First please forgive my poor english. I appreciate many creators' job in null byte, they share knowledge selfless.As a newbie, I hope there are some basic theory not only how to use tools, I don't want to be a script kiddie.I like the Python Study Series,which tell me how to program python.I know the technology of arp poisoning, how dhcp works, therefor how mitm works.So, if you post a article to null byte, I hope there are some link or description about how it works.
Forum Thread: A Suggestion to Null Byte About How-to Articles
- Hot
- Active
-
Forum Thread: Eml to PST Conversion 4 Replies
3 hrs ago -
Forum Thread: How to Install Kali Linux on Iphone or Ipad 26 Replies
1 day ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 45 Replies
2 days ago -
Forum Thread: How to Use NGROK in a Reverse_Tcp Attack? 21 Replies
2 days ago -
Forum Thread: Hack Instagram Account Using BruteForce 191 Replies
3 days ago -
How to: Crack Instagram Passwords Using Instainsane 33 Replies
3 days ago -
Forum Thread: Track phone using imei number. 5 Replies
4 days ago -
Forum Thread: Security in IOT ( Internet of Things ) By [Mohamed Ahmed] 1 Replies
6 days ago -
Forum Thread: Kali linux command error. Kindly help 2 Replies
1 wk ago -
Forum Thread: When to Use Reverse Shell and Bind Shell? 5 Replies
1 wk ago -
Forum Thread: Fluxion Not Working 6 Replies
1 wk ago -
Forum Thread: Hacking Stream (LIVE) 10 Replies
1 wk ago -
Forum Thread: Blind SQL Injection 6 Replies
1 wk ago -
Forum Thread: Hacking Facebook,Twitter,Instagram Account Passwords with BruteForce 160 Replies
2 wks ago -
Forum Thread: Can C Programming Help Me for Hacking or Pen Testing. 10 Replies
2 wks ago -
Forum Thread: I Want to Hack in to My Friends System Through his wifi router i am controlling 7 Replies
2 wks ago -
Forum Thread: How to Use the Exploits Found in Vega Scan 3 Replies
3 wks ago -
Forum Thread: Can I Send a File to a Computer Using Ip Address 5 Replies
3 wks ago -
Forum Thread: Problem with Hacking Webserver with Armitage 11 Replies
3 wks ago -
Forum Thread: Metasploit - Embedding an Android Payload into a PDF? 7 Replies
3 wks ago
-
How To: Generate Crackable Wi-Fi Handshakes with an ESP8266-Based Test Network
-
How To: Brute-Force Nearly Any Website Login with Hatch
-
How To: Phish for Social Media & Other Account Passwords with BlackEye
-
How To: Hack Android Using Kali (Remotely)
-
How To: Top 10 Things to Do After Installing Kali Linux
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How To: Automate Remote SSH Control of Computers with Expect Scripts
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
How To: Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection
-
How To: Hunt Down Social Media Accounts by Usernames with Sherlock
-
Hack Like a Pro: How to Hack Facebook (Facebook Password Extractor)
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
How To: Find Anyone's Private Phone Number Using Facebook
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: Buy the Best Wireless Network Adapter for Wi-Fi Hacking in 2019
-
Hack Like a Pro: How to Crack Passwords, Part 4 (Creating a Custom Wordlist with Crunch)
-
How To: 4 Ways to Crack a Facebook Password & How to Protect Yourself from Them
6 Responses
I like your suggestion.
Well since this is a tutorial forum you will find lots of tutorials but there are still quite a few good theoretical articles, but you must remember that articles that have a more practical side are often more fun reading and writing.
What I do is I have a list that whenever I learn something new or ask myself a question I put it on the list for things I want to search up later, then when i have the time I go through the items and look them up, and although it often leads up to more question, I get to learn quite a bit both practical and theoretical that way. There are so many place on the internet with good information you can always search up the concepts behind it if you want.
Cheers,
Washu
Congrats on learning these things! I hope you can keep using Null Byte to build upon your knowledge. It took my a lot of time before I finally knew how man in the middle attacks worked.
Cheers!
-- Cameron Glass
I would like to add an idea...it would be awesome if someone (or we as community) start a series on "market" hacking, it should involve algotrading (zipline/quantopian), machine learning and something else to detect trading bots, study them and exploit their behaviours/systems. Opinions???
Nothing will land you in prison faster.
I agree. Even if its just a wikipedia link, sure I could Google it myself but the author of the tutorial might find another description easier to understand. I would also love to see more theory series here. I know how this stuff works pretty well but almost no experience
Share Your Thoughts