Null Byte Forum

Forum Thread: Reign of Sadness Is Over — New Writers, Featured Forum Posts

Hello, Null Byte readers! We on the Null Byte team have been working hard to expand what we have to offer everyone who comes to our community to learn. After a long spell of posts only by SADMIN, you may have noticed we added some additional hackers to our writing crew. If you're interested in writing with Null Byte, and you live in the United States, you can also comment here or message us on Twitter to be considered for a paid writing slot (and to have your posts appear on the front page).

Forum Thread: Buffer Overflow That Is How It Is Produced?

Well long since I did not leave info, and as I see that this is very poor I'm going to start putting some of the texts that I think they should read and stop reading how to hack hotmaily those things, we go to what is the informaic and the hacking in itself explained simple as always, here I leave a good text for you to understand that it is a buffer overflow or stack overflow.

Overflow Concept [ by : Mohamed Ahmed ]

# What is a Buffer Overflow? Let's start with this terminology that 'I think' is the best known in the environment, and by the newbies. Although I think some people also try to expose the subject as a complex concept and it's really all the reverse, you'll see ..

Forum Thread: Spying on Segmented Networks

Network segmentation using Switches seemed the perfect solution to avoid the dreaded sniffers. But all that glitters is not gold and it is possible to take advantage of an insecurity in the ARP protocol to spy on the network. In this article we are going to explain one of the techniques used to sniffing in a network segmented through Switches: ARP-SPOOFING.

Forum Thread: Port Knocking

Introduction to Port Knocking In computing, port knocking is a method used to open ports on a firewall by a set of connection attempts launched over closed ports. When the correct connection sequence is received on the server, the firewall rules are modified dynamically to allow the host that sent the packets to connect to a specific port (s).

Forum Thread: Authentication Attacks

Spoofing-Looping Spoofing can be translated as "posing as another" and the aim of this technique is precisely to act on behalf of other users, usually to perform Snooping or Tampering tasks. A common form of Spoofing is to get the name and password of a legitimate user to, once entered the system, take actions on behalf of him.

Forum Thread: Disabling Buffer Overflows protections by Mohamed Ahmed

Disabling Buffer overflow protections When it is time to scan a program for vulnerabilities or just exploit them under GNU / Linux, there are two simple protections that you should keep in mind when it comes to systems with Kernels version 2.6 and higher , and over all if compiled with GCC. There are more protections such as the patch grsecurity or exec-shield (of which I may speak later), even there is protection from hardware called StackGuard .

Forum Thread: Brand New to Computers/Hacking- Would Appreciate Help!!!

Hello, II am brand new to computers and hacking. I just changed my major to cyber security and I'm trying to immerse myself in the field as much as possible before graduation which is in a year and a half. I'm basically a clean slate. A friend sent me to this website and I couldn't be more impressed. I have some questions if anyone is willing to help me out! I have a workable knowledge with binary and Kali Linux.

Forum Thread: KALI LINUX LIVE USB WON'T STAY CONNECTED to the INTERNET!! HELP!

Ok so I have now made 2 USB sticks live boot Kali. I made the second in hopes that after everything i learned on the 1st that maybe there was an istallation problem. Nope. When i boot Kali I have an internet connection. Ifconfig iwconfig and network manager all show that I am connected. I can ping 8.8.8.8 and it is succesful. But once i do that or try to use the internet (firefox, apt-get update, anything) the connection no longer works. Even though network manager and everything else still s...

Forum Thread: Where Do I Start if I Want to Learn to Become an Ethical Hacker?

I'm BRAND new to this whole hacking thing and have been wanting to teach myself how to do it for some time now. The problem is I don't know where to start. I've searched the web to see if it'll give me at least a hint as to where to start and have seen that I need to learn to code first. Any help as to how I can tech myself to code? Any preferred coding programs, training programs, or places I can learn to code? Any help is deeply appreciated! Thank you.

Forum Thread: Problems Over Wan

i hacked an android over wan ...but here is the thing ..when i try to download an images or informations fom that phone ...either the connection timed out or the pics and info come uncomplete mening the photo is not a full pic for example ...and the exploition is very slow ...is there any way to fix this and make the packages coome faster and safer...

Forum Thread: Getting Connected to Wifi in Kali Linux VirtualBox

I am trying to connect to a wifi network in Kali Linux using Virtualbox. I am using the "Bridged Adapter" network setting. At my house, I can get an IP that is on the network and can be pinged from a separate computer. I also tested it in another location on another wifi and I can get an IP that is on the network. For some reason in another location with WPA2 Enterprise Wifi I can get connected to the internet, but I can not get an IP. After running the command "ifconfig" in the "inet" field ...

Forum Thread: Zone Transfer Attack to DNS

.. The domains, ... usually deliver a lot of information and sometimes more than due. When it comes to services, domains, websites and more, often escape details such as the configurations in DNS servers , so we will see what is the zone transfer to DNS and how this can expose information and infrastructures

Forum Thread: Getting Client IP for MITM

Hi guys. I've been reading a lot of the tutorials here recently and decided to try a simple MITM attack following the first tutorial in the series. It's easy enough but got me thinking if it's any good for a real attack when I am not on the same LAN as the target. Anyone know a way to get the client IP in that situation? Thanks all :)