hello, one month ago I tried to hack my android phone over my lan and I did it and now I want to do it again but I have some problems I'm trying with msfconsole: and then: d2j-apk-sign fb.apk and I started msfconsole: and it show this: Did I do something wrong?
Forum Thread: Does iCloud Tell Their Users Anything if You Change Their Password Through Security Questions?
Do they tell the user the hackers answer attempts or anything like that?
id like to know is it possible to remotely control a sony smart tv. the open ports are: 25, 80, 110, 20031
Forum Thread: Can We Send Apk File Which Install in Android without users notice and Then Send Us Audio File and Record Every Bit of
like i have andoid mob now that type of apk is install on my mob so it will record all sound like if im talking to someone on call. or im talking to someone who is near me(infront of me) it will record every bit of sound and send it to me when my mob connect to internet.
i start trying DNS Spoofing, first time was working when i try it on my smartphone and it was great but when i try it on my windows I'v open the browser he stay loading and show message that insecure certificat.
So I read another article here lately and it was going over understanding why anyone would want to be a hacker. So after this, I started thinking, I have been committing 5-6 hours a day on learning hacking stuff but seem to be learning nothing. Then it came to me I needed to learn 2 things first. These two things would help me see my path to becoming a hacker.
Hi i have problem i want exploit some pc from WAN network.Always when i set my dynamic DNS as lhost or srvhost metasploit always show this error message:"Handler failed bind to EXTERNAL IP:4444:- -*Started reverse TCP Handler on 0.0.0.0:4444"
hi i wana hack someones android phone and both of us are in same wifi network. i wana steal photoes text and other things and watch camera but can say me how?
Good evening guys,
Hello everyone ! First of all, I apoligize for my English :)
I tried to hack my android 7.0 with all exploits from metasploit but no one worked.Do you have some tips? How can I hack with a link?
I recently came across null-byte and I was immediately intrigued by all of the interesting articles and the wealth of knowledge on this site. I decided to try some of the things on here out for fun, but when I try to use Metasploit and set my payload I'm always told the payload is invalid, so I was hoping that someone on here would be able to help me.
Good evening (at least where I am) I was wondering when we/I could expect the first Windows 10 Metasploit-Exploits.
Whatsapp web has been out for a while now it gives you the ability to use whatsapp on your computer, you simply need to scan a QR code with your phone from whatsapp and you'll gain access
Hi. I want to install NetHunter on my OnePlus One phone.
We've had complaints about corrupt zipped files on our website. I was able to repair one but the other is a collection of files that sometimes gives an error about split or spanned files.
Good afternoon, dear friends! Now 3rd day fighting with the problem: when opening the file Excel gives the error "the File is corrupt and cannot be opened". Some of the file properties there is a button to "Unblock", after which they are open, but there are files that do not open are not having this button, and indeed want, to do was not open all files without any fintifluhka action.
Hi, I'm trying to encrypt a shellcode but I can't. Because a shellcode is a string but not an alphanumeric string. I tried with a XOR cipher but the only thing I get when I print the encrypted shellcode on the CMD is a string of strange characters with a length of 3. I don't know what to do to really encrypt this shellcode. I have encrypted the real shellcode, and got it on the cmd, but I get an error when I try to launch it.
Hey everyone... just my first post here. I'm looking for a wireless usb adapter to use with Kali 2.0, so I started some research on the most wanted adapters for hacking, that must include Monitor Mode and Packet Injection.
I was thinking of using ngrok in a reverse_tcp attack over the internet on Kali Linux. But couldn't do so, I didn't get an open session, I use the ngrok url in place of the LHOST while creating the payload.
My question over here is that how could one newbie or even intermediate techie start its path to become pro hacker like even bounty hunter , finding new vulns , exploiting/writing own scripts .Like even though one learn java/any programming languages like java,python,C,C++,etc from sites like codecamp, codecademy they dont teach you stuff about hacking/exploiting . I think my question is clear enough now !
i created a python crawler from scratch. it is very efficient ,-i tried to crawl many website (34) some of them are of, more then 400000 pages and it work like a charm. but sometimes it stuck in a loop by try to crawl single page again and again. so please help me to figure out the possible solution (my guess :- its may be because of the characters like -"\n" so how can i filter these type of characters) and its appreciable if test my script in different website and let me know ,if you find a...
I have recently got a raspberry pi zero w. I did this to try and use its USB slave functionality and do things like HID attacks and grab cookies and such with poison tap. I cannot, no matter how hard i try, get duck berry pi to work. I would be very grateful if someone could make a guide on how to do it, or provide an image that I could use. Thanks in advance, m4r10
Forum Thread: This Is the Girl Who Wrote "I'm Being Hacked Like Mr. Robot," Topic Cont., New Info, Desperate for Help!
For some reason, my old username's password doesn't work, and even though I know it's right, the link to change my password doesn't work (just won't load and gives me error 500 I think it is). That's just one example from my daily life.
so i have kali linux on a usb and i dual boot it on my mac but when i first booted it i noticed that i wasnt able to connect to wifi at all, so i bought the alfa awus036h on a recommendation and tried installing it on my mac.
i am Savath , a student at bachelor degree in year 3 . this topic , i want to learn deeply .
I've made a video tutorial of the whole attack if you prefer to understand things visually:https://youtu.be/p5QwtYYeZZY
There's lots of people in this world want to know how to hack wifi networks. You must search for CMD and run as administrator. But you need to trick your victim to connect his Wifi to your PC or Laptop. NOTICE: This for education only. Note: Even if the victim has logged you out from the Wifi long time ago you still can hack the password.
Hi i new in metasploit and also on whis forum.I have problem with metasploit i reconfigured postgresql config in section (CONNECTION AND AUTHETICATION)
hey guys i have generate payload with msfvenom android/meterpeter/reverse_tcp and i use my external ip, also i have forward my ip .
Hey guys am a new born ito the comunity so i am very interested in wifi hacking and i have tested tools like fluxion but it does not obtain a hand shake somz times. and i will like to know which method is best
I hadn't ventured into Hackforums since a while, and this time when I went there I saw a thread about a script called Fluxion. It's based on another script called linset (actually it's no much different from linset, think of it as an improvement, with some bug fixes and additional options). I did once think about (and was asked in a comment about) using something like a man in the middle attack/ evil twin attack to get WPA password instead of going the bruteforce/dictionary route, but never l...
I heard its a crazy Attack on Android phone but I have search all day without getting anything useful so I was asking if anyone here know about this attack please share
I'm a beginner in hacking and i've facced some problems 1.I have configured proxychains.conf to dynamic chain added a socks 5 127.0.0.1 9050 but still my dns is leaking.
Hi there I really like the guide for your crunch word list generator. I have the concept of many basic word lists now. I am a bit confused when it comes to some of the complexities though.
I am running Kali Linux on Oracle's VM and can easily create the cloned site with SETOOLKIT. I am also able to access the site through Kali Linux on the provided Firefox ESR browser, however, when I try to access the cloned site from my phone using safari, I can't connect. Same goes for google chrome on my other computer and anything outside of Kali Linux. Please help!
So i was adding a wireless device to my BThub4 and typing in the password i realised that no characters were after f so immediately thinking this hex must be generated someways i delved online and found some material on gnucitizen on a researcher who cracked the generation for the old the old BTHub 1.0 based on the Thomson SpeedTouch 7G and ST790. Although this was WEP encryption to give an idea of how dated this is.
Then that i read this: https://null-byte.wonderhowto.com/forum/kali-linux-tp-link-tl-wn722n-v2-driver-not-working-0177837/
I want to know that ,is it possible to control Wi-Fi router completely from ubuntu terminal. I am talking about controlling everything ,as I do in laptop or computer modern.