General Discussion
Forum Thread: Can Anyone Tell Me Some Exploits for Javascript Library Jquery Version 1.7.2.
I am web app. pen tester and today i found something strange that a web app. is running on 1.7.2 and this is an outdated version so i am also pretty sure that there will be some exploit also so please tell me some
Forum Thread: Msfpayload Not Starting
i tried create a payload using metasploit but i am keep getting this error Please help me
Forum Thread: How to Install SD Card in Kali Linux (Smartphone Pentest Framework)
I upload apk in my android emulator and it says that I need a SD card install to my device. I am no clue where to even begin. Can anyone please help?
Forum Thread: BackDoor Rendez-Vous Point
Hello folks, I've created a backdoor which uses reverse tcp, drop me your ideas about the rendez vous point
Forum Thread: Beef Metasploit Integration.
I am following the guides to integrate metasploit with beef configuring the config fyles: 1.The configure.yaml in /usr/share/beef-xss/ I set metasploit :true
How to [FUD 1/35] Gdog: Use Gmail as Command and Control Server
Gdog A stealthy Python based Windows backdoor that uses Gmail as a command and control server
Forum Thread: Smart Password Generator
I was wondering if smart password generator like eliot use in MR ROBOT is really exist and viable ?
Forum Thread: No Internet on MBP Kali Linux
Hello I am using the latest Kali from a 16gb sd card on my macbook pro. I am using the normal wifi inside the computer but i have made the mistake of following a forum topic and using clear kill on monitor mode for wlans. I am a newbie and kinda clueless would appreacite the help. Thank you
Forum Thread: Install Qemu
I just didi install qemu from apt-get install but can't find anywhere the application to start it .Used the search button.How to start it?
Forum Thread: Virtual Box - Change IP Address
Hey there, I hope im right here. So, I have set up a windows XP guest on my main PC (win10) so I can test and practice exploit from my laptop(Kali).
Metasploit Android: Difference Between Meterpreter and Shell
Hello, I am wondering what's the difference between the two metasploit payloads meterpreter and shell to attack android devices? In every tut I've read they are using meterpreter. Why aren't they using shell? Or what is the functionality of the shell payload? Is there any kind of documentation to read about that?
Forum Thread: Kernel headers
Hello I am using kali linux 2 64 on dual boot.Now I want to install VMware player.I installed it but it needs to spesific the kernel headers.I did this:
Forum Thread: Hacking Wifi Using Router
hello i am new to the kali . i was thinking of hacking wifi using my tp-link new router (using as spoofing the wifi) and i have an internal wifi card on my laptop (de auth user) and using dns spoofing i can get the password . plz kindly help me with command . i have tired dsn spoofing but it dint work on android ( my own device ) as my victim are on android . looking forward for help .
Forum Thread: Kali 2.0 Airodump-Ng wlan0mon Doesn't Work
Hi i have problem in Kali 2.0 with airodump-ng im using an external usb wifi adapter: root@kali:~# airmon-ng
Forum Thread: Mitmf Beedf Question
Can u tell me why when I follow the command all i s fine and the mitmf react when I open webpaged from the hacked OS but the beef dont respond in to online browsers.I am using this guide http://null-byte.wonderhowto.com/how-to/hook-web-browsers-with-mitmf-and-beef-0162595/
Forum Thread: Dirbuster Isn't Finding Any Files on the Target Server
I let dirbuster loose on a server, as detailed in this very helpful guide, but it didn't turn up any results, despite using the largest wordlist available. Why would this happen?
Forum Thread: Open Routers with Authentications?
Hi everyone! This is my ever first post in there, so if there is any problem i'm so sorry, i'm a newbie on wonderhowto!
Forum Thread: Quick question
Hey The question is what if I get into any windows system
Forum Thread: Python Question
Hello guys, i just started to learn python(i made the codecademy course and now i am doing a free beginners python course from udemy) and i was wondering how can i made exploits using python.
Forum Thread: Attack in Wan with NO-IP or Public IP
Hey guys, I'm new in this site but I've already read some post about Kali Linux and Pentesting. I have a problem : today I wanted to start an attack in wan with NO-IP. I bought an annual subscription of Private Internet Access (dynamic IP) and for create a persistent backdoor in wan I need a static IP... for this reason I use No-IP. I followed this steps :
Forum Thread: How to Create a Anonymous Payload
lets say i am creating a revese_tcp payload in msfvenum how can i create the payload without puting in the LHOST my own ip and still be able to connnect to the payload?
Forum Thread: Use Two Vpn at a Same Time..
is it possible to use two different vpn service at a same time like one vpn is their in your physical or host operating system and other is their in your virtual machine ...
Forum Thread: How to Block Facebook on Your Browser
hello friends, I am new to null byte and this is my first post so please give me tips in the comment section.
Forum Thread: Disk D Not Showing Up at All
Well,This is pissing me off! Disk D did a magic trick...3,2,1, poof
Forum Thread: ipv4 and ipv6 Vulnerabilities
hi guys, so lately i found out that there are some security holes in ipv6.. should someone use ipv4 and ipv6 in the same time or just one of them? Does it differ if it's on the local internet or through wi-fi.Like should through wi-fi be used both ipv4 and ipv6?Or everytime one of them should be used..i'm confused.
Forum Thread: Connect to Remote Desktop Through Proxychains
Hello I installed remmina like remote desktop client. When I proxify remmina running "proxychains remmina", does the remote server "log" proxy that I have setup?
Forum Thread: Encrypted Javascript?
I'm looking at a javascript file of a google chrome extension to see how it works to get an idea for how to make my own project that I'm working on, but the javascript isn't like anything I've seen before. I think its encrypted. It starts off with var #x#### = and then has a bunch of numbers with x#/x#/x# where the #s are different numbers. Then later in the code it starts looking like stuff I've seen before with iff statements and functions, but the arguments are similar like before with #x#...
Forum Thread: What You Think About Hacking Android Phone with a Software Support ...?
if suppose victim has an unrooted android phone .how to hack victim phone can you help me please
Forum Thread: Resize a Pe File
hello how can i resize a pe file executable after infection, i created the infector, now i want to make the opposite, by deleting the sections i have created,
Forum Thread: How to TROLL Victim Using Bettercap
bettercap is a complete, modular, portable and easily extensible MITM tool and framework with every kind of diagnostic and offensive feature you could need in order to perform a man in the middle attack. Installation
Forum Thread: Metasploit Payload
hi i was wondering what the difference between the two payloads
Forum Thread: Find OEP After Infection
Hey people of this world, I've created a virus, now i'm trying to create the anti virus,
Forum Thread: How to Send Apk to Other Android Over Wan?
So I am using Kali Linux(virtual box) and use msf venom and armitage. I am struck on the same thing. For example I want to hack someone's android my kid in school. I did followed all instructions here and videos but the part I am having trouble is msf exploit(handler). What do I do next? I don't even don't know how to send apk file to my android device. Very lost and need answers. Thank you.
Forum Thread: C or C++ or C#
Hello Null-Byte community. I know a few programming languages but I wanted to add a new one to my toolbox. What is the difference between C, C++, and C#, and more importantly, which one do you think I should learn? Thanks in advance!
Forum Thread: How to Hack Android as a Pro
Hello guys im new here , first i loved this site alot it is solved alot of my problems okay as we know if we creat an android payload and send it , it will have a MainActivity name , with blank screen , so the victim will remove it as soon as u know , so it is noob payload ! :(
Forum Thread: Help !
After I installed nvidia drivers on Kali "rolling-editiin" , by the guide of Kali Linux's documentation website , just after doing the first and the second steps :http://docs.kali.org/general-use/install-nvidia-drivers-on-kali-linux, and this is what I get .
Forum Thread: Why Every Hacker Should Know & Use Linux
In many of my tutorials, I have emphasized that a real hacker must know and use Linux, but I thought it might be time to emphasize and enumerate the reasons why I think so. So, for those of you are stuck in kiddie-ware (Windows), here is why you should make the transition to Linux. Linux Is Open Source
Forum Thread: Templates for Phishing Site?
Hello all! I am trying to learn about phishing with SET (if there is something better, I would love to know), and I was wondering if there is a way to find or make templates for a copy of a site (credential harvesting), with minimal HTML. I know a little, but not nearly enough to make one of these.
Forum Thread: Help with Phishing - in Depth
Hi guys, newbie here. There are some great posts on here about phishing and I love them.
Forum Thread: Injecting Phishing into the Victims Browser
Its very hard for us to break the security of a system as strong as facebook/gmail and so on , but instead , we can break the bond between the user and site itself , and my idea is ( i dont know if its new or something ) but if we make a phishing site ( eg : facebook ) and we give the network an order that when the victim trys to go to " www.facebook.com " it redirects it to " XXXXXXXX " which is our facebook phishing page , and when the victim inputs , we get the output and victim get redire...