Hello guys, I have been into Pen Testing for awhile now and managed to exploit some vulnerabilities and gain user/root privileges on LANs ONLY. I was wondering how would be the steps of hacking into a machine through WAN.
Kali Linux 2.0 Okay so I have been practicing using metasploit. I have created a back-door file, I have put it on my lab laptop, and I have setup persistence and done some stuff to get used to most things. I somewhat understand most of what I need/want to for right now.
Hello friends . we have been increasingly bombed by IOT ( internet of things ) that's why i am writing this thread .since it is inevitable progress, interaction, and acquisition of the products that are under this implementation.
COMPLEX MALWARE: METAMORPHISM, POLYMORPHISM and EPO | THEORY and PRACTICAL EXAMPLES by [Mohamed Ahmed].
In this thread I will try to present the most sophisticated methods that the malware uses to avoid detection by the antivirus companies, I will start with a broad theoretical introduction on polymorphism, metamorphism and the EPO technique; then we will exemplify the theory with practices and analyze the results to draw conclusions.
In this thread I will reverse engineer a crackme on Android of We will solve the crackme number 2, to install it in our emulator we use the android device bridge
Hello people. I tell you about a terminal application command, which connects freely to any via web. The application is GoTTY you can find info from this in your project link:
Forum Thread: Network Infrastructure and Hacking Techniques [Theory Theory] [Part 1] by : Mohamed Ahmed .
Good morning readers,today I am going to explain a bit of basic theoretical information on Network Infrastructure to later be able to understand the operation of the different Hacking Techniques when applying them in our testing laboratory or anywhere out .
Search engines like Shodan , Censys or ZoomEye , which allow you to search for devices with services exposed to the internet, are already well known
I wanted to hack an account really urgently. Can anyone help me with this ?
Hi, yet another aspiring hacker here. Okay so, long story short, I got interested in wi-fi hacking lately, and I've been looking for some proper equipment to practice it. Nothing out of the ordinary right? That's what most of us ended up here for. And being the lazy fuck I am, I settled for the recommended Alfa AWUS036NHA and ideally a yagi antenna. Both are available on Amazon and a bunch of other sites. So far, so good (besides the risk of buying an inferior chinese knock-off).
Hi all I enjoy reading articles on null-byte, and love the community that comes with it, but I would like some advice on the best books/ebooks to read on the subject of hacking for some more in depth information on how create your own exploits.
There is a corrupted file format .cdr CorelDraw version 10. Is there any possibility of recovery (recommendations for file recovery on corel.com refer only to the 7th version of the product - not suitable; to restore by importing into other programs, other program, of course also causes the error)
Today, if I want to arpspoof a physical machine form a VM, I have to arpspoof from the physical adapter (wlan0), not from the virtual eth0.
The goal is to build the cheapest PC based on multiple GPUs that will be used for cracking passwords. I guess one of the most sophisticated questions here is what graphic cards to use. Would be nice to understand what technologies these card should support, like cuda, opencl, sli/crossfire. Also, what other hardware should be used to support multiple graphics configuration?
I've been digging around and found dozens of forums related to pentesting, hacking, etc but a majority of them are inactive, have few posts, or the last post was like 2 years ago.
Code: ------------------------ despareser icons ------------------
This year we talked a lot about the famous rasonware, cyber attack worldwide that suffered many companies and others, ps well, first understand that it is a rasonware and how it operates. According to wikipedia:
I suspect my wife is cheating on me and I want to find out how much she's not telling me. I know she uses Facebook and Twitter to message him. She's locked everything up, her laptop, droid phone (via fingerprint), email accounts, etc. She does have a Guest account open on her laptop and leaves it home when she goes to work so I have all the time I need on it. I think she may have a keylogger or other antispyware on her laptop so I don't want to tip my hand that I have hacked her password.
Well, the bluetooth is f#cked. There will be a chance that we get the script on Github or in Kali repo to test it on our home devices?
Can anyone please spare some time to tell me how to install Metasploit from this github link? https://github.com/AnwarMohamed/metasploit-framework/tree/android_whatsapp
Hello today I bring you a little toy that can help a lot to perform some tasks of a pentesting. This toy can be purchased for a small fee in specialized stores, but thanks to this homemade DIY tutorial, we will learn how to do it ourselves. So let's make a tax sniffer, a Tap!
today we will touch on "SHODAN" in its Pentesting mode, using functional Exploits that will help them understand and audit vulnerable servers that exist.
i need help plz help me
Hello! I have installed the driver: RTL8188EU for the TP-Link TL WN722N V2 network adapter. The wifi works, but when I'm trying to run the command airmon-ng there is no PHY and no Chipset and when I try to run the command airodump-ng mon0 i get an error. It should work because the adapter supports monitoring networks. I'm running Kali Linux in VirtualBox on a Mac Book Air 2015. Here is the pictures of the terminal: Keep in mind that I'm new here on the forum and in Kali Linux and thanks in ad...
i am Savath , a student at bachelor degree in year 3 . this topic , i want to learn deeply .
Hi all, I am desperately in need of help with my daughter. Recently she's been very disobedient towards me and my husband, she would yell back at us if something we said upset her; sometimes she would even push or throw stuffs on the floor in front of our faces! The other day I was able to spy on her phone. She has been texting with some strange people and seems they've met several times too! I and my husband are very worried, we'd tried talking some sense into her but it was pointless and of...
Dear master hackers,if i creates a RAT, am i able to spy on a android phone?basically everything in the phones inside messages,photos,calls,sms..which would be the best hacks?i'm unable to install any apps into that phone,is it possible for me to bind it in a link so once he/she opens the link,the RAT or anything will be in her phone.
This is from a pastebin link basically the information given is Software Loopback Interface 1
It is possible to crack a telegram bot? How does work a telegram bot? There is a game bot with the game points..it is possible to crack the bot for adding points?
Then that i read this: https://null-byte.wonderhowto.com/forum/kali-linux-tp-link-tl-wn722n-v2-driver-not-working-0177837/
Surely on occasion you have used Wireshark (network traffic analyzer: sniffer) . the traffic between servers is protected via MTLS and from client to server via TLS
i have been searching for the best free vpn service now for a while, but i guess the asnwear is pretty unclear. i were wondering what you guys personal think is the best free vpn for hacking with kali linux?
I will teach you how we can audit systems worldwide by the ranges that the ISP give to each country, this POST I wanted to elaborate it about 1 year ago, but reasons of time and occupations do not make it easy for me , but today I have the pleasure of doing it public, since the tool "Masscan" have already published in some videos or forums but with a poor content, clear without discrediting my colleagues in the "ordinary" sense, what I will do to innovate the researches in attaching the tools...
Forum Thread: If I Installed Metasploit on a Computer Not on the Same Wifi How Do I Get Their Ip Address?
I have installed metasploit on a victims computer that is not connected to internet but how do I get their ip? Do I need his ip to enable webcam or something on Metasploit? I know I need it for Armitage.
Hi!!! In this thread, I want to describe Xss in detail from A to Z. for beginners....
While Working on Windows Xp sp2 if the Ports 445 and 139 Are Closed. Can We Somehow Open the Ports Remotely from Our Kali Machine ?
If it's possible at least. I do have root access on my device but I would like to share my game progress with someone who does not have root access on his device.
Hello my dear friends, usually i come here as teacher but today i come as student bcoz we are here to teach and learn.
I'm looking for a good VPN. Free ones are always a pain. Suggest some premium ones. Thanks in advance :)