Null Byte Forum
Forum Thread: Hack a Site with Below Scan Results:-
I wanted to ask if a website can be hacked when a nikto scan gives the following results If it can be hacked then how -
Forum Thread: Help Regarding Port based Attacks
These Are ports open on the target machine. Now I use which Port For exploit the target Not shown: 978 filtered ports
Forum Thread: Not Able to Connect to Target Computer via Metasploit and Veil-Evasion... Why?!
hei guys, i am quite new to the hacking world, and was trying out metasploit now. But i am having a lot of problems with it. I simply cant get a connection to my target computer, which is in the same network. I used Veil, but because of the problem i even disabled windows defender (and there is no other AV on it). i have tried numerous trojans and none of them worked. I am really desperate guys...
Forum Thread: Install Payload with Only Hard Drive Access
Hello, What is the best way, to install a persistent metasploit (or any) payload, on a PC, that you only have access to its hard drive. For example you have physical access to the PC, but you don't have the username and password, and you do not want to remove the password, however, you can boot in using a live cd, and access to the hard drive.
Forum Thread: The File Is Corrupt .Psd
Hello! worked in photoshop with psd file, suddenly turned off the computer. Can't remember when I saved before, maybe 5-7 minutes before. Happened automatically restart. When I reopened the file, it already consisted of one layer in black color. The file size is not changed. And the preservation of its consistent shutdown of the computer. Ie file somehow merged all the layers preserved before shutting down. How can I return the file to its state before this glitch? Copy no. Program Advanced P...
Forum Thread: Not Sure if It's the Right Adapter to Buy
Can anyone tell me if this is a good WiFi adapter to buy? Meaning, can someone tell me if it's capable of packet injection and monitor mode.
Forum Thread: Metasploit Session Opened but I Can't Use Meterpreter
i sent the file to the system and i exploited it and got the message: meterpreter session opened (LHOST:443 ->RHOST:1211)
Forum Thread: About Being 99.9% Anonymous
Hello, people... While i was cleaning up my virtual existence in the search for maximum anonimity, i noticed that many services such as Google, or even a simple apache2 server log file are able to, through some kind of fingerprinting, guess my device's OS and browser used.
Forum Thread: Evading Anti-Virus
Hi guys i tried every single one of Veil evasion payloads and shellter and each of them got caught by my anti-virus software so i have been wondering that is there any other technique in order to evade antivirus besides Powershell. Thanks
Forum Thread: Reverse Engeneering
I am following a course about reverse enegeneering and writing exploits. In that course you use gdb and protostar and you have to disassemble small programs in C, find a vulnerability and write an exploit in python.
Forum Thread: Kali Nethunter HELP
Hello guys, it's my first post to Null Byte, i wanna know if there is anyone using LG G5 and has installed Kali Nethunter on it. There is thread on XDA developers, but the kernel or ROM is not fully stable, sound is not working and there is some problems with full screen. Any help would be good. I'll post a link to XDA developers thread : https://forum.xda-developers.com/lg-g5/development/kali-nethunter-lg-g5-t3364545
Forum Thread: What Type of Virus?
hello guys, before I do something that most of you won't like - maybe - I would like you to know that I'm new here and about me, I just learned hacking just almost a week right now and I have a goal and I had an Idea that I wanna share to all of you.
Forum Thread: Undetectable Phishing
About a year ago I found a forum on Facebook that had a tutorial on how to make an undetectable phishing site by making some of the files JPG files instead of HTML and PHP files so they wouldn't be picked up by the web hosting service that you are using, I haven't been able to find this forum again and I was wondering if anyone had the link to the forum or knowledge that they could share. Thanks.
Forum Thread: Can't Get Packages on Kali VMware
I'm using kali linux on vmware workstation 14. I've installed vmware tools.
Forum Thread: RAT for macOS El Capitain
Hello, I want to know how to create a rat for mac. I see this : https://null-byte.wonderhowto.com/how-to/program-your-own-little-rat-part-1-getting-server-working-0167490/
Forum Thread: Fake Network with Website Filesharing Functionality?
So I am wondering if it is possible to make a fake ap and disguise it as a website based file sharing server. I am also wondering if I am able to run the fake ap from a raspberry pi zero and do the hacking from a different raspberry pi.
Forum Thread: How Do I Start a Career on Hacking?
afsfasfasfasfadfafsasfasfaf
Forum Thread: How to Run a Powershell Command When a File Is Opened
I would like a single PowerShell command to run when my file is opened without a powershell windows being shown.
Forum Thread: What Website Is This?
The website checker
Forum Thread: How Exactly Was Talk Talk Hacked?
I know it was SQL injection but what exactly did the hacker do? The only types I know are URL SQLI and input boxes SQLI. Was it really just as simple that, something I could do?
Forum Thread: How to Bind an Exe That Starts and Ends with the First?
Hi, first of all many thanks for all the great tutorials and info offered in this site! I would like to know how would it be possible to bind an exe let's call it program2 to another one let's call it program1 so that,
Forum Thread: How to Change the Partition Recognised by Windows Without Changing the Boot Partition
I have a USB drive set up as shown here: On the "UUI" partition I have my Kali boot image and on the "persistence" partition I have the files for enabling Live persistence. I want to have my normal files on the other partition
Forum Thread: Stealth Kali Passthu Pi Box?
I am aware of some of the other projects out there and may end up building off of them, but I really wanted to have an outside perspective on a few things before running down too many of the wrong rabbit holes. The idea is to use a raspberry pi loaded with kali to perform a transparent physical man in the middle situation while avoiding pitfalls of NAC detection. To summarize what I am trying to accomplish:
Forum Thread: Suddenly Google Related Sites Not Working in Kali 2.0
Hi everyone, I was using Kali Linux but suddenly google and google related all sites has stopped working.
Forum Thread: Can't Connect to ZTE F609 Anymore Wirelessly
Yesterday, i've been messing with my router. i found out that i could 'Permit' (allow) spesific MAC Address. So i went to my router gateway 192.168.1.1 , logged in, and search for WLAN > Access Control Lists From there, i want to permit some MAC's from my devices, so i click from the dropdown list to choose what method(block/permit), i click 'permit'. But, the router suddenly kicked everybody off the router. I've searched on internet what's the problem, the problem was because 'i didnt put th...
Forum Thread: Negotiated Tlv Encryption
When I try to create session through MSF with Windows 7 machine the session is unable to create and stucks on negotiated tlv encryption.
Forum Thread: Bypass Install from "Unkown -Sources"
How do I make my embedded payload upload on a victims phone without asking me to enable installation from "unknown-
Forum Thread: Burpsuite Practice Website
Hello, I just wanted to know if there are any intentionally vulnerable websites on which one could practice Burp suite? Is bWAPP suitable for Burp suite practicing and learning? I have heard its more of XSS, Sql injection and other things.
Forum Thread: How Do I Update Metasploit on Kali Linux Rolling?
i am new to kali linux (version 2017.1) and i have tried alot of times to update metasploit bt it never seems to happen.
Forum Thread: Metasploit on Kali Linux 2.0
Hello, I am fairly new to Kali, and just Linux in general so I'm sorry if this is a stupid question. But I have seen quite a few tutorials on here that require Metasploit, however I cannot find it. I have installed Kali on my Raspberry Pi 2, could that be it?
Forum Thread: How to Hide a .Exe File in Another .Exe File
I have created a virus that i would like to hide and then run on my other computer. I want to hide the exe that i have already made into another exe file so that when i run that file on a new computer it can both run the virus and the original exe.
Forum Thread: Proper Config. For MITMf and BeFF-Xss with airVPN
I have several problems when trying to perform exploits over WAN with airVPN. I am using this service because my router does not allow port forward NOR can I simply replace the router due to specifics with ISP provider (it uses SIM card).
Forum Thread: TP-LINK WN821N
I have buyed an adaptor: TP-LINK WN821N v5. I can't use monitor mode but i can do a packet injection. Is a problem of chipset or i need to install any drivers? I use kali linux 2017 2.0 .
Forum Thread: Hacking a Instagram Account
Hey, i am trying to hack into a instagram account. If i hack into the gmail of that person, i can do it.
Forum Thread: Bruteforce Hikvision Login?
So, i've scanned my network, found my hikvision login page. I'm wondering, can i Bruteforce the password? since, i already know the username, which is by default `admin` .
Forum Thread: Just a Little Question I Never Bothered Asking Anyone in the Past.
Hello, I'm not "new" to cybersecurity, but I have never really looked into, or asked someone, about this. Is there any way to remotely hack an OS with OUT port forwarding? Excuse me if I sound like a skid, I'm not lol, just am curious.
Forum Thread: Instagram
okay.. I Am a Noob When It Comes to Hacking. Recently I Found Out That Someone Had Hacked into MY Instagram Account. At First I Was Pissed, but Now I Have Decided to Hack into Their Account. I Really Need Someone to Teach Me. I Would Greatly Appreciate Any Form of Help.
Forum Thread: Problem Capturing WPA Handshake
To keep things short I've been experimenting with cracking wpa in aircrack following the tutorial here by OTW. Everything works fine except a handshake is never captured as I am told when I go to run aircrack against the .cap file. I am using the panda PAU09 which plenty of people say works great, and yes the deauth command does work.
Forum Thread: How to Attain Hidden Email from Username Off a Webpage?
Although I am young, consider me a 70 year old man with Alzheimer's when talking about html code etc. because I don't know shit.