Null Byte Forum
Forum Thread: Utopia the Truly Secure Ecosystem | Upcoming Revolution
The upcoming Decentralized and Secured Ecosystem, This post is for especially developer, other users also can participate in beta testing if you have enough qualified skills. More and more for you all, we can mine cryptons from PC with utopia software available in Windows, Mac, Linux.
Forum Thread: MITM on the Network?
Hello, so I have successfully performed MITM attacks on a single computer however I was wondering if it is possible to make a MITM attack so that affects the whole network and therefore all computer not just a certain ip, for example something like this: arspoof -i wlan1 -t 192.168.0.1/24 192.168.0.1? Thanks in advance
Forum Thread: Online Email Password Crackers for Online Email Services - Kali /BackTrack
My previous post below-and not trying to flame here-but did not see many points of view on this issue. Given that I am not up to other pen testers levels I went to the web and the links below seem to suggest that you can do this--Which gets back to original question--REALLY! If someone has tried these on their own account, and its worked-I would like to see the step by step- as it still seem like the auto default is for captcha to intervene? Again for hypothetical and for educational purposes...
Forum Thread: Phish for Social Media & Other Accounts with GrayFish
As a student, I have learn a lot of techniques and methods to gather personal infomation. The easiest method I must say is phishing. Phishing is a method in which fake login page that looks similar to original page displayed to victim. When victim enter credentials, it transferred to attacker. For example:
Forum Thread: Phish for Social Media & Other Accounts with GrayFish
As a student, I have learn a lot of techniques and methods to gather personal infomation. The easiest method I must say is phishing. Phishing is a method in which fake login page that looks similar to original page displayed to victim. When victim enter credentials, it transferred to attacker. For example:
Forum Thread: VMware Issue in Kali Linux 2019.3
Good Day , I am using kali linux 2019.3 os and i am facing some problem while using vmware in my kali linux.
Forum Thread: No internet address Kali Linux 2.0! Cannot connect to wifi?!
PLEASE HELP ME! EVERYTIME I TRY TO CONNECT TO THE INTERNET, I DON'T HAVE A FREAKIN INTERNET ADDRESS! SOMETIMES I MAY RESTART AND IT CONNECTS, BUT MAJORITY OF THE TIME THERE IS NO INTERNET ADDRESS TO CONNECT TO! WTF IS HAPPENING THIS IS SO ANNOYING! P.S. I AM DUAL BOOTING KALI LINUX ON REAL HARDWARE! NOT VIRTUAL MACHINE! HERE ARE MY SETTINGS:
Forum Thread: Maintaining Access in the Router...
I want to know from everyone how to maintain the access in the router once hacked even if the owner of the router changes the password.
Forum Thread: Unsecure Network, Access to Printer, Now What?
I am on an open wifi network. The gateway I am connected to , 192.168.1.1, has a secure network behind it at gateway 192.168.11.1. A series of Nmap commands painted me a picture of the network, to include CCTV server, POS system, and a computer. Some more digging and I was able to open up the network printer in browser. It has no admin password. I can see the WPA passphrase on the website, but it is dotted out. Using the network printer, how do I access other computers on the network, see the...
Forum Thread: How to Easily Cover Your Tracks from Kali Linux After Hacking a System
Its pretty obvious to most of you that to cover your tracks on a system your need to clear the command history files and the systems log files. A lot of articles have been written on this topic most of them showing you how to cover your tracks via Metasploit or manually doing it on a Kali Linux.
Forum Thread: How to Use SS7 Flaw to Intercept SMS if We Know Phone Number?
Totally for Educational Purposes.
Forum Thread: I Need to Hack Cpanel!
I need to hack cpanel of a website and download some files from it help me! Thanks
Forum Thread: How to Trace Facebook User?
First, take my greeting,i am just a learner.I know there is more amazing teachers in nullbyte.Accept me as a student and forgive me if i do something wrong. I will be very grateful if you show me how to track or trace any facebook user?even he /she is using android or pc...Thanks for reading.
Forum Thread: UTOPIA- First Truly Decentralised Ecosystem
Today I am going to be talking about a soon to be launched( currently under beta-testing) social media platform, that goes by the name of UTOPIA. Why am I talking about it here? Because it puts privacy at top, and it also has a very nice beta-testing program going on, which a lot of the Null Byte community could benefit from!
Forum Thread: How to Make a Server Based Android Spy App
I want to make a spy app based on sever . I am looking for help if someone already did...........
Forum Thread: What Network Options Should I Set Before Gaining Access Phase ?
hello , I've been taken courses and collecting a lot of info about networking and how devices locally and remotely communicate . when it comes to security i found that exploiting remote device requires backdoor to be sent and to open specific port (port forwarding) on your router depending on the service you are targeting . however if you and the victim are sharing the same network then no need for port forwarding .
Forum Thread: Online Pentesting
Hello people, i was looking for a site to do some pentesting with tools like nmap & metasploit (Legally). I've found a few sites with ctf modalities. But nothing like a metasploitable online or sth like that. Thank you for your replies.
Forum Thread: Is It Possible to Hack Drones?
There are different methods to hack wireless devices, likewise drone is the best target to tinker with and develop proper exploit code and injecting them into it.
Forum Thread: Metasploit Android Meterpreter Session Freezes After Opening the App on the Android Device
First of all, I'm a beginner in metasploit. Sorry if anyone asked this question before.
Forum Thread: KALi Linux WIFI PROBLEM!
Hey Guys,
Forum Thread: HACKING LINUX SYSTEMS by LINUX USING FEBREV-LINUXPLOIT FRAMEWORK. Hack the Hacker....
FEBREV-LINUXPLOIT Framework Official github repository
Forum Thread: Perform Dictionary Attack on Facebook Using Lithium
Lithium is a python script to perform a dictionary attack on facebook It uses selenium to perform web automation function and it is written in Python 3.x
Forum Thread: Can't Change the Wifi Adapters from Managed to Monitor Mode.
So I'm using Belkin Wifi Adapter that uses Realtek RTL8188SU chipset. When I run the command to change the mode to monitor I get this message:
Forum Thread: How to Use Social Fish to Spear Phish.
Hello hackers and pentester today we will learn how to use a linux tool called SocialFish to phish login credentials of some common websites. For educational purposes only of coarse ;)
Forum Thread: Failed to Boot Kali Linux from My Persistance Usb
Hi Everyone, I have created My kali linux (16 GB) live Persistence Usb few days back with the latest image of 2019.2 and after that it works pretty well but now it stuck in booting process and shows me this message. What should I do? Kindly help me please...
Forum Thread: Error in EternalBlue
I don't understand why I'm getting this error even if the target is vulnerable please help ??
Forum Thread: How to DOS Attack on Any WiFi Network
Well,there can be situation where -> Your friendly neighbor is ruthlessly using your WiFi.
Forum Thread: A Trouble with Glitched Out Router.
So my router has glitched out after I changed my SSID and password. Seems that he can't handle spaces. I tried setting my SSID to Ladasno Network, but got only Ladasno and password is Cannot Know, but now I can't login to my wifi and edit settings. I'm 100% sure that password is correct since it is saved in my chrome password library so I could copy and paste it. So I'm asking how can I hack WPA2 (No WPS hacking, No Handshake Hacking) encrypted wifi.
Forum Thread: How to Hack an iPhone with Armitage
Step 1: Correctly Installed Kali Linux. Kali Linux has to be correctly installed and on its newest Version.
Forum Thread: Esp8266 Deauth As a Drone Killer?
Will an esp8266 running deauth be able to make a drone lose connection with its controller?
Forum Thread: Oh No!!!! looks Like We've Been Infiltrated by Keto Trolls! SCRAM TROLLS SCRAM!
Anyway to ban these pple from posting endlessly about the 'hottest Keto diet'? Jesh!
Forum Thread: How to Configure Attack Over WAN While Using a VPN
The following 'How To' will detail how to configure an attack over WAN while using a VPN to hide your real IP address and a DDNS provider to make your IP static. It will also cover how to appropriately set your LHOST and LPORT.