Hot Null Byte How-Tos
![iOS 18 Tips, Tricks, How-Tos, News](https://img.wonderhowto.com/img/15/56/63854300537190/0/ios-18-secrets-revealed.600x696.jpg)
How To: Make a Personal Diary with Notepad!
Welcome back, my neophytes! Many of you might have a personal diary and might think Why do I spend so much time to write in the damn diary? or Why waste money on the diary, even though you would be wanting it? It's time you found out a solution!
![](https://img.wonderhowto.com/img/73/21/63570820169043/0/hack-like-pro-digital-forensics-for-aspiring-hacker-part-8-more-windows-registry-forensics.1280x600.jpg)
Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 8 (More Windows Registry Forensics)
Welcome back, my fledgling hackers! Let's continue to expand our knowledge of digital forensics, to provide you the skills necessary to be a digital forensic analyst or investigator, as well make you a better hacker overall. In your attempts to enter a system or network undetected, it is key to understand what a skilled forensic investigator can learn about you, the alleged hacker.
![](https://img.wonderhowto.com/img/55/62/63570512125606/0/setoolkit-metasploits-best-friend.1280x600.jpg)
SEToolkit: Metasploit's Best Friend
If you read my last tutorial on using SEToolkit, you probably know that SEToolkit is an effective way to make malicious actions look legitimate. But, that was only the beginning... the truth is, Metasploit and SEToolkit belong together, and help each other very well.
![](https://img.wonderhowto.com/img/11/00/63570498790545/0/fun-with-osx-terminal.1280x600.jpg)
How To: Fun with OSX Terminal
Disclaimer: All information in this tutorial is for entertainment and educational purposes ONLY. You pesky teenagers.
![](https://img.wonderhowto.com/img/26/24/63570477685981/0/inject-payload-into-softwares-via-http.1280x600.jpg)
How To: Inject Payload into Softwares via HTTP
Video: . Hi, this is a quick demo about how to backdoor executables (software) sent over HTTP using MITMF, backdoor factory
![](https://img.wonderhowto.com/img/32/12/63570435683071/0/look-cool-with-notepad-with-viruses.1280x600.jpg)
How To: Look Cool with Notepad with Viruses!
Hello Hackers/Viewers, It is a new day, and you might be thinking, It is so boring, why not try to be cool with computers in front of my friends? That is why, I have made this tutorial to make fake viruses using notepad to look cool!
How To: Disable Autorun
Hello, Hackers/Viewers, Today's topic is going to be based on how to disable autorun for Removable Disks and Drives. Doing that is very easy, i you read the below!
How To: Make & Study Viruses
Hello, Hackers/Viewers! My name is nullf0x, and I have 4 years of experience as a hacker. You might see everyday that one of your friends or acquaintances get a new virus in their computer. You might think, How cool would it be if I made a virus? or How cool would I be if i could remove viruses from others computers for money or free?
![](https://img.wonderhowto.com/img/67/77/63570243843961/0/create-backdoor-osx.1280x600.jpg)
How To: Create Backdoor on OSX
Hello, ladies and gents! Today I will be discussing the fun and excitement of backdoor on an OSX system.
![](https://img.wonderhowto.com/img/39/96/63569253407686/0/find-target-location-with-iphone-picture.1280x600.jpg)
How To: Find Target Location with an iPhone Picture
Welcome back, my hacking friends. We use our smartphones every day, for business, socialization, and leisure. The number of iPhone users is increasing in dozens of millions every year, with a whopping 63.2 million users in 2014 alone. That's a lot of users.
![](https://img.wonderhowto.com/img/25/89/63568855327774/0/hack-like-pro-digital-forensics-for-aspiring-hacker-part-7-windows-sysinternals.1280x600.jpg)
Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 7 (Windows Sysinternals)
Welcome back, my aspiring hackers! In many of my earlier tutorials, I mentioned the complementary nature of hacking and forensics. Both disciplines, hacking and forensics, benefit from a knowledge of the other. In many cases, both disciplines will use the same tool. In this tutorial, we will use another tool that can be used in either discipline—Sysinternals—a suite of tools developed by Mark Russinovich.
![](https://img.wonderhowto.com/img/65/25/63568427712761/0/easily-find-what-port-service-runs-and-vice-versa.1280x600.jpg)
How To: Easily Find What Port a Service Runs On and Vice-Versa
I wrote a python script that allows you to easily ask what service runs on a specific port and vice-versa. Now, I am sure that such a program already exists on our lovely linux OS's, but... I didn't think of that before I started, and haven't found it yet. So if you haven't found it yet either, maybe you'll find this of some use. It's just called getport. If I have a port number, and want to know what services run on that port, I do:
![](https://img.wonderhowto.com/img/57/14/63568071743095/0/find-location-any-ip-with-pygeo-ip-locator-gui-for-geoip-pygeoip.1280x600.jpg)
How To: Find the Location of Any IP with PyGeo IP Locator(GUI for GeoIP/Pygeoip)
Based on OTW's encouragement in his post on "How to Find the Exact Location of Any IP Address", I decided to make a gui(graphical user interface) which would hopefully make the process easier. However, because turning a python script into a standalone executable is a right pain in the nether-regions, particularly for linux, I haven't yet completed this step(I will soon and update this). I did however, make an apk for android(you use a .apk file to install an app on your android device), which...
![](https://img.wonderhowto.com/img/28/82/63568021000729/0/hack-like-elite-batch-scripting-for-malicious-purposes-part-4-final-protection-using-batch.1280x600.jpg)
Hack Like an Elite: Batch Scripting for Malicious Purposes: PART 4 (Final) (Protection Using Batch)
Hi all, Pro Hackers/Crackers, Let's see how we can use batch for our own Protection instead of exploiting someone with it.
![](https://img.wonderhowto.com/img/02/32/63567456809593/0/hack-site-knowing-bit-html-hackthissite-org-part-2.1280x600.jpg)
How To: Hack a Site Knowing a Bit of HTML (hackthissite.org) Part 2
Hello all. It's time for level 6 all, password encrypting. Step 1: Looking for ASCII Table
![](https://img.wonderhowto.com/img/13/36/63567418502832/0/hack-like-elite-batch-scripting-for-malicious-purposes-part-1-basics.1280x600.jpg)
Hack Like an Elite: Batch Scripting for Malicious Purposes: PART 1 (The Basics)
Hi there, Crackers, Welcome to my 7th post (Part-1), this tutorial will explain about the basics of Batch Scripting.
![](https://img.wonderhowto.com/img/79/06/63567179096846/0/hack-site-knowing-bit-html-hackthissite-org-part-1.1280x600.jpg)
How To: Hack a Site Knowing a Bit of HTML (hackthissite.org) Part 1
After you have registered to this site,sign in then to start missions. Basic Missions
![](https://img.wonderhowto.com/img/77/67/63566808134281/0/xss-bonuses.1280x600.jpg)
How To: XSS Bonuses
This is a followup from my recent series on XSS exploitation, giving a few extra attacks/tricks to try.
![](https://img.wonderhowto.com/img/08/68/63566762424639/0/networking-basics-for-aspiring-hacker.1280x600.jpg)
How To: Networking Basics for the Aspiring Hacker
Hi there, nullbytes! I've been recently using NullByte as my only source of learning (almost) and it has proven to be really good to me.
![](https://img.wonderhowto.com/img/41/54/63566669036668/0/attack-stack-part-5-smash-stack-visualization-remote-code-execution-and-shellcode-concept.1280x600.jpg)
How To: Attack on Stack [Part 5]; Smash the Stack Visualization: Remote Code Execution and Shellcode Concept.
Hi everyone! In the previous part of this series, I introduced one way to hijack a program's execution flaw, though I only showed you how to crash the program and left you with a little mystery to solve. Today we are giving the solution of that and then introducing shellcode usage and remote command execution.
![](https://img.wonderhowto.com/img/98/38/63566621866560/0/linux-basics-tips.1280x600.jpg)
How To: Linux Basics Tips
Hi nullbytes! I've been recently reading the whole Linux Basics for the Aspiring Hacker series and felt like it was missing some stuff I know, so I felt like sharing it with anyone who might find it useful too.
![](https://img.wonderhowto.com/img/66/36/63566569261031/0/exploiting-xss-with-beef-part-2.1280x600.jpg)
Exploiting XSS with BeEF: Part 2
Now that we have our vulnerable server, it's time to start up BeEF. Getting Started
![](https://img.wonderhowto.com/img/91/38/63566348566410/0/hack-like-pro-digital-forensics-for-aspiring-hacker-part-6-using-ida-pro.1280x600.jpg)
Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 6 (Using IDA Pro)
Welcome back, my greenhorn hackers! Digital forensics and hacking are complementary disciplines. The better you are at digital forensics, the better hacker you are, and the better hacker you are, the better you are digital forensics. Unfortunately, few people in either profession cross these discipline lines.
![](https://img.wonderhowto.com/img/68/41/63566211819642/0/run-vnc-server-win7.1280x600.jpg)
How To: Run an VNC Server on Win7
OTW's great Tutorial Hack Like a Pro: How to Save the World from Nuclear Annihilation gives me the inspiration to try this on Win7 sp1.
![](https://img.wonderhowto.com/img/58/15/63565919319117/0/hack-like-pro-antivirus-software-works-evade-pt-1.1280x600.jpg)
Hack Like a Pro: How Antivirus Software Works & How to Evade It, Pt. 1
Welcome back, my tenderfoot hackers! As hackers, we often are required to get past antivirus (AV) software or other security measures. To do so effectively, we need to have some understanding of how AV software works. In this tutorial, we will take a cursory view of how AV software works so that you can better strategize on how to evade detection by it.
![](https://img.wonderhowto.com/img/05/68/63565636527273/0/ghost-phisher-security-auditing-tool.1280x600.jpg)
GHOST PHISHER : Security Auditing Tool
Hey Everyone! Welcome to my post. We have seen a numerous GUI Tool in kali linux. Armitage, wireshark, Burpsuite etc,. Lets see an another GUI tool.
![](https://img.wonderhowto.com/img/27/20/63565537892667/0/crack-wps-with-wifite.1280x600.jpg)
How To: Crack WPS with Wifite
Hi, dear co-apprentices and wise masters. I've been recently trying to learn the basics to hacking here, and I've read all guides on Wi-Fi hacking and noticed no word is dedicated to this awesome script that comes bundled with Kali!
![](https://img.wonderhowto.com/img/75/38/63565536056322/0/attack-stack-part-3-smash-stack-visualization-building-fundaments-analyzation-trilogy-conclusion.1280x600.jpg)
How To: Attack on Stack [Part 3]; Smash the Stack Visualization: Building on Fundaments, Analyzation Trilogy Conclusion.
Hi everyone! Last time we explained what roles Ebp and Esp registers have. We first introduced function's stack frame building, return address and calling conventions, but left some of the concepts floating without a full stop.
![](https://img.wonderhowto.com/img/82/30/63565452688875/0/sploit-forensics-with-metasploit-recovering-deleted-files.1280x600.jpg)
SPLOIT: Forensics with Metasploit ~ ( Recovering Deleted Files )
NOTICE: Ciuffy will be answering questions related to my articles on my behalf as I am very busy. Hope You Have Fun !!!
![](https://img.wonderhowto.com/img/60/80/63565401237891/0/hack-like-pro-metasploit-for-aspiring-hacker-part-8-setting-up-fake-smb-server-capture-domain-passwords.1280x600.jpg)
Hack Like a Pro: Metasploit for the Aspiring Hacker, Part 8 (Setting Up a Fake SMB Server to Capture Domain Passwords)
Welcome back, my neophyte hackers! In previous tutorials, we learned how to steal system tokens that we could use to access resources, how to use hashdump to pull password hashes from a local system, and how to grab password hashes from a local system and crack them.
![](https://img.wonderhowto.com/img/98/62/63564848572785/0/attack-stack-part-2-smash-stack-visualization-ebp-esp-ret-and-stack-frames.1280x600.jpg)
How To: Attack on Stack [Part 2]; Smash the Stack Visualization: Ebp, Esp, RET and Stack Frames.
Hi everyone! After messing around a little bit with IDA and Hopper disassemblers and briefly introducing you to memory, registers and Assembly, we are going to understand what happens when a process is running, which variables join the play and especially what happens when a function is called and why is this procedure-logic so interesting and useful along with the concept of stack.
![](https://img.wonderhowto.com/img/79/76/63564805533482/0/sploit-strip-off-metadata-images-using-python.1280x600.jpg)
SPLOIT: How to Strip Off MetaData in Images Using Python
NOTICE: Ciuffy will be answering questions related to my articles on my behalf as I am very busy. Hope You Have Fun !!!
![](https://img.wonderhowto.com/img/34/54/63563475061481/0/introduction-ipython.1280x600.jpg)
How To: An Introduction to IPython
What Is IPython? IPython is a richly featured replacement for the standard python interpreter. It offers a wider range of functionality, that the standard
![](https://img.wonderhowto.com/img/60/30/63563239106192/0/learn-secrets-psychology.1280x600.jpg)
How To: Learn the Secrets of Psychology
Hello, hackers and engineers! Today we are going to dive a tiny bit deeper into the secrets of psychology, and how we can use them with hacking and social engineering attacks.
![](https://img.wonderhowto.com/img/06/25/63562978134532/0/use-social-engineering-gain-unauthorized-access-hotel-room.1280x600.jpg)
How To: Use Social Engineering to Gain Unauthorized Access to a Hotel Room
Edit: Some of the methods I show you may be difficult, or not work at famous or high quality hotels.
![](https://img.wonderhowto.com/img/86/28/63562970920080/0/post-null-byte-4-10-15-revision.1280x600.jpg)
How To: Post to Null Byte [4.10.15 Revision]
Hello readers, and welcome to Null Byte. Before we start, for those of you who may not know me, my name is ghost_; I'm a relatively active member of our community and have been around for a while.
![](https://img.wonderhowto.com/img/58/14/63562964621138/0/useful-lesser-known-commands-for-linux.1280x600.jpg)
How To: Useful Lesser Known Commands for Linux
Hello everyone on null byte this is my first tutorial This Tutorial Is on Useful Lesser Known Commands on Linux
![](https://img.wonderhowto.com/img/41/87/63562891159611/0/make-fake-identity.1280x600.jpg)
How To: Make a Fake Identity
Inspiration for tutorial: Foxtrot's "How to Trap a Tracker"
How To: Trap a Tracker
As a hacker or an aspiring one, You need to be careful and anonymous if your doing anything illegal. But you slipped up. Now someone is tracking you! Well luckily you read this post ahead of time and have a backup plan!
![](https://img.wonderhowto.com/img/84/29/63562812889266/0/use-social-engineering-hack-computers.1280x600.jpg)
How To: Use Social Engineering to Hack Computers
Today I am going to teach the various ways that you can use social engineering to hack a system. For those of you that have followed my past tutorials, you know that social engineering can unlock a world of possibilities. This is because no matter how many firewalls, no matter how many patches there are on a server, the password is kept in the minds of people...and people, are not as smart as computers.