not, tell me what you think guys... Just a random pic for attention.

Forum Thread: Building Our Own Hacking Tool in Python, Part 1 (Getting a Shell)

This part will be dedicated to major step in the hacking process : getting access to a shell on the target, which will allow you to execute commands and basically get control of the computer. What we are going to set up can be summed up with this simple drawing : The Python program we are going to code is itself pretty short but I assume there are beginners among us, that's why I will take some time to recap the basic information we have to know on networks in order to make a backdoor. This p...

Prev Page