General Discussion
Forum Thread: Where Can I Find Full Version of Havij Latest Version (Pro V.)
Where Can I Find Full Version of Havij Latest Version (Pro V.)
Forum Thread: The New Dark Web
I wanted to share with everyone information about IP2, a free and open source software that allows users and applications to each other anonymously and securely. While i2p has been around since 2003, it was thrown into the spotlight in January of this year after the infamous Silk Road left TOR for I2P. While it' definitely has it's glitches, I love it because it provides you with a CPanel of sorts where you can log into chat, post things online, surf the web, transfer files, ect, ect. I'd def...
Forum Thread: Iptables - a Question About Security
I have been studying Iptables for the best part of the day and have a question on the table 'security'.
Forum Thread: Transfer from Burpsuite to THC Hydra
I was noticing the Intruder function on Burpsuite was pretty slow so I was wondering if there was a way to do essentially the same thing on Hydra but a little faster.
Forum Thread: What's a Good Place to Start Learning Networking?
I want to have a stronger understanding of computer communication and networking. Sometimes I am confused on internal and external IPs and some other concepts.
Forum Thread: Using a remote GPU to crack WPA/passwords
Hi, I would like to know is this is possible to use my GPU from my gaming computer for cracking WPA/passwords?
Forum Thread: Mysql Server
Question 1 Sqlmap doesnt require a password list??
Forum Thread: Hornet Onion Ring Routing Network
So I guess you guys have been reading about the new high speed onion ring routing network, Hornet? http://www.zdnet.com/article/hornet-tor-alternative-for-high-speed-anonymous-browsing-revealed/
Forum Thread: Uploading Pictures on NullByte??
Hi I have a minor issue. I need to upload picture to nullbyte such as my profile picture, and pictures when I am doing articles on here, but I can't browse through my PC, I have to upload from Web, how do I do that? I tried uploading a picture to a site where I could upload a picture like flickr.com but it still wont let me
Forum Thread: Huge Android Leak
Just wanted to share this with you: http://venturebeat.com/2015/07/27/researchers-find-vulnerability-that-affects-95-of-android-devices/
Forum Thread: How to Download Programs in Kali
I need to download torrent. Is downloading programs on kali is same with window? if it is different please tell the step
Forum Thread: What Kinds of Wireless USB LAN Cards Are Good
Trying to use Wireless USB LAN Cards in desktop - Liux OS-. Could you list some Wireless USB LAN Cards that are good?
Forum Thread: Question with Aircrack Ng with Kali
I am using aircrack-ng on kali and this linkhttp://null-byte.wonderhowto.com/how-to/hack-wi-fi-cracking-wpa2-psk-passwords-using-aircrack-ng-0148366/ is based on backtrack so the wordlist is different. Do I need to download a new wordlist or is there already a wordlist that i can use?
Forum Thread: Does GSA Email Spider Gives Inaccessible or Hidden Email Addresses and Phone Numbers of Web Sites?
Someone said that GSA Email Spider gives every hidden email and phone Numbers in any web site to user.But it's not truth.Am i right?
Forum Thread: How to Start?
Im new in this of hacking and i want to know what i need for learning ethical hacking, and where i can found books and stuff like that about this theme..
Forum Thread: What Are the Vulnerabilities That Can Deface Web Site Except SQLi?
Except SQLi are there any vulnerabilities that can deface web sites?
Forum Thread: How to Hack Like a Hacker
Please note this article is for those who have intermediate skills and are looking to expand those with real hacking practice in a structured environment with lesson plans and homework. After completing this course I am confident that you will have the skill to begin the move into full hacker status.
(Reviewed) Question: Proxyham/ProxyGambit, the New Way to Be a Little More Anonymous on Wi-Fi?
So as I was reading the http://null-byte.wonderhowto.com/forum/hornet-onion-ring-routing-network-0163393/ Hornet Onion post I followed the link and read the "news". But I caught an eye another interesting report: Proxyham - How to access Wi-Fi anonymously from miles away - http://www.zdnet.com/article/how-to-access-wi-fi-anonymously-from-miles-away/
REcon: Computer Security Conference with a Focus on Reverse Engineering and Advanced Exploitation Techniques
I was wondering on the web yesterday and I found this: REcon - "REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. It is held annually in Montreal, Canada.
Forum Thread: A Good but Devoloping Website for Greyhats.
Hay guys, I have made a new site, still building up with few members, but it will be appreciated if you make a account it that. www.hackingencrypted.yooco.org
Forum Thread: Several Questions
This is more of a hypothetical question: Is there a way at all to hack a computer with metasploit without any interaction with the victim at all? I mean by not sending a payload, anything embedded with a payload, but by just knowing their IP address? I know that ms0867netapi exploits XP Computer running Service Pack 1 and Windows 2003 computers.
Forum Thread: Python Credential Sniffer
I just finished working on a Python script that helps you automate MitM credential sniffing. It uses Ettercap and Arpspoof. Hoping to add SSLStrip next. It can:
Forum Thread: Evil Twin
Lets say I create an evil twin on my laptop... How do I make everyone that connects to my evil twin to display a single webpage I made... that means that whatever they try to open... this webpage is displayed...
Forum Thread: Set Wireless Attack
What I did - 1) open set
Forum Thread: Anti Virus Advice
Hi guys Been reading a lot on this site lately, and am getting a bit more paranoid (read aware), the more I read.
Forum Thread: Meterpreter Logs
When I use meterpreter commands on a pc or android to do anything like snap a pic or install keylogger or something...
Forum Thread: How to Botnet
So lets say ive created my own little botnet with pcs that I own and some family ones.. What can I do with them...
Forum Thread: Metasploit and Anonymity??
Ok ive searched a lot but cant find about it... How can I use metasploit to create payload and all but cant be tracked back to my ip.. or I will say takes a lot lot lot of time to track back to my ip??
Forum Thread: E-Mail Hacking - Where Do I Start?
Hi there, I've been hitting wall after wall trying to figure out specifically how i'm going to hack an email account. I know i'll have to brute-force or dictionary attack or something like that in order to get the password, but how do I actually start hacking the email account.
Forum Thread: Binary Greetings!
Oke...where to start,i've been following Null Byte for a while now. And the stuff that is posted really is good.Well explained and good detail!Kudos for that.
Forum Thread: Installing Kali Linux
I have installed Kali Linux but I have now decided that I want it on my system, but not overwrite my main OS which is Windows.
Forum Thread: Msfconsole Payloads Encoding and Uncommon Wifi Hacking Methods
Hi Everyone! This is my first post here , but I've been reading Null-Byte for a long time, learning ang getting better and better. Thanks especially to OTW, CIUFFY and Hacker|Cracker I love your posts! Today I've finished reading articles and manuscripts about evading AV. That knowledge brought me some questions so I decided to sign up and join this great community.
Forum Thread: C++ Exploit Building?
I am very interested in building exploits in C++. I understand that I have to implement a sockets library when working with servers . Are there any resources that I can use? I am really looking for make hacking tools, command-line based or GUI based, not really buffer overflows.
Forum Thread: Metasploit, Dynamic Dns and Ip
Question 1 If I use like tor or proxychains or both and then if I connect the last ip to my dynamic dns... then if I use my dynamic dns in metasploit.. will it work??
Forum Thread: Help :"911_AP" Using the Fake AP Option.
First of all I would like to greet all of you because this is my first time posting on null byte : Hi!!!!! ^.^
Forum Thread: Hashcat 24m??
So when I was using bruteforce with aircrack... I was getting like 3000 keys per second... But when I used hascat to bruteforce... im getting 24 million words per second?? Is it even possible lol??
Forum Thread: Redirects to Wonderhowto Main Page
If I leave a tab open to something for a while it redirects to wonderhowto.com and this is kinda annoying. Is there a way to fix this?
Forum Thread: Sessions Hijaking with DNS Rebinding?
I'm not sure if this is out of the scope of the users here, as I never seem to get many detailed responses, however I have an idea regarding DNS rebinding. DNS rebinding allows one to bypass the Same Origin Policy and thus execute javascript on a site it doesn't belong to. My thinking was that if somebody could rebind to site like Facebook, and then execute javascript to dump cookies or do any other actions, we could create an automated hijaking script that would only require a click with lit...