Null Byte Forum

Forum Thread: How to Schedule a Comand in Linux?

For some time i had been using reaver to crack some WEP'S.Some routers are pre configured to recognise a bruteforce attack and blocks the mac address from doing further bruteforce say for some like 10 attempts.The router also recognises the MAC address and just blocking it from sending further requests.So,what i feel can be done is by changing the mac address after a specific time using the following command by just simply typing,

Forum Thread: Wi-Fi or Bluetooth Mobile Exploit

Most if not all phones are bluetooth enabled, we are advised to disable it when not in use. This is where my question comes in, is there a way to hack and control phones via bluetooth that have bluetooth "off"? and can one force pair? Whats the maximum distance to be kept between devices? Is it also possible to exploit using a phone?

Forum Thread: Hello, I Am New Here

Hello I have decided to create an account here as I believe asking questions, instead of just lurking, will speed up my learning. I am not a newbie when it comes to computers, but security/hacking is something completely new to me and I am really excited to learn more about it :)

Forum Thread: Beginner Looking to Start

Hello everyone, I am extremely new to the world of Hacking and I was wondering if anyone has any pointers for someone who is just starting out. I have some extremely basic knoweledge of coding, even saying that is a stretch though. This is something I've always wanted to get into, so even the smallest jumping off point would be appreciated.

Forum Thread: Question About Website Automation

I've recently been using a tool called Selenium. The tutorials and forum posts have been mostly from 2011-2013. My question is: Is this still the "go-to" tool for website automation? I wanted to do a tutorial and I would hate to be covering an obsolete tool.

Forum Thread: Why on Some Networks a Simple db_nmap or a Normal Nmap Not Add Any Hosts in Msf or Armitage?

I was kind of wondering why no hosts would show up since metasploit v4.11.5 came out. This is troubling to me since before I updated, i could get every host that was mapped. After, on the same network, there are only two left. (Linux 2.6.x, embedded) After i do {nmap -sn 192.168.0.1/24} everything is listed with 6 hosts, but msf only adds two of them. How can i fix, workaround, or understand this?

Forum Thread: Skiddies.

Hey im AugustFackYou. We all know about skiddies. You know those ten year olds who try to take down websites with LOIC. Basicly just people who dont know anything or little about hacking and instead use tools. In my opinion its fine to use tools as long as you know how they work and what they do. Another thing is that if you dont rely on tools alone its also fine. Just tell me what you guys think! -AugustFackYou

Forum Thread: Database Crawling

Hi, everyone So, a lot of people these days are getting into trouble for crawling the databases they are not supposed to even though they are public information, how about that? You can look at it online but not store it on your computer. It's like i'll tell you my password but you should not remember it.

Forum Thread: 00% IRC?

This has been asked many times, but I think it's finally time to take action. I'm looking to setup a proper IRC or chatroom for this great community, but would like input from you to know what website/service would be the best. Perhaps Chatzy is a suitable website, or Freenode (though it's difficult to set up)? However, it'd be great if OTW could make it on his account, thus the privileges for both places (here and the IRC) stay the same.

Forum Thread: IRC Chatroom Updates?

HI everyone, I am a huge fan of this site and the information on it. I was just curious i have seen in one of the articles that there were plans for a nullbyte chatroom on irc. Is that still in the works? If so i was hoping for some details.

Forum Thread: Any Alternatives for Exploits on Windows.

So, I'm kinda in a dilemma. I'm stuck with using Windows until I can get a bootable DvD for Linux. The problem is I've read that Metasploit doesn't work that well on Windows, so I am asking if there's any alternatives other then Metasploit? And please, no comments telling me to get Linux, that's not helpful to my cause. Please and Thanks. ;D

Forum Thread: Bypassing IDS-Firewall Using Meterpreter Over SSH on Kali Linux

MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection. The way it works is by injecting shellcode into memory, then wrapping a port spawned (meterpeter in this case) by the shellcode over SSH back to the attackers machine. Then connecting with meterpreter's listener to localhost will communicate through the SSH proxy, to the victim through the SSH tunnel. All communications are re...

Forum Thread: Measure Website Size

Hello Everyone, i want to DDOS Attack on Website, it have not any SSL or WAF or similar protections, but only one thing i want to know is how to measure website size and how can i know how many packets is enough to Shut down website ? i know how to DDOS attack may i will use T50 or UFO BOTS.. have anyone idea how to measure ? i know i need some wbsite analysis tool but which one?

Forum Thread: Layer 2 Attack on Network

Hello Everyone ! I'm new to the null-byte forum. I read a lot on null-byte but didn't find some Layer 2 attack. I work for with a company who tell me to find some vulnerability on their Network. The only Attack that I've read are "Vlan Hopping", "Arp spoofing/Poissoning", "The Famous MITM" and "Mac flooding"

Forum Thread: How to Reveal MasterCard CVV2

I figured out how the Luhn Algorithm works for verifying the card check number and that the card is valid but I still haven't came across how your supposed to come up with the actual 3 or 4 digit code on the back of the card. I've been trying and just don't understand how any of the different methods and calculators haven't shown a way to do this. Any pointers would be helpful with showing me what part of the process I'm missing.