General Discussion
Forum Thread: Brute Forcing ADB Router WEB Login (Complex)
Hello! So, i'm trying to hack my router (ADB) login page.
Forum Thread: How to Save the Point Where the Victim Has Opened the File
Hi! My question is how i can save the state where the victim has opened the actual exe file generated using msfvenom.. I mean i know how to store a session but the thing is that there should be a way to to store this session as a local file or something like that so you can shut down your "hacker" pc and still be able to access the victim's pc now where you already have recieved the needed informations once. How could i do this or at least something similar?
Forum Thread: Port Forwarding Mayhem
Hi Everyone,
Forum Thread: Port Forward with OpenVPN/VPNBook
I have heard that you can port forward through 143VPN, but it is for Windows. I am trying to port forward BeEF on networks I do not have router access to. I do not want to run WINE on Kali, and I have already setup VPNBook VPNs on Kali Linux. Is there a way I can port forward through VPNBook?
Forum Thread: How to Hijack Whatsapp Web Session?!
i was wondering about that issue , can we or not ? we used to be able to hijack facebook session's using a couple of tools and on the same lan ? why aren't we able anymore + would it work on whatsapp ? have anyone tried it ? , i know its based on cookies , but in case they stopped using cookies what are they using in the mean time , thanks :-)
Forum Thread: How Do I Actually Use Metasploit Outside LAN
i have been trying for a while to try to get metasploit working outside LAN ive made payloads and port forwarded it to my router and no success ive called my ISP to check if they block ports and they dont so what shud i do ????
Forum Thread: Uses for Server?
I have a few spare computers and an old server, which I got for free. I don't use that, but I have a desktop with Ubuntu server, and Apache, SSH, and FTP configured. Right now it isn't doing anything, but are there any cybersecurity-related uses? I don't mean defensive, like an IDS, but anything that can make it pull its weight?
Forum Thread: Help with Hash Decryption
Hello, today was my first job as a pen tester for my high school in which i graduated almost 2 years ago. Im atm at colledge studying Computer Science and im in an institute preparing to get the Certified Ethical Hacker and CISSP certificates.
Forum Thread: Reverse_tcp Over WAN, and Through a Proxy?
Hello, masters of the hacking community! Over the past few months I have been getting more and more involved in the world of hacking, and this site has been my main place for resources. Thank you! This is my first post on the site, and I hope it is received well amongst the community, and helps others that may have the same question as I do.
Forum Thread: Easy Data Exfiltration with Poison Tap
This looks like it could be really handy if you're doing pentesting on premises. https://samy.pl/poisontap/ it grabs all sorts of useful data. Worth reading through.
Forum Thread: Using Metasploit Over WAN Using VPN
I just got into pentesting. I was using metasploit reversetcp payloads. But to use reversetcp one must have static ip. I overcame this problem by using my private vpn which I made using openvpn script on ubuntu server from digitalocean. The problem I am facing is port forwarding I can't forward port so I can't get session. Please help.
Forum Thread: What Happened to the Kali Repositories?
Recently, when I have been getting updates on my Kali machine, they have been coming from the Duke University mirror, instead of the Archive mirror like I have always used. I haven't edited my sources.list file, and this change has also happened on another machine with a Kali repository. I am in the Southeastern part of America, if that matters. Has anyone else experienced this?
Forum Thread: After Learning C,C++ and Python.. What Else Should I Learn to Develop My Hacking Skills?
Hello Null Byte.. I'm just curious, i have no specific requirements or fields that i want to be specialized in, like Web exploitation or OS hacking. i don't prefer one thing over the other.
Forum Thread: What Is the Future of Hacking in the Quantum Age?!
Dearest NullByte experts, I'm not into hacking, but I was stumbling upon some videos about the upcoming quantum computing & quantum CPU's & the way they work..
Forum Thread: Hacking Mac
is there any available exploit in metasploit for hacking into a mac?
Kali Linux Rolling/2.0 Fluxion: Crack WPA/WPA2 Wifi Password Without Dictionary/Brute Fore Attack
Fluxion is a remake of linset by vk439 with fixed bugs and added features. It's compatible with the latest release of Kali (Rolling)
Forum Thread: What Is the Best Way to Shellshock a Macintosh on Your Network?
I have a Mac on my network and I would like to shellshock it to remotely gain access to it. Once I know this method is possible, I know a network with a lot of Macs on it and I would like to pentest those. What is the best way to shellshock a Macintosh on your network?
Forum Thread: How to Publish a Tutorial ?
Hi guys ! I want to make a tutorial but I don't know how to do. Is there a way to save tutorials and continue after ?
Forum Thread: How to Do a Procdump of Lsass Without Admin Rights
Hello, I've looked around to find a way to do a procdump of lsass without having admin rights, but so far nothing's come up... Does anyone knows hot to do it?
Forum Thread: ThinkPad Helix 2 with Kali?
Well, I was searching for the perfect laptop for pen testing and I found this ThinkPad Helix 2 and all specs were super good, 8 GB ram, Intel Core M-5Y71 processor, 256GB SSD, and also it was 2 in 1, it can convert into a tablet and also into a laptop, but when I investigate its compatibility with Linux most were not so good results, so I get with this, this are drivers for Linux to work well on the helix, but one of my questions is that arch drivers would be compatible to kali Linux?, does a...
Forum Thread: Problems with Kali Persistence
Hello forum! I need some help with kali persistence. I already succesfully setup a live boot usb with encrypted persistence with Kali Linux 1.1.0, but now that I passed to 2.0.0 I'm having a problem. The partition is encrypted and asks me for the password but nothing I do is saved, neither the options nor files. I simply followed these steps:
Forum Thread: How-to DoS with MACOF - Flood Network with Traffic [Only for Educational Purpose]
Warning : We are using macof command in kali linux.
Forum Thread: Virtualbox Error Rc=1908 in Kali Linux
Hi null-byte forum . I try to install virtualbox in kali linux 2016.2 live boot with persistence and the installation fine but when i try to run a VM machine i receive an error say: i try many solution but nothing work , i try to update , i try to reinstall , i try reconfigured , dkms , ...
Forum Thread: Kali 4.3.0 amd64 - Missing Headers?
I had to do a clean install of the Kali (Kali 2016.1) on my HDD, since I messed up quite a few things before.
Metasploit Error: Could Not Bind to Myip:4444
Hi, I'm trying to use metasploit on nethunter, however when I try to run the reverse https payload, i get the error could not bind to myip:4444 (the port I set). Is this because I need to enable port forwarding on this port? Because I did not think I would need to port forward when using it over LAN?
Forum Thread: Laptop Requirments and Linux Distro (Ubuntu/Kali Linux)
Hello guys so i have been lurking around here and i see a lot of interesting topics (as a newbie).So i want to ask you guys 2 questions.But first i have been stuyding python,html,css (To get that out of the way) 1)I am going to order a laptop and these are the specs Intel Core i3 5005U 2GHZ, 4GB ram, an intel hd graphic card,500 GB HDD and no os.I think that these specs are respectable as it costs 300 euro also i think i can install ubuntu on it as the laptop has no os but i see the same lapt...
Forum Thread: Can Metasploit Encode .Py Scripts?
I have a collection of diffrent silent doc exploits they all have shell code which I think need to be refuded. Can metasploit encode the script for me to bypass a few AV"s?
Forum Thread: C.H.I.P for Hackers
Hello all, I am new here on null byte and have been her for a while. There was just one problem. I never posted anything! So with the release of the $9.00 C.H.I.P computer I though that I might start a series how how to use C.H.I.P for hacking!
Forum Thread: [HELP] Spreading Payload/Virus Through Wifi or by Just Inserting a USB Stick
Hello guys I wanted to know if I can spread my payload/virus through wifi and running it on an another computer.
Forum Thread: How Do I Load My Own Custom Exe as a Payload?
I have my exploit already but I don't want to use any meterpreter payload. I want to use putty.exe as for example. How would I do that?
Forum Thread: Metasploit and IP's/Port Forwarding
How I can forward my port that I can use Metasploit session at my friend's phone (android) not in my house. How I can do when I type my IP and port in the URL it automatically starts a download? I'm working on Kali Linux so I think that I can't download any .exe apps.
Forum Thread: Stagefright Exploit Released
The feared Stagefright exploit was released today! Find it here: https://github.com/jduck/cve-2015-1538-1
Forum Thread: How Would I Be Able to Use This Exploit in Metasploit?
https://www.exploit-db.com/exploits/24526/ I know metasploit only accept .rb , but is there a way I can use this some way to do it?
Forum Thread: Can Anyone Give Me a Look on How You Would Hack Your Target?
As the title says... Without metasploit but with programming skills? im prof at programming in Python, C++, java and couple others..
Forum Thread: How Do I Redirect Traffic to Phishing Site on Evil Twin
I have been practising how to do the evil twin attack and everything has been going the way its supposed to except the fact that when a user connects to my evil twin they are not redirected to the phishing site that I have created.