General Discussion
Forum Thread: How to Downgrade Social Engineering Toolkit?
I currently have Kali 1.1.0a and I really want to use the sms spoofer on SET but its only available on the old versions of SET. So how could I replace my version of SET with the version of SET that has the sms spoofer? Thanks!
Forum Thread: Hi, I Have a Question About Metasploit reverse_tcp Safety
So I know that i can use proxy chain the host side of the reverse_tcp connection but the victim pc connects to my public ip so someone can easily check who is doing the attack. Can I somehow add proxychain to the msfvenom payload
stdapi_fs_stat: Operation Failed: 1 || Error on Creating Android/Meterpreter/reverse_tcp Session
Hello everyone! I need some help regarding stdapifsstat: Operation failed: 1 this issue. I have created an infected apk file using Evil-Droid and have successfully created a session over LAN with my android device. Every command is working perfectly. But I want to download pictures from DCIM folder to my root directory.
Forum Thread: How to Configure Fluxion,Airgeddon,Lazy Script Etc to Use wlan0 as Monitor Mode
Hello guys, My adapter name in linux ipconfig command shows wlan0.
HOW to: TAKE DOWN the SITES with HULK DOS
we have all heard about the hulk tool for dosing sites but time has passed and it went hold, now it barely can hold any sites off with CDNs and Loadbalancing servers like nginx and cloudflare protecting them. well not any more, witness the power of the new and improved hulk tool version 1.0.2, available in both golang and python.
Forum Thread: Monitor Mode Kills WiFi Kali Linux
I have a TP-Link WN721N and whenever I put it inti monitor mode I get disconnected from the network that i am on and cannot connect to any networks, if i use airmon-ng to get into monitor mode network manager wont even detect my wifi card. please reply quickly as I am leaving to DEFCON soon.
Forum Thread: Does Anybody Know Any Tools or How to Crack Ipad/Iphone Passcode with Kali Linux?
I've been surfing the web for a info on " how to crack Iphone/Ipad passwords with kali linux Hard wired" most of the searches just give typical stuff but i want to know how to crack the passcode hardwired (via USB cable) Is there a tool in Kali Linux to do this or in the repositories of Kali linux {By the way this is legal as it's my cousin's iPad and he needs his Passcode recovered and he requested me to do this}
Forum Thread: Unable to Install Snoopy-Ng on Kali Linux 2.0
i get the error message error: command 'x86_64-linux-gnu-gcc' failed with exit status 1
Forum Thread: Test
Test
Forum Thread: Increasing the Speed of Cracking Zip Passwords with the Power of CPU.
Hello my Cracker buddies, this is my first post on Null-Byte. What We Will Learn
Forum Thread: How to Do a MitM Attack with Websploit
This is my first tutorial, so don't hesitate to give me some constructive feedback! I assume most of you know what a Man in the Middle (MitM) attack is, but here is a diagram of a Man in the Middle attack. I will be using the Parrot Security OS, but you can use most Linux distributions. For this MitM attack we are going to need Websploit, so let's get it now. Anything in bold needs to be run in a console.
Forum Thread: I Am King Hac2ker. I Am Sending Some Course of Hacking.
Hello everyone , I will not talk more i will just send link of different courses.
Forum Thread: Building Our Own Hacking Tool in Python, Part 1 (Getting a Shell)
This part will be dedicated to major step in the hacking process : getting access to a shell on the target, which will allow you to execute commands and basically get control of the computer. What we are going to set up can be summed up with this simple drawing : The Python program we are going to code is itself pretty short but I assume there are beginners among us, that's why I will take some time to recap the basic information we have to know on networks in order to make a backdoor. This p...
Forum Thread: Python 2 or 3 for Hacking?
So I've been looking @The Defalts python tutorial and it was all going so well until lesson 4: Basic user Input. I figured I must be doing something wrong and then I realised Defalt was using 2.7 and I'm on 3.5. so the print functions have changed. I'm confused on if 2 or 3 is more useful in the context of hacking. I'm new to programming (I wanted to learn programming before pentesting so I'm not a Skid)
UML: UML Class Designing - Ultimate Guide
Salam Everyone! I've seen many students, troubling in the concepts of Class Designing and Diagrams. So, I've decided to make a much simplified Tutorial on Class Diagrams and Modelling using Unified Modelling Language (UML). It's mainly based on a Document, made by a Student of our University, and other guides (details are in the Credits below). I've just combined everything in one place. I hope U will find it useful!
Forum Thread: How Can I Enable Monitor Mode on TL-WN722N V2 Using Kali Nethunter(Phone) And How Can I Install It's Drivers on My Phone
Hi I wanted to know how I can Enable Monitor Mode on TL-WN722N V2 Using Kali Nethunter (Phone) And How Can I Install It's Drivers on My Phone
Forum Thread: How Can I Download a Embedded Ebook ?
Hey guys , I've subscribed to a digital magazine but they dont offer downloads , when i open a magazine it opens a new tab with a " book " where i can read i.
How to: Transparently Routing Traffic Through Tor
Here is an alternative to using Tor Browser and Proxychains What does it do:
Forum Thread: I Lost My Facebook
Hello everyone out there. I want to seek help from you guys. Every ethical hackers and admins over here please help me sort it out. Someone cracked my facebook and changed all the recoveries today. How can I get access to my account or if anyone can help me. Please give me some ideas or help me
Forum Thread: How Can You Increase Your ALFA AWUS036NHA Txpower in 2020?
Hi I'm kind of new at using Kali linux for pen test but I've been coming around some annoying issue as I cannot find any way to increase my txpower to 30
How to Extract Passwords : Password Extraction With PassGetter
We have all heard about password cracking and the tools used to do it, but today we are going to talk about
Kali Linux Persistence Error: No Solution on Internet
Hi Null Byte, After going through numerous articles, forums and videos all over internet, i can not find any help on the subject .
Forum Thread: Proxychains Not Working or Loading??
i really dont know what im doing wrong but when i type proxychains firefox (website) nothing happens
Forum Thread: Hacking WPA2 Wi-Fi Networks with Aircrack-Ng Suite [Updated 2020]
Hi all! The topic for today is: Hacking WPA2 Wi-Fi Networks With Aircrack-Ng Suite
Forum Thread: Permissions Not Showing Up After Injecting the Original Apk
Hi, I have used two ways to inject a payload within an original apk, and both ways give the same result (injection by msfvenom & also manually by decompiling, editing files & compiling)
Forum Thread: How Can I Make My Kali Linux Apache2 Server Accessible to People Not Connected to My Network?
I use Kali Linux 2020 with Xfce4 and VirtualBox. I created a payload to send to my victim and was looking up delivery methods and thought that HTTP would probably be the best.
Forum Thread: Bypass Captcha While Bruteforcing
There persists a problem while bruteforcing most of the website. The annoying captchas! Is there any way I can bypass those captcha or not have to deal with them in any way except for using captcha solvers. They are slow as hell and expensive too.
Forum Thread: Run Hydra Through Series of Proxies?
I've been trying to crack my email password, but after 150 or so attempts, hydra stops giving the correct password even when I know it is in my password list. I assume this is because the smtp server is blocking my ip after so many attempts. I thought I could get around this using proxy chains, but if I do I don't get the right password at all, even after no wrong attempts. Is there a way of cycling through proxies, changing every 150 attempts, in order to get around this issue?
Forum Thread: I Had a Doubt?
i'm new to this it's may silly if i install kali linux it will erase my hard disk and my windows ?
Forum Thread: DDE Using QUOTE
Hello everyone, only a few months I have approached the study of computer security and I'm attending a course of Penetration testing.
Forum Thread: Metasploit Payload Problem(Unable to Connect to Target When Target Is Not in Local(Wifi) Connection)
My aim was to hack a android mobile by sending a payload to the target's android device using msfvenom. I entered the following commands in terminal
Forum Thread: How to Decrypt the Handshake Cap File ?
Hello everyone, this is my first post, i'm already watching aircrack-ng doing its magic with the rockyou.txt file, but its taking too long, and most of the words that pass-by in the process aren't actually making any sense, i live in morocco and most of the pass-phrases that we use are likely to be something like 'A3E5BD93A" using only 9 characters with no strange symbols or actual meaningful words, I've tried to make my own word-lists with crunch, but i will save that as a last resort, maybe...
Forum Thread: How Do I Reinstall Kali Linux to "Undo" Some n00b Mistakes?.
I've been trying to get the hang of Kali Linux as a command line virgin, and as expected I made a mistake by editing some file I wasn't supposed to. Everytime I would update/install I would get
Forum Thread: How to Remote Access a Android with PAYLOAD
First we needed to create a payload we can do this by executing the following command in Kali linux Terminal
Forum Thread: Is There a Way to Use Kali Without a Wireless Card?
If there is,Please tell me how