Null Byte Forum
Forum Thread: Reign of Sadness Is Over — New Writers, Featured Forum Posts
Hello, Null Byte readers! We on the Null Byte team have been working hard to expand what we have to offer everyone who comes to our community to learn. After a long spell of posts only by SADMIN, you may have noticed we added some additional hackers to our writing crew. If you're interested in writing with Null Byte, and you live in the United States, you can also comment here or message us on Twitter to be considered for a paid writing slot (and to have your posts appear on the front page).
Forum Thread: Can I Spy on Someones Computer Using Metasploit but Downloading the Software on a Victims Computer Using a Usb Drive?
My uncle (an IT) said I cant spy on him using Metasploit. So we made a bet he would let me use his computer on a guest user (but I know the admin password) on his windows 10 computer. I am allowed to use Internet and my Usb stick. He said it has to be downloaded secretly. Can anyone help me?
Forum Thread: Mikrotik - Second Part [Interface and Configurations] by : Mohamed Ahmed.
This time will advance in the configuration of an RB equipment. Upon completion of the communication with the RB through the Winbox application:
Forum Thread: Mikrotik - Part One [ MOHAMED AHMED]
What is Mikrotik ? Mikrotik is a Latvia company founded in 1996 to develop routers and wireless ISP systems.
Forum Thread: Attack Man in the Middle Remotely [ by Mohamed Ahmed ]
Well in this tutorial I will explain a very easy way to carry out an MIM attack in a remote way :)
Forum Thread: Compromising a Computer Using a Fake Firefox Extension
Using social engineering we will try to have a user install a fake Firefox extension to get a remote session on their system.
Forum Thread: Buffer Overflow That Is How It Is Produced?
Well long since I did not leave info, and as I see that this is very poor I'm going to start putting some of the texts that I think they should read and stop reading how to hack hotmaily those things, we go to what is the informaic and the hacking in itself explained simple as always, here I leave a good text for you to understand that it is a buffer overflow or stack overflow.
Overflow Concept [ by : Mohamed Ahmed ]
# What is a Buffer Overflow? Let's start with this terminology that 'I think' is the best known in the environment, and by the newbies. Although I think some people also try to expose the subject as a complex concept and it's really all the reverse, you'll see ..
Forum Thread: Impersonation of Users Using Metasploit -{Old but Effective}
Now we will see how to impersonate a system user without having to create a new user with administrator permissions.
Forum Thread: Buffer Overflow on Linux
INTRODUCTION ~~~~~~~~~~~~
Forum Thread: Spying on Segmented Networks
Network segmentation using Switches seemed the perfect solution to avoid the dreaded sniffers. But all that glitters is not gold and it is possible to take advantage of an insecurity in the ARP protocol to spy on the network. In this article we are going to explain one of the techniques used to sniffing in a network segmented through Switches: ARP-SPOOFING.
Forum Thread: Port Knocking
Introduction to Port Knocking In computing, port knocking is a method used to open ports on a firewall by a set of connection attempts launched over closed ports. When the correct connection sequence is received on the server, the firewall rules are modified dynamically to allow the host that sent the packets to connect to a specific port (s).
Forum Thread: Exploiting Heap Overflow for Beginners -by Mohamed Ahmed.
Something simple: overflows for nerds. Well, we are in front of a computer that is running a program
Forum Thread: Authentication Attacks
Spoofing-Looping Spoofing can be translated as "posing as another" and the aim of this technique is precisely to act on behalf of other users, usually to perform Snooping or Tampering tasks. A common form of Spoofing is to get the name and password of a legitimate user to, once entered the system, take actions on behalf of him.
Forum Thread: How 2 Find the Facebook Live Stream Key of Any Live Stream?
Title says it all. This is for research purposes, and pure curiousity. Asking here, because literally nowhere else has any information on this.
Forum Thread: Disabling Buffer Overflows protections by Mohamed Ahmed
Disabling Buffer overflow protections When it is time to scan a program for vulnerabilities or just exploit them under GNU / Linux, there are two simple protections that you should keep in mind when it comes to systems with Kernels version 2.6 and higher , and over all if compiled with GCC. There are more protections such as the patch grsecurity or exec-shield (of which I may speak later), even there is protection from hardware called StackGuard .
Forum Thread: Creating a Minibackdoor in PHP by Mohamed Ahmed
Hello friends, today I will explain how to backdorize a web. That is how to create a file that executes commands, either in linux or windows (depends on which server is).
Forum Thread: Brand New to Computers/Hacking- Would Appreciate Help!!!
Hello, II am brand new to computers and hacking. I just changed my major to cyber security and I'm trying to immerse myself in the field as much as possible before graduation which is in a year and a half. I'm basically a clean slate. A friend sent me to this website and I couldn't be more impressed. I have some questions if anyone is willing to help me out! I have a workable knowledge with binary and Kali Linux.
Forum Thread: Upload Shell from Phpmyadmin (Xampp) . By Mohamed Ahmed.
I will teach you how to upload a shell from phpmyadmin: The first thing to do is to have access to phpmyadmin.
Forum Thread: Dealing with Persistent XSS . By Mohamed Ahmed
Hello people, here I bring a small contribution how to deface a web with persistent XSS completely: Well the first thing we have to do is have this code javascript:
Forum Thread: Evolve Mod_Security with SQLMAP Tampers
Hello !! as everyone will have spent some time trying to make an injection for GET in a page and appears
Forum Thread: Elimination of Arbitrary Files
What is an arbitrary file? Basically an arbitrary file is the one that allows the modification of other files in the system of the web application.
Forum Thread: TEMPEST Attacks . By Mohamed Ahmed
Information is power and today, it can mean money, a lot of money. Hence, the collection of data, is permanently rearranged through new techniques for theft of information.
Forum Thread: Basic SQL Injection on JDBC by Mohamed Ahmed
The following entry documents how to perform a basic SQL Injection in a Java program with Java DataBase Connectivity (JDBC). In addition, some possible solutions to this vulnerability will be exposed. For this I have created a simple database and I have done a test code in Java that queries this database.
Forum Thread: KALI LINUX LIVE USB WON'T STAY CONNECTED to the INTERNET!! HELP!
Ok so I have now made 2 USB sticks live boot Kali. I made the second in hopes that after everything i learned on the 1st that maybe there was an istallation problem. Nope. When i boot Kali I have an internet connection. Ifconfig iwconfig and network manager all show that I am connected. I can ping 8.8.8.8 and it is succesful. But once i do that or try to use the internet (firefox, apt-get update, anything) the connection no longer works. Even though network manager and everything else still s...
Forum Thread: Kali Linux Internet Connection Issues
Okay so I installed the latest version of Kali Linux alongside Windows 10 on my HP Pavilion computer everything went good but I cant connect to the internet ifconfig says this any help would be appreciated.
Forum Thread: Basic Concepts and Skills of Binary Exploitation. Part 2
Hello everyone, in last part I have talked about how to write a Shellcode. Basic Concepts and Skills of Binary Exploitation. Part 1
Forum Thread: Controlling Electronic Boards and Traffic Lights by Mohamed Ahmed part1 .
*-Introduction! -Techniques
Forum Thread: How to Extract Wpa Handshake from a Large .Cap File
I'm gonna send my .cap file to one of the online crackers. But the limit is 10mb and mine is 29. How can I extract it?
Forum Thread: AWUS036NHA Power Up.
Anyone managed to increase power on AWUS036NHA? Please, explain how. I've found few posts online, but none of them seem to worked for me.
Forum Thread: Where Do I Start if I Want to Learn to Become an Ethical Hacker?
I'm BRAND new to this whole hacking thing and have been wanting to teach myself how to do it for some time now. The problem is I don't know where to start. I've searched the web to see if it'll give me at least a hint as to where to start and have seen that I need to learn to code first. Any help as to how I can tech myself to code? Any preferred coding programs, training programs, or places I can learn to code? Any help is deeply appreciated! Thank you.
Forum Thread: Injection Problem with Qualcomm Atheros qca9377 on Kali
Well I have an Acer Spin 5 with a Qualcomm Atheros qca9377 wireless card. I noticed when I put it in monitor mode it disconnects from all WiFi and the network manager disappears but it Airodump-ng still works perfectly. So then when I started trying to use Aireplay and Airecrack I got this error.
Forum Thread: Problems Over Wan
i hacked an android over wan ...but here is the thing ..when i try to download an images or informations fom that phone ...either the connection timed out or the pics and info come uncomplete mening the photo is not a full pic for example ...and the exploition is very slow ...is there any way to fix this and make the packages coome faster and safer...
Forum Thread: Getting Connected to Wifi in Kali Linux VirtualBox
I am trying to connect to a wifi network in Kali Linux using Virtualbox. I am using the "Bridged Adapter" network setting. At my house, I can get an IP that is on the network and can be pinged from a separate computer. I also tested it in another location on another wifi and I can get an IP that is on the network. For some reason in another location with WPA2 Enterprise Wifi I can get connected to the internet, but I can not get an IP. After running the command "ifconfig" in the "inet" field ...
Forum Thread: Phone Hack via Browser Test
Hey, beginner here. In Mr. Robot, when we learn of Trenton's and Mobley's first meeting, Trenton hacks Mobley's phone by getting him to go to a fake speed test website. I'm curious how you can do this.... anyone?
Forum Thread: Zone Transfer Attack to DNS
.. The domains, ... usually deliver a lot of information and sometimes more than due. When it comes to services, domains, websites and more, often escape details such as the configurations in DNS servers , so we will see what is the zone transfer to DNS and how this can expose information and infrastructures
Forum Thread: Problem with Gdb
When I run the comman "gdb -q ./a.out" I get this response : Reading symbols from ./a.out...done
Forum Thread: Getting Client IP for MITM
Hi guys. I've been reading a lot of the tutorials here recently and decided to try a simple MITM attack following the first tutorial in the series. It's easy enough but got me thinking if it's any good for a real attack when I am not on the same LAN as the target. Anyone know a way to get the client IP in that situation? Thanks all :)
Forum Thread: Basic Concepts and Skills of Binary Exploitation. Part 1
Hello everyone, I am new to the forum and also still a baby in Cyber Security. I desire to join you guys so much that I can also learn from the process. Wish everyone can enjoy my articles and even comment to correct my wrong points.