General Discussion
Forum Thread: XHYDRA
Can someone post the setup- screen shots of XHYDRA using a anonymizing proxy / VPN. Its the second to last tab where you can check proxy etc.. it would be appreciated is they could explain each section and setup of this tab. Also a explanation of the other tabs and how they work would also be great for us NeWBies
Forum Thread: Active?
Hey all, First up a huge thank you to Master OTW, Th3 Sky F0x, and the other active contributors here at Null Byte.
Forum Thread: Hello Guys,
i am new here and i am so much exicited to find this beautiful site. my question is that how we install keylogger to a victims computer
Forum Thread: How Do I Add Some Content into the Embedded .Rtf(/.Doc) Trojan?
Hi OTW. I am following the steps you mentioned in that MS Word trojan tutorial:http://null-byte.wonderhowto.com/how-to/hack-like-pro-exploit-ms-word-embed-listener-your-roommates-computer-0140868/
Forum Thread: Community Projects Proof of Concept for Educational Purposes and Study Part 1 Keylogger with FUD
Call for development of a free keu logger with FUD capabilities. Most of/if ot all keyloggers on the web dont offer a FUD component and try to get you to buy their crap. All the online Gmail,Yahoo services and antivirus services will detect EXE files or warn the intended target party that there is a EXE file.
Forum Thread: Is Backtrack Is Good Choise if I Use Ubuntu
I am using Ubuntu 13.10 Saucy Salamander and I want to do some hacking. I'm thinking is it worth to install Backtrack or customize Ubuntu to be like Backtrack?
Forum Thread: Problem with BackTrack 5 in VM on Older MacBook
I have an older MacBook model 05-09, and I’m running BackTrack 5 in VM. My problem is that I don’t know how to put my w…
Forum Thread: What Are Some of Your Most Favorite, Most Reliable Exploits You Use Often? And Following, Which Payload?
The reason why I ask this question is for another source for understanding. I've read through OTW's articles and threads many, many times. However, I'm finding it challenging to successfully engage a node here at the home network. All computers are running windows 7 or windows 8.1 with ALL updates from the OS, and software as well. So I'm finding it very challenging to hack one of my nodes. Any help or suggestions for other ways to go about it? Maybe, manually install meterpreter on their sys...
Linux for Hackers: What Linux Skills Would You Like Me to Cover in the Future?
So far, I have now done eleven (11) tutorials on Linux Basics for Aspiring Hackers. Most of you seem to appreciate them. As I consider what areas of Linux to cover in future tutorials, I thought I would throw it out to the members of Null Byte to give me some direction. What skills would you like me to cover in upcoming tutorials?
Forum Thread: Pineapple Mark v,CreepyDOL- Pwn Plug R2 , Kali Linux or Others
So perhaps the folks here at null can go over how to use these toys in a step by step tutor fashion. along with Kalie Linux!
Forum Thread: Is Hacking Implanted Medical Devices the Next Big Cyber Crime?
Those of you who are fans of the Showtime TV show Homeland remember the episode last season when the main character, Nicholas Brody, had the pacemaker of the Vice President hacked. He chose this method of assassinating a man he felt deserved it, while leaving no trace of his involvement.
Forum Thread: Salami Slicing Anyone?
Computer hacking is significantly different from other crimes in a number of key ways. First, there is distance or remoteness between the perpetrator and the victim. Anyone connected to the Internet anywhere on this planet is vulnerable to anyone else on the Internet.
Forum Thread: How to Detect Antivirus?
Is there any (hopefully easy) way to figure out the AV used by target if they are behind a NAT device? I was having troubles scanning them with nmap/xprobe2.
Forum Thread: I Am Using Nmap Result
5357/tcp open wsdapi how can hack system
Forum Thread: Should Software Publishers Be Held Liable for Losses Incurred by the Purchasers?
When software companies publish or manufacture a defective product, the losses from a security breach resulting from that defective product can reach the millions of $US, and in rare cases, billions of dollars. Presently, the purchaser/consumer of that product bears the entire burden of those losses. This means that if Microsoft turns out a defective Internet Explorer (IE) that is then exploited to steal your bank account, the loss in borne by you and you have no recourse for compensation fro...
Forum Thread: Can Someone Here Give Me a Tutorial for Website Hacking?
I'd like to 'hack' a website + database but dont know how
Forum Thread: How to Secure Your WordPress Database Config and Prevent Hacking
In this short How-to I'll tell you how to make your WordPress blog more secure.by doing this no one will be able to see your WordPress database config. It is very important to secure the Database Config
Forum Thread: Anonymous on the Net or Not
Followup to other posts here about remaining anonymous while on the internet using laptop/device. As the article below ( linked )at bottom of this post showed back in 1999, chip makers were having their chips send out or thinking of sending out the equivalent of a SS# for your device and the privacy foundations were in litigation to find out what was being done. So for discussion are our devices, in the post 9/11 world truly untraceable? I doubt it.
Forum Thread: 'Getsystem' Without Meterpreter?
So I started using Meterpreter and found out about the getsystem command which uses '15 build in ways to gain sysadmin privilegies'
Forum Thread: Become a Cyber Warrior
In this digital era of cyber crime, cyber attacks, and cyber warfare, the warrior of the future will be a cyber warrior. No longer will nations fight wars with guns, bullets, bombs and soldiers, but rather with computers and hacks.
Forum Thread: How to Shutdown All School Computers
hi my name is Teferi And i'm wondering if their is a way to hack all school computers at once.
Forum Thread: How to Hack School Server ?
Hi all, I'm beginner but i need learn how to hack server and get key from database.
Forum Thread: Desperately Need Assistance with Cain and NTLM Hash Dictionary Cracking
Hello, I have an NTLM hash from my Windows 7 computer. I created the account myself as a test. I know the password. I can load this hash into Cain, then load this test wordlist http://www.rainbowtables.net/tutorials/Cain_Sampl_Dictionary.txt with the correct password that I know appended at the end of the test list. I then run the dictionary attack and it is successful. Now, I create a custom wordlist myself in Notepad and I insert the known password and the dictionary attack fails every time...
Forum Thread: Skype Backdoor
So i recently became aware of the fact that famous VoiP client Skype which is part of Microsoft has indeed an backdoor service which monitors our chats when we send certain keywords. What do you guys think about this? Can we even trust any IM?
Forum Thread: Cyber Warfare
We've entered a new era in the history of human-kind in the last decade. Almost from the beginning of time, wars have been fought with physical violence meaning spears, knives, arrows, bullets, bombs and attack helicopters. Now, wars can be fought with a single computer. If an aggressor nation or rebel movement can attack and shutdown another nation's electrical grid, water system, sewer system and communications, they won't last very long in a war.
Forum Thread: The Botnet Threat
Many in the security industry (including yours truly) estimate that over 1/3 of all home computers are infected with bots and are part of a botnet. This enables someone to remotely control and use that system for good or ill. If these estimates are correct, over 100 million computers in the U.S. are part of some botnet. Sometimes these bots are used for spam, DDoS attacks, password cracking, proxying attacks, etc.
Forum Thread: The Hacking Process
Many people believe that hacking is a simple process. Someone hands you a silver bullet and you own the system! That is far from the truth. Hacking is a slow, methodical and sometimes tedious process. You have to do your "homework" to be successful.
Forum Thread: Impossible,Improbable or YA Its Doable
I am sure this is being monitored -So for conversation sake/hypothetical free speech and educational purposes only . Basically looking for the steps to remain unidentifiable as mush as possible. A step by step guide with backedup information that can show that a computer / laptop gives off this information when connecting to the internet and what to do to avoid such.? For the paranoid--do we know that Intel or AMD,or other parts of the machine are not encoding their chips / equiptment to give...
Metasploit Unleashed: Free Wide Metasploit Guide from Offensive Security
Our friends from offensive-security.com have a very helpful introductory guide for the Metasploit Framework. Check it, I highly recommend. Metasploit Unleashed.
Forum Thread: Literature for the Aspiring Hacker?
After reading and as well trying stuff from Null Byte for some while, I thought of getting some literature on "Hacking" to expand my knowledge. After a short research on Amazon I became aware of the variety of books about IT Security and Hacking.
Forum Thread: Computer Help Please.
I don't know if anyone can help me here, but if not, can someone please point me to a site that can? my computer keeps blue screening. this is what it gives me:
Forum Thread: How Do You Become a Mod?
I don't really have a reason but I just want to find out how to become a mod
Forum Thread: If You Were Hacked, What Would You Do?
If you were hacked and you could attribute that hack to a specific IP address, what would you do?
Forum Thread: How Do I See What URL a Software Is Connecting to for the Call Back Home?
I just want to see the URL whether it is a IP or domain name, either way, no need to bypass it or anything. I cannot seem to figure out how to see it or trace it.
Forum Thread: If My Company Gets Hacked, Do I Have an Obligation to Report It?
When some companies get hacked, they don't report it to authorities or the public. This is because they fear damage to their reputation and possibly a loss of confidence by the public. Should it be mandated by law that they report the compromise of their security?
Forum Thread: How to Learn Hacking from the Beginning
please please hackers and intruders i'd like to earn hacking for educational purposes
Forum Thread: Can Anyone Tell Me How to Decrypt Password Hash of Mega.co.nz?
I Already Extracted Out the Username, Email, Master Key a...
Forum Thread: Should the U.S. Hack the Syrians?
The U.S. government is considering attacking the Syrian regime with cruise missiles and bombs in response to their using poison gas on the rebel opposition. Wouldn't it make more sense for U.S. government to simply hack the command, control and communications center of the Syrian government? It would a lot cheaper and fewer lives would be lost.
Forum Thread: Is Windows 8 the New Vista?
Back in 2007, Microsoft launched a new operating system they dubbed "Vista" to much fanfare. Unfortunately, corporations and individuals worldwide shunned it due to a variety of issues. Many simply skipped this OS entirely. Eventually, in 2009 Microsoft made a number of changes and improvements to Vista and re-released it as Windows 7 that was a success.
Forum Thread: Best Hacker Training?
A number of you have asked me about getting more hacker training. Before I give you my opinion as to best place to get hacker training, I want to throw it out this community. What is the best place to get hacker training?