General Discussion
Forum Thread: Q. Attacker Gets Access to a Router on Internet, Whats Next? ~ n008
I am a regular user here and have been following many articles. I just want to understand, what if an attacker gets access to my router, what possible attacks can be carried out. One I can think of is MITM by diverting traffic... What others options work? Can internal networks be scanned using nmap? or can attacker join the network?
Forum Thread: Any AV-Toolkits?
Hey there,
Forum Thread: Cracking wps pin
Step 1: I Have Been Learning Ethical Hacking from the Past Six Months and I Am Proud to Say That My Primary Source of Knowledge Is Null Byte.Cant Be More Thankful
Forum Thread: How to Edit Website Without the Admin Panel?
Hello, my first language is not English so sorry for my mistakes! So, i enter in the data base on an website and i have all the information i want.. BUT the admin REMOVE the admin panel.. (i have the login and the password of the panel admin) but when the admin don't use it he remove the panel... so my question is: Is there an other way to edit the files or pictures of the website?
Forum Thread: Kali Linux Installation on Windows
Kali Linux Installation on Windows
Forum Thread: How to Decrypt or Convert .crypt8 File Without Root Permission?
I have only .crypt8 file and don't have root permission on my phone.I want to decrypt it.Is there any tool to decrypt it.Another option is to convert it to .db file.But it requires root permission.Is there any other option?
Forum Thread: Edit Reaver Code?
I want to write a few lines of code in Reaver to get rid of a problem I'm facing with PIN cracking. Can someone tell me how do I access reaver script?
Forum Thread: No GUI in Armitage?
Hi I'm a greenhorn Hacker and I just wanted to start with Armitage. It connects and shows me no error messages but after connecting nothing appears on the screen. Any help?
Forum Thread: Hydra Doesn't Work in Kali 2.0
I tried using hydra but it does'nt work.. i checked for syntax error but everything was fine.
Forum Thread: How Do You Hack an Iphone?
I have done allot of my own research and after lots of searches I seem to come to no conclusion. Does anyone know if there is a way to hack an iPhone. Or is there not because I really can't imagine that they are so secure there is no way?
Forum Thread: What Are the Android Devices(Mostly Smart Phones Models )That Can Run Kali Linux?
Android smartphones that can install kali linux?
Forum Thread: Radio Waves of Doom
They essentially developed malware that can create a bidirectional channel of communication between your device and a sealed off network. All you need is actual physical proximity and malware to have infected the target (via a USB drive etc)
Forum Thread: What Is the Quickest and Most Simple Way to Hack Wifi in Your Opinion?
Looking for advice as a novice. Not asking for a cheat as a script kiddie but just your opinion on the most simple quick step. Preferably a tool from Kali Linux.
Forum Thread: Audio Malware?? Legit or Fake??
New Type of Audio Malware Transmits Through Speakers And Microphones Is this true?? Or just some fake rumour??
Forum Thread: Wanted to Know What You Think About My Wallpaper
Kali.jpg - Google Drive.
Forum Thread: Any Was to Install NetHunter on a Moto G?
Hello there, I'd like to use NetHunter on my Android Device but I don't want to buy a Nexus for that reason. Is there any way to install it on a Motorola Moto G (1. Generation Android5.0.2)? It's running almost pure Android that's why I'm asking
Forum Thread: How to Install Mitmf and Cupp in Backbox
i tried apt-get install mitmf in backbox.. but it did not work. then i added kali 2.0 repositories links to backbox. MITMF got install but
Forum Thread: Sinister Stingrays – FBI Surveillance Takes a Hit
Very interesting, they actually have a machine like this on the image? Read more here:
Forum Thread: WordPress Hackage [2]
Since my chromebook apparently cannot post replies, I'm making a new thread to talk about wordpress hacking (not in depth tutorial, just the basic steps)
Forum Thread: Using SSD Only for Kali Linux?
Hi guys, so I'm thinking about buying this SSD: http://www.amazon.com/Samsung-2-5-Inch-Internal-MZ-75E500B-AM/product-reviews/B00OBRE5UE/ref=dpx_acr_txt?showViewpoints=1
Forum Thread: NEW TO LINUX
Hey, so im farely new to the hacking world. For the last couple months ive been scouring the enternet learing all that i can. I've installed Kali Linux 2.0 in a VirtualBox and was wondering what are the first tools i should i start playing with if im just starting out hacking?
Forum Thread: #FSociety
hey guys i'm AbDou and this is my first post... We are ?#?FSociety?. We are ?#?Malicious? and ?#?Hostile?. We do not ?#?Compromise?.
Forum Thread: Router Not Accepting Ping/Connections
I've set up an apache server listening on port 8080 on my friends computer (192.168.1.15). For testing, I've only allowed my IP to access it by going to router (Huawei 192.168.1.1) NAT port mapping and specified External IP to my WAN IP, and port 8080 for both external and internal ports, with internal IP set to his apache-running PC.
Forum Thread: Wireless Microphone
Lets say someone near me is using a wireless mic.. the kind of one on stage.. So they operate on a frequency right??
Forum Thread: Hacking a Secured Server Like Facebook?
How would it be done? What programs would be used to recover the passwords and emails even if encrypted, would it be possible to mass DDOS to lower security, but even after that how would you go?
Forum Thread: How Do I Hack VPS with Metasploit?
Hello Null-byte, i want to know if it is possible to Hack VPS IP through metasploit, and how can i do it if possible.
Forum Thread: How Would I Get Default Gateway of My Friends Public Ip
i want to get friends public IP's default gateway because i want to try session hijacking throught the internet. I have done it many times in network by arspoof.. to do same i would require default gateway of my friends pubilc ip. OR if any other way to to session hijacking through internet please tell me.
Forum Thread: Handshake file and Wireshark
what cause the duplication in handshake 4 messages ? and is it has effect on the decryption process
Forum Thread: Hack Through Port (Telnet?)
I've been here some time now butt I've been mostly focusing on Wifi and injecting backdoors solely by social engineering (physical access). However, I have set myself a task. I have a PC behind my router. I have the access to the router,and can forward any port. However I'm not so experienced in choosing vulnerable ports an exploiting them, So if you cold point me at a guide. I've tried to open 23, but when I connect telnet from my kali to the pc(running win8), it requires a password which I ...
Forum Thread: Carrier Grade NAT and Port Forwarding
After weeks of installing, learning, and getting a brief taste of kali linux, I have hit a wall because of my ISP. I knew something was strange when my wan IP in the router console did not match my public IP. After some digging, I found out that the culprit was the low-rent excuse for an ISP that I use here in the boonies of Brazil. As a result, it seems that port forwarding is out of the question in this scenario, and there are no other ISPs in the region.
Forum Thread: Same Problem with Kali 2.0
I forgot to take a screeshot But Here's details : When "Installing System" Finish & when it come to Finishing ans Installing GRUB it show an error ! then i have to choose Continue without GRUB installation !
Forum Thread: MitM Redirect?
I saw an android app awhile back for 'hacking' and one of the options was basically a man in the middle attack where it could redirect users, replace words/pictures and turn all pictures upside down. This got me thinking. If I did success fully MitM with MitMf or ettercap or some other program, Could I intercept the traffic and replace all of the links on websites to maybe like an exploit like shown in this http://null-byte.wonderhowto.com/how-to/hack-windows-7-sending-vulnerable-shortcut-fil...
Forum Thread: If You Had Physical Access to a Computer, How Would You Hack?
Lets say you have physical access to a computer for approximately 2 hours, what actions would you take and what would be the best wy to make sure you have full control of the computer back from your base?
Forum Thread: Kali Linux Source Open ?
i am using kali linux 2.0 and my friend tell me " can you see programs code with 'nano' command " but i couldnt do it :/ because where is the hack tools files ? if i can find files i can read and teach programs
Forum Thread: Importing Custom Payloads to Metapsloit
I would like to know how can i import custom payloads to Metasploit
Forum Thread: Most Remotely Exploited Port?
I would like to know what are the most remotely exploited ports
Forum Thread: How Can I Hack a Rdp or Smtp Server
Please can someone teach me how to hack a Rdp or Smtp server? please get back if you can be of help. Thanks
Forum Thread: Airodump-Ng Issues
I am following this tutorial here and I do the command "airmon-ng start wlan0" and it creates wlan0mon and displays "(mac80211 monitor mode cif enabled for phy0wlan0 on phy0wlan0mon) (mac80211 monitor mode cif disabled for phy0wlan0 on phy0wlan0)". After this I do the command "airodump-ng wlan0mon0" and it says that the resource is busy. Any help would be appreciated :)