General Discussion
Forum Thread: How to Schedule a Comand in Linux?
For some time i had been using reaver to crack some WEP'S.Some routers are pre configured to recognise a bruteforce attack and blocks the mac address from doing further bruteforce say for some like 10 attempts.The router also recognises the MAC address and just blocking it from sending further requests.So,what i feel can be done is by changing the mac address after a specific time using the following command by just simply typing,
Forum Thread: Ip Hack
hi is there any way to hack remote windows pc if i know the ip and open ports in the system
Forum Thread: Problems with Aircrack-Ng
root@kali:~# airmon-ng start wlan0 No interfering processes found
Forum Thread: Wi-Fi or Bluetooth Mobile Exploit
Most if not all phones are bluetooth enabled, we are advised to disable it when not in use. This is where my question comes in, is there a way to hack and control phones via bluetooth that have bluetooth "off"? and can one force pair? Whats the maximum distance to be kept between devices? Is it also possible to exploit using a phone?
Forum Thread: Kali Xrdp
I'm trying to setup xrdp in Kali to RDP from Win 7. I've tried the following on a Live Persistence USB and a full local install but the result is the same each time :(
Forum Thread: How to Use Stagefright Exploit ?
Hello There, Previously i have found an exploit stagefright by JDUCK
Forum Thread: New install - Webpages won't load on Kali Linux OS
I've just installed Kali Linux on my laptop, which is also running Windows 10. On the Linux OS, I've connected to the Wi-Fi, but the internet application won't load any webpages. I'm completely new to this OS.
Forum Thread: Python Correct?
I'm trying to create a program that lets me search certain strings, is this the write setup? Import urllib.request
Forum Thread: Hello, I Am New Here
Hello I have decided to create an account here as I believe asking questions, instead of just lurking, will speed up my learning. I am not a newbie when it comes to computers, but security/hacking is something completely new to me and I am really excited to learn more about it :)
Forum Thread: Just Introducing Myself
I just wanted to say hello. I'm not very new, I've been reading the how-to's and lurking everywhere for a couple of months now. This is a great place to learn new skills, and I feel like I need to express my gratitude.
Forum Thread: Fps Lag When Running Battery Mode
Hey guys, I have this problem with my pc, that whenever i play a game on my pc i get fps lag when its on running on battery and not charging.
Forum Thread: How Can I Change Content in a Website
I really want to hack into the website and start messing with it I have kali linux can you guys help me? Roblox.com
Forum Thread: Beginner Looking to Start
Hello everyone, I am extremely new to the world of Hacking and I was wondering if anyone has any pointers for someone who is just starting out. I have some extremely basic knoweledge of coding, even saying that is a stretch though. This is something I've always wanted to get into, so even the smallest jumping off point would be appreciated.
Forum Thread: Can VPNs "Leak"?
Curious me is wondering... lets say I find a VPN, is it possible to make it leak the real user's IP?
Forum Thread: Question About Website Automation
I've recently been using a tool called Selenium. The tutorials and forum posts have been mostly from 2011-2013. My question is: Is this still the "go-to" tool for website automation? I wanted to do a tutorial and I would hate to be covering an obsolete tool.
Forum Thread: Some questions about commands:)
In command:nice -n -20 airbase-ng -a 00:09:5B:6F:64:1E --essid "Elroy" -c 11 mon0,what's "-a 00:09:5B:6F:64:1E --essid "Elroy" -c 11 mon0" means? And i wonder how the nice value hint to the kernel and why we don't use nice value when we use renice command...
Forum Thread: Anonimity in Kali
As we know recently Anynomous have declared cyberwar against ISIS. They have published tutorial for newbies for hacking, there they have said that Kali is not best for anonimity
Forum Thread: Good Server-Side Language
I need a good and secure server-sideded programming language to code a server. Server will be used for http and basic socket connections.
Forum Thread: The Best Way to Use Phlishing to Get Facebook Credentials.
I'll say something that might be the best way to snatch the credentials of your victim but i do not know how to execute it. Pros of NullByte, please shed some insight. Here is the method
Forum Thread: Why on Some Networks a Simple db_nmap or a Normal Nmap Not Add Any Hosts in Msf or Armitage?
I was kind of wondering why no hosts would show up since metasploit v4.11.5 came out. This is troubling to me since before I updated, i could get every host that was mapped. After, on the same network, there are only two left. (Linux 2.6.x, embedded) After i do {nmap -sn 192.168.0.1/24} everything is listed with 6 hosts, but msf only adds two of them. How can i fix, workaround, or understand this?
Forum Thread: How do I get a WiFi password and HOW does it work?
Hey, I'm new here and want to learn something about "hacking" and its backgrounds.
Forum Thread: About Phone(Very Urgent Help Plz)
Hey everybody My friend gave me his anroid 4.4.2 and he forgot his pattern and I took his phone to data reset it so I can remove lock screen I tried everything but when I press volume + and power button it says like this:
Forum Thread: Skiddies.
Hey im AugustFackYou. We all know about skiddies. You know those ten year olds who try to take down websites with LOIC. Basicly just people who dont know anything or little about hacking and instead use tools. In my opinion its fine to use tools as long as you know how they work and what they do. Another thing is that if you dont rely on tools alone its also fine. Just tell me what you guys think! -AugustFackYou
Forum Thread: Metasploit 4.11.5 Is Here
Hello, hello friends. I just wanted to put it out there that metasploit has released a new version, 4.11.5. To see what version you are running, type:
Forum Thread: Database Crawling
Hi, everyone So, a lot of people these days are getting into trouble for crawling the databases they are not supposed to even though they are public information, how about that? You can look at it online but not store it on your computer. It's like i'll tell you my password but you should not remember it.
Forum Thread: Why the Command lines Below Doesn't Work?
How to solve the problem?
Forum Thread: 00% IRC?
This has been asked many times, but I think it's finally time to take action. I'm looking to setup a proper IRC or chatroom for this great community, but would like input from you to know what website/service would be the best. Perhaps Chatzy is a suitable website, or Freenode (though it's difficult to set up)? However, it'd be great if OTW could make it on his account, thus the privileges for both places (here and the IRC) stay the same.
Forum Thread: IRC Chatroom Updates?
HI everyone, I am a huge fan of this site and the information on it. I was just curious i have seen in one of the articles that there were plans for a nullbyte chatroom on irc. Is that still in the works? If so i was hoping for some details.
Forum Thread: Are VPNs Useless?
Are VPNs useless? A friend told me that one could ping to the VPN's IP and reveal the IP underneath it. What does he mean by this? Is this preventable?
Forum Thread: Which language to learn?
hi, guys I am not new here but i just signed up. I love this place!
Forum Thread: Any Alternatives for Exploits on Windows.
So, I'm kinda in a dilemma. I'm stuck with using Windows until I can get a bootable DvD for Linux. The problem is I've read that Metasploit doesn't work that well on Windows, so I am asking if there's any alternatives other then Metasploit? And please, no comments telling me to get Linux, that's not helpful to my cause. Please and Thanks. ;D
Forum Thread: Help with Linux (Installing php5-Cgi)
Hi, so I am trying to install php5-cgi and I got this error from make
Forum Thread: Bypassing IDS-Firewall Using Meterpreter Over SSH on Kali Linux
MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection. The way it works is by injecting shellcode into memory, then wrapping a port spawned (meterpeter in this case) by the shellcode over SSH back to the attackers machine. Then connecting with meterpreter's listener to localhost will communicate through the SSH proxy, to the victim through the SSH tunnel. All communications are re...
Forum Thread: Discussion:Specific Ways to Avoid Being a Script Kiddie for Beginners.
Hi,everyone!I am a beginner and i really want to learn and master something. When it comes the understanding of system and hacking tools,do u think reading a book such as MODERN OPERATING SYSTEMS by Andrew S. Tanenbaum is a good choice? When i learned how to use some tools,it's hard for me to find the answers such as how and why it works in details...
Forum Thread: I Am P4nT4N30
Hello null-byte community, I want to start out by saying THANK YOU!!!!! to the creators and to everyone that has provided valued knowledge on this site.
Forum Thread: Measure Website Size
Hello Everyone, i want to DDOS Attack on Website, it have not any SSL or WAF or similar protections, but only one thing i want to know is how to measure website size and how can i know how many packets is enough to Shut down website ? i know how to DDOS attack may i will use T50 or UFO BOTS.. have anyone idea how to measure ? i know i need some wbsite analysis tool but which one?
Forum Thread: Layer 2 Attack on Network
Hello Everyone ! I'm new to the null-byte forum. I read a lot on null-byte but didn't find some Layer 2 attack. I work for with a company who tell me to find some vulnerability on their Network. The only Attack that I've read are "Vlan Hopping", "Arp spoofing/Poissoning", "The Famous MITM" and "Mac flooding"
Forum Thread: How to Reveal MasterCard CVV2
I figured out how the Luhn Algorithm works for verifying the card check number and that the card is valid but I still haven't came across how your supposed to come up with the actual 3 or 4 digit code on the back of the card. I've been trying and just don't understand how any of the different methods and calculators haven't shown a way to do this. Any pointers would be helpful with showing me what part of the process I'm missing.