Hot Null Byte How-Tos
![iOS 18 Tips, Tricks, How-Tos, News](https://img.wonderhowto.com/img/15/56/63854300537190/0/ios-18-secrets-revealed.600x696.jpg)
![](https://img.wonderhowto.com/img/69/96/63587831860610/0/rasberry-pi-connecting-computer.1280x600.jpg)
Rasberry Pi: Connecting on Computer
I have gotten comments from my last tutorial on not being able to do anything because of a lack of a monitor. In order to address this problem I'm gonna show you how to connect and control the Rasberry Pi through a SSH client on Linux, Mac, Windows, and Chromebook computers. This will probably we a long tutorial so please bear with me. Anyway, lets get to work.
![](https://img.wonderhowto.com/img/07/88/63587756948764/0/rasberry-pi-introduction.1280x600.jpg)
Rasberry Pi: Introduction
Most of you probably heard about Rasberry Pi and if you haven't; what is wrong with you? But nothing less a Rasberry Pi is a computer a very small computer. Despite these size limitations, the Rasberry Pi is to not be underestimated. Not only can it do anything like a normal laptop or desktop, but, in my opinion on of the coolest features is that it boots off a Micro SD card. It can do anything that you want, but it's built to be played with. A hacker heaven.
![](https://img.wonderhowto.com/img/58/52/63587688816283/0/security-oriented-c-tutorial-0xff-introduction-malware.1280x600.jpg)
How To: Security-Oriented C Tutorial 0xFF - An Introduction to Malware
Welcome to an introduction on writing basic malware, an optional sub-series in which I expose you to malware and its technologies. This is written for those who wish to seek a beginning in malware analysis or enlightenment on the subject. We will be justifying the writing and covering types of malware.
![](https://img.wonderhowto.com/img/87/20/63586509649789/0/security-oriented-c-tutorial-0x15-file-o.1280x600.jpg)
How To: Security-Oriented C Tutorial 0x15 - File I/O
Hello readers, in this tutorial, we will be discussing how to perform file operations such as reading and writing.
![](https://img.wonderhowto.com/img/70/78/63587523990293/0/using-bash-for-computer-forensics.1280x600.jpg)
How To: Using BASH for Computer Forensics
Greetings to all geeks, hackers, nerds, and explorers of Null Byte. Welcome to my brand new tutorial, "Using BASH for Computer Forensics". This tutorial will give you a look at how the computer programming language, Bash, can be used to find out details on apple devices for later use.
![](https://img.wonderhowto.com/img/24/48/63587375027799/0/use-beef-and-javascript-for-reconnaissance.1280x600.jpg)
How To: Use BeEF and JavaScript for Reconnaissance
Welcome back everyone. As many of you know, reconnaissance is extremely important in any successful hack. Without proper reconnaissance, we won't know what we're about to get into, literally.
![](https://img.wonderhowto.com/img/45/51/63587292561248/0/read-before-posting-null-byte-update-10-jan-2016.1280x600.jpg)
How To: READ THIS Before Posting to Null Byte (Update 10-Jan-2016)
After seeing the title of this post from me, you might be thinking, "Why did The Joker made another post on a topic on which we already have a nice sticky post?"
![](https://img.wonderhowto.com/img/49/23/63587126922994/0/bind-dendroid-apk-with-another-apk.1280x600.jpg)
How To: Bind Dendroid Apk with Another Apk
I recently posted a Tutorial about setting up Dendroid: http://null-byte.wonderhowto.com/how-to/setup-dendroid-android-rat-0167299/. I have worked the last 5 days on getting the Dendroid Binder, given with the Dendroid Source, working. This solution only works on Windows systems!
![](https://img.wonderhowto.com/img/75/10/63587018047525/0/web-development-05-more-styling.1280x600.jpg)
How To: Web Development 05 - More Styling
Welcome fellow Null-Byters! Sorry for the delay, this time of the year can be hectic for all of us. Hopefully this will not happen again. In this "tutorial" we will go over more styling and make our page look even better!
![](https://img.wonderhowto.com/img/23/38/63586905290182/0/exploit-development-stack-base-buffer-overflow-part-1-video.1280x600.jpg)
How To: Exploit Development-Stack Base Buffer Overflow/Part 1(VIDEO)
On this video I will demonstrate a simple concept of stack base overflows. This is the first part of my exploit development tutorials and after that I will demonstrate seh buffer overflow, ROP/DEP/ASLR, spraying the heap, search for bugs/think different etc.
How To: De-Freeze Kali 2.0. ?
Hello, hackies... Today i want to give you a simple but effective step-by-step guide to
![](https://img.wonderhowto.com/img/96/92/63586451513795/0/security-oriented-c-tutorial-0x14-format-string-vulnerability-part-buffer-overflows-nasty-little-brother.1280x600.jpg)
How To: Security-Oriented C Tutorial 0x14 - Format String Vulnerability Part I: Buffer Overflow's Nasty Little Brother
What's up readers? Today I'll be introducing to you a new vulnerability called the Format String vulnerability (in case you missed the title). It won't be much, just a little motivation to keep you guys going. A little teaser, if you may.
![](https://img.wonderhowto.com/img/53/20/63586660506795/0/train-your-python-part-14-more-advanced-lists-lambda-and-lambda-operators.1280x600.jpg)
How to Train Your Python: Part 14, More Advanced Lists, Lambda, and Lambda Operators
Welcome back! In our last training session, we covered some advanced list topics. We'll be going deeper into the advanced list rabbit hole today with lambda and lambda operators! (And I'm not talking about Gordan Freeman)
![](https://img.wonderhowto.com/img/89/26/63586608898904/0/security-oriented-c-tutorial-0x13-pieces-puzzle.1280x600.jpg)
How To: Security-Oriented C Tutorial 0x13 - Pieces of a Puzzle
Before we begin learning about another vulnerability, we are going to explore printf in a bit more detail. This will be quick little tutorial.
![](https://img.wonderhowto.com/img/41/31/63586368550237/0/security-oriented-c-tutorial-0x11-command-line-arguments.1280x600.jpg)
How To: Security-Oriented C Tutorial 0x11 - Command Line Arguments
In many programs on Linux, you'll come across programs which allow you to specify additional arguments instead of just simply running the program by itself. If you've used the Kali distribution, I'm more than certain you'll have come across these with the command line tools, else if you have been following these tutorials, we have already come across three tools which also use the same technique, i.e. gcc, gdb and wc. How do we do this with C? Let's find out.
![](https://img.wonderhowto.com/img/57/89/63586368237055/0/security-oriented-c-tutorial-0x10-pointers-and-addresses.1280x600.jpg)
How To: Security-Oriented C Tutorial 0x10 - Pointers and Addresses
In previous tutorials we have encountered these things called pointers and addresses but we still don't know what they really are. Let's learn a bit more to clear things up.
![](https://img.wonderhowto.com/img/65/85/63586358492144/0/security-oriented-c-tutorial-0x0f-functions-part-iii-stack.1280x600.jpg)
How To: Security-Oriented C Tutorial 0x0F - Functions Part III: The Stack
Welcome back to another tutorial on functions. Last time, we looked inside memory to see what functions looked like in the flesh and all that Assembly was pretty nasty. At least you have some exposure to it. This time, we will be examining how functions work with the stack.
![](https://img.wonderhowto.com/img/44/72/63586463048994/0/hack-androids-whatsapp-images-with-bash-and-social-engineering.1280x600.jpg)
How To: Hack Android's WhatsApp Images with BASH and Social Engineering
Hello friends. This is actually my first how to.
![](https://img.wonderhowto.com/img/71/43/63586340835827/0/security-oriented-c-tutorial-0x0e-functions-part-ii-memory.1280x600.jpg)
How To: Security-Oriented C Tutorial 0x0E - Functions Part II: Memory
In the last tutorial, we learned how to make functions and how they work on the high level. This time, we will take a peek under the hood again, stare deep into its soul and see its ugliness face to face to see how it works in the lower level.
![](https://img.wonderhowto.com/img/87/77/63586274382728/0/security-oriented-c-tutorial-0x0d-functions-part-introduction.1280x600.jpg)
How To: Security-Oriented C Tutorial 0x0D - Functions Part I: Introduction
Welcome to a tutorial explaining functions. This article will help clarify some things we have already been exposed to such as function prototypes, function calls, return values, etc.
![](https://img.wonderhowto.com/img/61/13/63586253962388/0/security-oriented-c-tutorial-0x0c-buffer-overflows-exposed.1280x600.jpg)
How To: Security-Oriented C Tutorial 0x0C - Buffer Overflows Exposed!
Welcome finally, to a tutorial on buffer overflows! At last we have reached an exciting part of this series where I will dedicate the entire article on explaining and exploiting the notorious vulnerability. Grab some popcorn, sit back and enjoy the show.
![](https://img.wonderhowto.com/img/38/33/63586379096349/0/web-development-04-styling-pt-2.1280x600.jpg)
How To: Web Development 04 - Styling Pt 2
Welcome back Null-Byters! You finally have the pre-basics of CSS and we can begin with styling our web page. If you did not read our last adventure, I suggest you go and read it.
![](https://img.wonderhowto.com/img/78/45/63586375439292/0/web-development-03-styling-pt-1.1280x600.jpg)
How To: Web Development 03 - Styling Pt 1
Welcome fellow Null-Byters! I would suggest you watch reading my last tutorial before we begin. In our last adventure, we began making a simple, ugly website. If we want it to make it look good, we should add some styling. But first, we need to understand the basics.
![](https://img.wonderhowto.com/img/22/56/63586462145018/0/become-hacker.1280x600.jpg)
How To: Become a Hacker
Many of our members here at Null Byte are aspiring hackers looking to gain skills and credentials to enter the most-valued profession of the 21st century. Hackers are being hired by IT security firms, antivirus developers, national military and espionage organizations, private detectives, and many other organizations.
![](https://img.wonderhowto.com/img/52/54/63586363920469/0/web-development-02-simple-webpage.1280x600.jpg)
How To: Web Development 02 - Simple Webpage
Hello fellow Null-Byters! In this "tutorial" we will be going basics of HTML. In the next tutorial, we will be going over CSS and then apply JavaScript.
![](https://img.wonderhowto.com/img/43/43/63586231214810/0/security-oriented-c-tutorial-0x0a-man-pages.1280x600.jpg)
How To: Security-Oriented C Tutorial 0x0A - Man Pages
Okay guys and gals, this will be a quick tutorial on using the incredibly helpful man pages. What Are Man Pages?
![](https://img.wonderhowto.com/img/30/36/63586189642591/0/security-oriented-c-tutorial-0x09-more-strings.1280x600.jpg)
How To: Security-Oriented C Tutorial 0x09 - More on Strings
What's up guys! It's time to discuss strings in more detail. Review
How To: Remotely Reset Router P.DG AV4001N
I assume you are on the same network with your router 1 - open a terminal window
![](https://img.wonderhowto.com/img/62/22/63586278757197/0/typoguy-explaining-anonymity-secure-browsing-habits.1280x600.jpg)
TypoGuy Explaining Anonymity: Secure Browsing Habits
to stay secure, you dont just need Tor, and a VPN. You need good browsing habits. What are Browsing Habits You Ask?
![](https://img.wonderhowto.com/img/80/96/63586177603145/0/security-oriented-c-tutorial-0x08-trip-down-memory-lane.1280x600.jpg)
How To: Security-Oriented C Tutorial 0x08 - A Trip Down Memory Lane
Before I continue with a topic on strings, we first require some fundamental understanding of how memory works, i.e. what it is, how data looks in memory, etc. as this is crucial when we are analyzing vulnerabilities and exploitation. I highly suggest that your mind is clear and focused when reading the following article because it may prove to be confusing. Also, if you do not understand something, please verify all of your doubts, otherwise you may not completely understand when we touch on...
![](https://img.wonderhowto.com/img/35/20/63586237685732/0/web-development-01-setting-everything-up.1280x600.jpg)
How To: Web Development 01 - Setting Everything Up
Hello fellow Null-Byters! This is my first post so please be respectful and constructed criticism is much appreciated. I am no professional, however I believe that it is important to understand technologies before you go poking at them and trying to break them, I therefore decided to make this series. In this "tutorial" we are going to setup a web server with php and mysql. I will be doing this with a raspberry pi because a pi is quite versatile.
![](https://img.wonderhowto.com/img/56/27/63586167380593/0/security-oriented-c-tutorial-0x07-arrays-and-strings.1280x600.jpg)
How To: Security-Oriented C Tutorial 0x07 - Arrays and Strings
Welcome to another C tutorial. We will be looking at arrays, discussing what they are, when they are used and their special relationship with the char variable. Let's begin.
![](https://img.wonderhowto.com/img/34/60/63586138711435/0/security-oriented-c-tutorial-0x06-operators.1280x600.jpg)
How To: Security-Oriented C Tutorial 0x06 - Operators
Hello again! In this tutorial, we are going to go over something called "operators" which will help us build upon conditions of control structures and also some variable manipulation. Without further ado, let's dive in!
![](https://img.wonderhowto.com/img/36/56/63586293137612/0/protect-yourself-from-someone-trying-hack-into-your-mac.1280x600.jpg)
How To: Protect Yourself from Someone Trying to Hack into Your Mac
If you read my previous post, "How to Hack into a Mac Without the Password", you know that it is very easy to break into someone's Mac if you have physical access to the computer. Now the question that lies is, how do we protect ourselves from this happening to us? Well, here is a way that guarantees that no one will be able to change your password through OS X Recovery.
![](https://img.wonderhowto.com/img/18/19/63585753207439/0/sql-injection-detailed-introduction.1280x600.jpg)
How To: SQL Injection! -- Detailed Introduction.
Hello NullByte! This will be my first How To series.
![](https://img.wonderhowto.com/img/18/02/63586100872654/0/security-oriented-c-tutorial-0x05-control-structures-part-ii-loops.1280x600.jpg)
How To: Security-Oriented C Tutorial 0x05 - Control Structures Part II: Loops
Welcome back to control structures, part two featuring the three types of loops. Here we go! What Is a Loop?
![](https://img.wonderhowto.com/img/93/17/63586010322802/0/security-oriented-c-tutorial-0x04-control-structures-part-if-statements.1280x600.jpg)
How To: Security-Oriented C Tutorial 0x04 - Control Structures Part I: If Statements
Welcome back to another C tutorial, this post covering the first part of control structures, if statements. Let's get right into it.
![](https://img.wonderhowto.com/img/64/57/63586071639228/0/train-your-python-part-13-advanced-lists-slicing-and-comprehension.1280x600.jpg)
How to Train Your Python: Part 13, Advanced Lists, Slicing, and Comprehension
Welcome back! In the last training session, we covered logical and membership operators. We're going to switch gears and expand our knowledge of lists.
![](https://img.wonderhowto.com/img/66/64/63586092478853/0/sploit-building-android-applications-for-hackers-part-2-setting-up-environment.1280x600.jpg)
SPLOIT: Building Android Applications for Hackers: Part 2: Setting Up the Environment
Greetings my fellow aspiring hackers,
![](https://img.wonderhowto.com/img/12/19/63585996443493/0/security-oriented-c-tutorial-0x03-bits-bytes-broken.1280x600.jpg)
How To: Security-Oriented C Tutorial 0x03 - Bits, Bytes, Broken?
Hey there, reader! In this tutorial we are going to explain how values are stored in variables as either signed or unsigned. Try to not get lost!