Hot Null Byte How-Tos
![iOS 18 Tips, Tricks, How-Tos, News](https://img.wonderhowto.com/img/15/56/63854300537190/0/ios-18-secrets-revealed.600x696.jpg)
![](https://img.wonderhowto.com/img/30/61/63590887297861/0/networking-foundations-dynamic-host-configuration-protocol.1280x600.jpg)
Networking Foundations: Dynamic Host Configuration Protocol
Hello ladies and gentlemen, PySec here coming at you with another informative(hopefully) article for you all. In the last tutorial, we finally finished our discussion about IP Addressing and I intentionally didn't mention a really important concept with which IP Addressing wouldn't be feasible without it. What I'm talking about is how our network device gets the IP Address in order to communicate with other devices on the network/Internet. There are many different ways for that to be accompli...
![](https://img.wonderhowto.com/img/19/50/63590802339928/0/dissecting-nmap-part-1.1280x600.jpg)
Dissecting Nmap: Part 1
Welcome aboard my inquisitive comrades. I am starting a new series that nobody expected coming. It may not seem very exciting at first, but await the last few parts as many startling discoveries will be made. This is a series which I plan to continue after the completion of Nmap, unless you have major objections.
![](https://img.wonderhowto.com/img/71/87/63590858918845/0/raspberry-pi-wifi-analyzer.1280x600.jpg)
Raspberry Pi: WiFi Analyzer
It has been a while since my last Raspberry Pi tutorial , but now I am back with another tutorial. This one I should note isn't your typical tutorial, but as always lets boot up our Pi and wreck havoc.
![](https://img.wonderhowto.com/img/61/16/63590792894017/0/bypass-uac-using-dll-hijacking.1280x600.jpg)
How To: Bypass UAC Using DLL Hijacking
This tutorial was written with Windows 7 in mind, but the principle applies to all versions starting from 7.
![](https://img.wonderhowto.com/img/13/42/63590458001760/0/java-e4-methods.1280x600.jpg)
How to Java: E4 (Methods)
Welcome back to another episode of Java Tutorials, In today's tutorial, we'll be learning about what methods are, proper syntax when writing Methods, and why they are beneficial in a program's code.
![](https://img.wonderhowto.com/img/40/57/63590439822080/0/advice-from-typo-mastering-cmd-like-real-hacker-part-1-colors.1280x600.jpg)
Advice from Typo: Mastering CMD Like a Real Hacker, Part 1 (Colors)
Another series I am now starting, might have to slow down on all of these series, but why tf not. What Is CMD?
![](https://img.wonderhowto.com/img/48/55/63590329123689/0/hackers-advice-tip-choosing-your-path-knowing-where-learn-learn-newbies-please-read.1280x600.jpg)
A Hackers Advice & Tip: Choosing Your Path. Knowing Where to Learn & How to Learn It **Newbies Please Read**
This article is to all the newbies on here wanting to become a hacker. Since I have seen many newbie questions on here, I need to address this.
![](https://img.wonderhowto.com/img/06/32/63590173813360/0/create-mysql-server-bruteforce-tool-with-python.1280x600.jpg)
How To: Create a MySQL Server BruteForce Tool with Python
Hello aspiring hackers, It's been a while since I wrote a tutorial, so I figured I might just share one of the tools that I have created to help the community grow.
![](https://img.wonderhowto.com/img/16/22/63635085766146/0/rootkits-101-basics.1280x600.jpg)
How To: RootKits 101 (I). The Basics
removed!
![](https://img.wonderhowto.com/img/16/21/63590091627010/0/zanti-introduction.1280x600.jpg)
Zanti: Introduction
I've been doing tutorials on Rasberry Pi and I would like to thank everyone that have both read the tutorials and gave me feedback on how well I'm doing. But now I've decided to take a small break and start a mini series that I'm hoping to be at least five tutorials. This doesn't mean I'm gonna stop posting Raspberry Pi tutorials, but since I'm learning so much at the same time I've decided to share some of that knowledge. Hence this tutorial. Please sit back, relax and read on.
![](https://img.wonderhowto.com/img/87/69/63590055832103/0/security-oriented-c-tutorial-0xfa-enhancing-our-crypter.1280x600.jpg)
How To: Security-Oriented C Tutorial 0xFA - Enhancing Our Crypter
Hello again, readers! In our previous crypter tutorial, we looked at how we could obfuscate our malware (or any program) by using a simple one-byte XOR key. In this quick tutorial, we will be looking at how a simple little tweak can create a better means of obfuscation. Let's get right into it!
How To: Bypassing School Security (White-Hat)
While following a tutorial on python recon tools, I found a new way to access the command prompt on a school network. While there are other ways of bypassing security, it's nice to learn use Python's OS library.
![](https://img.wonderhowto.com/img/89/37/63589925539429/0/train-your-python-part-17-introduction-classes.1280x600.jpg)
How to Train Your Python: Part 17, Introduction to Classes
Welcome back everyone! In the last training session we covered basic file input and output. We're going to leave this topic for a bit and start on something that will change the way we write scripts, classes.
![](https://img.wonderhowto.com/img/30/62/63589828857338/0/program-c-variables-and-data-types-part-2.1280x600.jpg)
How to Program in C# : Variables and Data Types (Part 2)
Welcome back my friends !! Today we'll go through the second part of this C# series
![](https://img.wonderhowto.com/img/80/37/63589787007357/0/java-e3-if-else-statements.1280x600.jpg)
How to Java: E3 (If/Else Statements)
Hello Java-ers, In the previous two tutorials, we learned about installing the JDK, Installing/CreatingAProject in Eclipse IDE, and data types in Java.
![](https://img.wonderhowto.com/img/95/02/63589740829107/0/program-c-introduction-basics-part-1.1280x600.jpg)
How to Program in C# : Introduction to the Basics (Part 1)
Welcome my aspiring hackers and programmers! Today i will introduce you to a programming language that as a hacker you should have in your set of hacking/programming skills (except if you're only interested in web hacking/programming...then you should go learn some html or PHP instead of C#).
![](https://img.wonderhowto.com/img/45/02/63635085470599/0/code-your-own-botnet-dumbotnet.1280x600.jpg)
![](https://img.wonderhowto.com/img/35/07/63589422405803/0/train-your-python-part-16-basic-file-input-and-output.1280x600.jpg)
How to Train Your Python: Part 16, Basic File Input and Output
Welcome back! In the last training session we covered how to write and execute scripts. But today we'll be getting back to the code!
![](https://img.wonderhowto.com/img/52/42/63589365052368/0/security-oriented-c-tutorial-0x20-problems-with-popen-and-shifty-system.1280x600.jpg)
How To: Security-Oriented C Tutorial 0x20 - Problems with popen and Shifty system
How's it goin'? In this tutorial, we will learn about the security issues of the popen and system functions. I've seen a few people attempting to run command line utilities or whatever it is they require with calls to these two functions but may not know the security implications which come along with it. I will show you using an example from the wargame IO Smash The Stack.
![](https://img.wonderhowto.com/img/88/98/63589221981478/0/irc-guide-universal-nickname.1280x600.jpg)
IRC Guide: Universal NickName
Hello fellow Nullbytiens, today we will be talking about IRC again (if you haven't read OTW's post about head over there now)and more specifically about using 1 nickname with multiple devices or IRC clients.
![](https://img.wonderhowto.com/img/39/54/63589094237851/0/vim-using-normal-mode-part-2.1280x600.jpg)
How To: VIM, Using the Normal Mode Part 2
Hello there Nullbyters, Last tutorial we discussed navigating and setting some options.
![](https://img.wonderhowto.com/img/38/53/63588984388291/0/security-oriented-c-tutorial-0x19-functions-part-v-passing-by-reference.1280x600.jpg)
How To: Security-Oriented C Tutorial 0x19 - Functions Part V: Passing by Reference
Hello there! This will probably be the final tutorial on functions where we will be looking over a method called pass by reference. This technique allows us to modify large amounts of data without the overhead and return multiple values. Let's go!
![](https://img.wonderhowto.com/img/32/00/63589072814068/0/vim-using-normal-mode-part-1.1280x600.jpg)
How To: VIM, Using the Normal Mode Part 1
Hello there Nullbytes, In my previous tutorial found here,
![](https://img.wonderhowto.com/img/85/38/63589052640480/0/irc-guide-making-bot.1280x600.jpg)
IRC Guide: Making a Bot
Hello fellow Nullbytiens, I'm Washu, a long time commenter but first time poster. Today we'll be making an IRC bot, if you haven't seen OTW's post about the new IRC channel I would encourage you to go check it out. He does a good job at explaining what IRC is and how to get set up.
![](https://img.wonderhowto.com/img/51/26/63588973077984/0/vim-as-ugly-as-is-fast.1280x600.jpg)
How To: VIM, as Ugly as It Is Fast
Hello there Nullbyte users! This will be my first article here.
![](https://img.wonderhowto.com/img/22/76/63635085616193/0/build-really-small-hacking.1280x600.jpg)
How To: Build a Really Small Hacking
removed!
![](https://img.wonderhowto.com/img/69/55/63588728740939/0/lastpass-phishing-hack-can-steal-all-your-passwords-heres-prevent.1280x600.jpg)
How To: This LastPass Phishing Hack Can Steal All Your Passwords—Here's How to Prevent It
If you want to keep your online world secure, your best bet is to have a different password for every site and service that you use, and to make sure each of the passwords are comprised of random characters instead of familiar words or numbers. But this obviously creates a problem—how exactly are we supposed to remember all of these complicated passwords?
![](https://img.wonderhowto.com/img/64/76/63588005619033/0/meterpreter-obtaining-user-credentials-with-powershell.1280x600.jpg)
How to Meterpreter: Obtaining User Credentials with PowerShell
In this article I will show you how to obtain victim's credentials without cracking any hashes. There are a couple of ways to perform this task (for example dumping the SAM file and cracking the NTLM hashes), but here I will explain how to do it using PowerShell and a bit of social engineering. We are going to create a fake login popup.
![](https://img.wonderhowto.com/img/55/31/63588484675873/0/hack-like-pro-hack-like-nsa-using-quantum-insert.1280x600.jpg)
Hack Like a Pro: How to Hack Like the NSA (Using Quantum Insert)
Welcome back, my greenhorn hackers! Over the years, I have written many articles here on Null Byte chronicling the many the hacks of the NSA, including the recent hack of the Juniper Networks VPN. (By the way, my speculation in that article has proven to be correct. The NSA did embed a backdoor on those devices.)
![](https://img.wonderhowto.com/img/04/15/63588546983436/0/java-e2-datatypes-and-typecasting.1280x600.jpg)
How to Java: E2 (DataTypes and TypeCasting)
Welcome back Java programmers! In this tutorial we'll being going over Variables/DataTypes and Type-casting
![](https://img.wonderhowto.com/img/59/82/63588351910736/0/guide-privacy-matters.1280x600.jpg)
Guide: Privacy Matters
Greetings all. Today I intend to append a new series to my mini-collection of posts. This series will consist of informative guides for the purpose of depicting certain aspects of the White Hat profession that I believe are of profound importance. Furthermore, I will keep this series simple for everyone to follow, regardless of your tech level. So without further ado, let's get right into it.
![](https://img.wonderhowto.com/img/43/38/63588291291092/0/hack-like-pro-digital-forensics-for-aspiring-hacker-part-12-windows-prefetch-files.1280x600.jpg)
Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 12 (Windows Prefetch Files)
Welcome back, my aspiring hackers! In this series, we continue to examine digital forensics, both to develop your skills as a forensic investigator and to avoid the pitfalls of being tracked by a forensic investigator.
![](https://img.wonderhowto.com/img/83/21/63588002659779/0/typoguy-explaining-anonymity-staying-hidden-from-nsa.1280x600.jpg)
TypoGuy Explaining Anonymity: Staying Hidden from the NSA
We all know them, and many of us despize them. And some might support them, regardless many have different opinions.
![](https://img.wonderhowto.com/img/32/69/63587961986440/0/security-oriented-c-tutorial-0xfd-software-steroids-upgrading-our-malware.1280x600.jpg)
How To: Security-Oriented C Tutorial 0xFD - Software on Steroids - Upgrading Our Malware
Welcome back to a tutorial on malware. We'll be discovering a method to beef up our little trooper. Without further ado, let's jump right in!
![](https://img.wonderhowto.com/img/86/44/63587918304610/0/security-oriented-c-tutorial-0x18-malloc-and-heap.1280x600.jpg)
How To: Security-Oriented C Tutorial 0x18 - Malloc and the Heap
Hey guys, in this tutorial, we are going to learn about the heap segment and how to use it for storing data in our programs. We will also go into the details of its use in conjunction with the char pointer and struct data types.
![](https://img.wonderhowto.com/img/24/90/63587891795531/0/security-oriented-c-tutorial-0x17-structs.1280x600.jpg)
How To: Security-Oriented C Tutorial 0x17 - Structs
What's up, peeps? In this quick tutorial, we will be looking at structs, a special kind of data type.
![](https://img.wonderhowto.com/img/61/68/63587907968248/0/creating-unique-and-safe-passwords-part-1-using-wordlists.1280x600.jpg)
How To: Creating Unique and Safe Passwords, Part 1 Using Wordlists
Greetings fellow hackers. This tutorial is about creating "safe" passwords. This is different from strong passwords. Safe passwords is just creating a password that is not used by someone else or colleague, my definition. But how do you prevent something like this from happening? Of course you won't ask your friend if s|he is using the password you are about to create. Before I show you some of my tele-psychic powers like Professor Xavier, you might want to read this for advice on creating "s...
![](https://img.wonderhowto.com/img/71/01/63587814706201/0/security-oriented-c-tutorial-0x16-functions-part-iv-recursion.1280x600.jpg)
How To: Security-Oriented C Tutorial 0x16 - Functions Part IV: Recursion
Hello again, and welcome back to another tutorial on functions, this time, covering recursion. What Is Recursion?
![](https://img.wonderhowto.com/img/69/96/63587831860610/0/rasberry-pi-connecting-computer.1280x600.jpg)
Rasberry Pi: Connecting on Computer
I have gotten comments from my last tutorial on not being able to do anything because of a lack of a monitor. In order to address this problem I'm gonna show you how to connect and control the Rasberry Pi through a SSH client on Linux, Mac, Windows, and Chromebook computers. This will probably we a long tutorial so please bear with me. Anyway, lets get to work.