Hot Null Byte How-Tos
![iOS 18 Tips, Tricks, How-Tos, News](https://img.wonderhowto.com/img/15/56/63854300537190/0/ios-18-secrets-revealed.600x696.jpg)
![](https://img.wonderhowto.com/img/41/40/63557286116925/0/hack-wi-fi-dosing-wireless-ap-continuously.1280x600.jpg)
How to Hack Wi-Fi: DoSing a Wireless AP Continuously
Welcome back, my nascent hackers! In previous tutorials for my Wi-Fi Hacking series, I have shown you how to crack WEP and WPA2 passwords, break a WPS PIN, and create Evil Twin and Rogue access points. In this continuation of the series, let's look at slightly different approach to attacking wireless.
How To: Make Passwords and Encrypt the Written List.
I wrote this about two years ago to help people make realistic passwords. The best part was while writing it I realized I encrypted the list in a manner only the maker would know.... on to the show
![](https://img.wonderhowto.com/img/85/35/63555620556376/0/advice-from-real-hacker-why-im-skeptical-north-korea-hacked-sony.1280x600.jpg)
Advice from a Real Hacker: Why I'm Skeptical That North Korea Hacked Sony
Seldom in recent history has a cyber security event caused so much media stir (maybe because it happened to a media company?) and international relations upheaval. Cyber security breaches seem to take place daily of major corporations, but the Sony hack seems to have captured the American imagination and, for that matter, the whole world's attention.
![](https://img.wonderhowto.com/img/13/36/63555475596512/0/find-your-computers-vulnerability-using-lynis.1280x600.jpg)
How To: Find Your Computer's Vulnerability Using Lynis
This is finding some of your vulnerability using Lynis. This tool Lynis is used on Unix and Linux type operating systems (sorry windows). So lets get started
![](https://img.wonderhowto.com/img/79/18/63554840607688/0/sony-hack-thoughts-observations-from-real-hacker.1280x600.jpg)
The Sony Hack: Thoughts & Observations from a Real Hacker
By now, nearly everyone with any type of media access is aware that Sony Pictures Entertainment was hacked on November 24th. Although there can be many interpretations and lessons drawn from this audacious act, there is one indisputable conclusion: it and its ripples across the globe underlines how important hacking has become in our all-digital 21st century. As I have emphasized so many times in this column, hacking is the discipline of the future. From cybercrime to cyber intelligence to cy...
![](https://img.wonderhowto.com/img/26/37/63550406186522/0/kali-is-your-new-pet-ultimate-guide-about-kali-linux-portability.1280x600.jpg)
How To: Kali Is Your New Pet; The Ultimate Guide About Kali Linux Portability.
Did you know Kali 1.0.8? You probably did, and you probably know about the EFI boot option that has been added.
![](https://img.wonderhowto.com/img/62/87/63550173718408/0/hack-like-pro-introduction-regular-expressions-part-2.1280x600.jpg)
Hack Like a Pro: An Introduction to Regular Expressions, Part 2
Welcome back, my hacker novitiates! A short while ago, I introduced you to regular expressions. Regular expressions are a language that is particularly useful for finding complex text patterns in streams of data.
![](https://img.wonderhowto.com/img/20/01/63549650981799/0/hacker-hurdles-dep-aslr.1280x600.jpg)
Hacker Hurdles: DEP & ASLR
This is the first installment in a new series that I am calling "Hacker Hurdles." These are things, methods, techniques that make our job as hackers more challenging and difficult. Don't misunderstand me, these items don't make our task impossible, but rather more challenging and, therefore, more gratifying when we are successful. One of the most important new hurdles for hackers is DEP and ASLR. Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) are designed to pre...
![](https://img.wonderhowto.com/img/79/60/63549224401533/0/hack-wi-fi-evading-authentication-proxy-using-icmptx.1280x600.jpg)
How to Hack Wi-Fi: Evading an Authentication Proxy Using ICMPTX
Welcome back, my greenhorn hackers! In previous Wi-Fi hacking tutorials, I have shown you ways to create an Evil Twin, to DoS a wireless AP, and to crack WEP and WPA2 passwords, but in this tutorial, I will show you something a little bit different.
![](https://img.wonderhowto.com/img/56/81/63548885643653/0/hack-like-pro-hacking-windows-xp-through-windows-8-using-adobe-flash-player.1280x600.jpg)
Hack Like a Pro: Hacking Windows XP Through Windows 8 Using Adobe Flash Player
Welcome back, my novice hackers! New hackers often ask me the same question: "What is the easiest platform to hack?" My response is always the same—it is not a platform, but rather a particular piece of software that is easiest to hack, which is on nearly every client-side system. That software is Adobe Flash Player.
![](https://img.wonderhowto.com/img/68/61/63545336209174/0/why-you-should-study-be-hacker.1280x600.jpg)
How To: Why You Should Study to Be a Hacker
Welcome back, my budding hackers! People often ask me, "Why are you training hackers? Isn't that illegal?" Although I usually give them a short version of this post, there are MANY reasons why YOU should be studying hacking.
![](https://img.wonderhowto.com/img/45/30/63543331878716/0/subterfuge-mitm-automated-suite-looks-just-lame.1280x600.jpg)
Subterfuge: MITM Automated Suite That Looks Just Lame.
Remember when MITMing people to pentest webapps and log-ins you had to fire Ettercap,Arpspoof, SSLstrip, then look for credentials in the captured packets?
![](https://img.wonderhowto.com/img/71/15/63541205518525/0/protect-yourself-against-black-hats-defense-series-part-1.1280x600.jpg)
How To: Protect Yourself Against Black Hats! [DEFENSE SERIES PART 1]
Hi! Let me get started on this subject as it is a very "touchy" subject. We all want to "hack" these days, and that's logical. Te be real honest here, i was inspired once by the words someone from the Null byte community said. In the (near) future, wars will be ended by computers and not a nuclear missile. That's something i really do believe in. But let us take a defensive measure instead of the offensive one. Sure, Full frontal bryte forcing is an option, but when it'll come that far we'll ...
![](https://img.wonderhowto.com/img/34/40/63540670808619/0/hack-like-pro-basics-xoring.1280x600.jpg)
Hack Like a Pro: The Basics of XORing
Welcome back, my novice hackers! In a recent tutorial, I showed you how to use shikata_ga_nai to change the signature of a payload to evade detection by security devices (firewalls, IDS, etc.) and AV software.
![](https://img.wonderhowto.com/img/04/43/63537472433984/0/hack-like-pro-compile-new-hacking-tool-kali.1280x600.jpg)
Hack Like a Pro: How to Compile a New Hacking Tool in Kali
Welcome back, my newbie hackers! Recently, I "upgraded" to Kali as my hacking platform, despite my preference for BackTrack. I did this reluctantly, primarily because new readers here could no longer download BackTrack from their site. I want to point out here that we all must keep in mind that with any software—or for that matter, any product—that is newer is not necessarily better.
![](https://img.wonderhowto.com/img/20/02/63535929390766/0/hack-like-pro-linux-basics-for-aspiring-hacker-part-18-scheduling-jobs.1280x600.jpg)
Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 18 (Scheduling Jobs)
Welcome back, my aspiring hackers! In previous tutorials, I have shown you how to scan the globe for vulnerable servers and write simple scripts in BASH and Perl to perform other reconnaissance tasks. In a very recent guide, I taught how to scan vulnerable servers for Heartbleed.
![](https://img.wonderhowto.com/img/64/15/63532372610613/0/remove-backtrack-install-kali-as-dual-boot-system-without-damaging-your-hard-drive.1280x600.jpg)
How To: Remove BackTrack & Install Kali as a Dual-Boot System Without Damaging Your Hard Drive
Yesterday, I wanted to remove BackTrack from my system and install Kali, and at the same time didn't want to damage my Windows 7 or my hard drive. I searched a lot of articles, but almost all of them wanted me to have a backup Windows 7 CD, which I don't possess.
![](https://img.wonderhowto.com/img/16/66/63529815108011/0/hack-like-pro-linux-basics-for-aspiring-hacker-part-17-client-dns.1280x600.jpg)
Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 17 (Client DNS)
Welcome back, my aspiring hackers! Domain Name System (DNS) is one of those things we seldom think about unless it doesn't work. Then, it can be very frustrating when we attempt to navigate to a website and we get that frustrating error message.
![](https://img.wonderhowto.com/img/88/94/63529693572979/0/hack-like-pro-exploit-adobe-flash-with-corrupted-movie-file-hack-windows-7.1280x600.jpg)
Hack Like a Pro: How to Exploit Adobe Flash with a Corrupted Movie File to Hack Windows 7
Welcome back, my greenhorn hackers! In my continuing effort to demonstrate to you how to hack the ubiquitous Windows 7, we will going after that notoriously vulnerable Adobe Flash that is on nearly every client Windows system (you are not likely to find it on servers).
![](https://img.wonderhowto.com/img/52/38/63528484201140/0/networking-basics-for-aspiring-hacker-part-one-ip-addresses.1280x600.jpg)
How To: Networking Basics for the Aspiring Hacker, Part One: IP Addresses
Recently, there have been some questions regarding networking popping up and we have decided to put together this series to try and cover this gap.
![](https://img.wonderhowto.com/img/18/65/63527391375862/0/hack-like-pro-introduction-regular-expressions-regex.1280x600.jpg)
Hack Like a Pro: An Introduction to Regular Expressions (Regex)
Welcome back, my novice hackers! This next subject might seem a bit obscure, but I promise you, this lesson will benefit you significantly either as a hacker or system admin. This tutorial will cover what is usually referred to as a regular expression, or regex for short.
![](https://img.wonderhowto.com/img/90/69/63527044545020/0/hack-windows-7-sending-vulnerable-shortcut-files.1280x600.jpg)
How to Hack Windows 7: Sending Vulnerable Shortcut Files
Welcome back, my greenhorn hackers! After the disaster that was Windows Vista and the limited and reluctant adoption of Windows 8 and 8.1, Windows 7 has become the de facto standard operating system on the desktop/client.
![](https://img.wonderhowto.com/img/91/22/63526683070115/0/hack-like-pro-digital-forensics-for-aspiring-hacker-part-4-evading-detection-while-dosing.1280x600.jpg)
Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 4 (Evading Detection While DoSing)
Welcome back, my hackers novitiates! As you read my various hacking tutorials, you're probably asking yourself, "What are the chances that this hack will be detected and that I'll land behind bars, disappointing my dear mother who already thinks I'm a loser?"
![](https://img.wonderhowto.com/img/86/95/63524790056093/0/hack-like-pro-digital-forensics-for-aspiring-hacker-part-3-recovering-deleted-files.1280x600.jpg)
Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 3 (Recovering Deleted Files)
Welcome back, my tenderfoot hackers! I recently began a new series on digital forensics to help tenderfoot hackers from being detected and ultimately, incarcerated. In this installment of that series, we will look at recovering deleted files. This is important to hackers because you need to know that even when you delete files on your computer or on the victim's computer, a forensic investigator can usually recover them.
![](https://img.wonderhowto.com/img/39/58/63524610101447/0/hack-like-pro-linux-basics-for-aspiring-hacker-part-14-mysql.1280x600.jpg)
Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 14 (MySQL)
Welcome back, my greenhorn hackers!
![](https://img.wonderhowto.com/img/47/68/63523169158564/0/fbi-can-spy-your-webcam-undetected-heres-stop-them.1280x600.jpg)
How To: The FBI Can Spy on Your Webcam Undetected: Here's How to Stop Them
Let's just say it's been a pretty bad year for spies and government agencies and an even worse one for the privacy of U.S. citizens. Edward Snowden blew the lid off the NSA's spy program, and the FBI was recently discovered to have the ability to access your webcam any time they want—without triggering the "camera on" light. Yeah, that means those Justin Bieber lip sync videos you recorded weren't just for your private collection.
![](https://img.wonderhowto.com/img/84/83/63521840208263/0/hack-like-pro-scripting-for-aspiring-hacker-part-2-conditional-statements.1280x600.jpg)
Hack Like a Pro: Scripting for the Aspiring Hacker, Part 2 (Conditional Statements)
Welcome back, my greenhorn hackers! I recently began a series on scripting and have received such positive feedback that I'm going to keep this series going. As I've said before, to graduate from the script kiddie to the pro hacker, you'll need to have some scripting skills. The better you are at scripting, the more advanced your hacking. Ultimately, we are leading up to developing the skills to build your own zero day exploits.
![](https://img.wonderhowto.com/img/47/26/63521058924978/0/hack-like-pro-linux-basics-for-aspiring-hacker-part-12-loadable-kernel-modules.1280x600.jpg)
Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 12 (Loadable Kernel Modules)
Welcome back, my budding hackers! In my continuing series on Linux basics for aspiring hackers, I now want to address Loadable kernel modules (LKMs), which are key to the Linux administrator because they provide us the capability to add functionality to the kernel without having to recompile the kernel. Things like video and other device drivers can now be added to the kernel without shutting down the system, recompiling, and rebooting.
![](https://img.wonderhowto.com/img/41/14/63519521389568/0/hack-like-pro-create-nearly-undetectable-backdoor-with-cryptcat.1280x600.jpg)
Hack Like a Pro: How to Create a Nearly Undetectable Backdoor with Cryptcat
Welcome back, my fledgling hackers! Awhile back, I demonstrated one of my favorite little tools, netcat, which enables us to create a connection between any two machines and transfer files or spawn a command shell for "owning" the system. Despite the beauty and elegance of this little tool, it has one major drawback—the transfers between the computers can be detected by security devices such as firewalls and an intrusion detection system (IDS).
![](https://img.wonderhowto.com/img/45/76/63519347285745/0/understanding-signature-schemes-data-sources-are-authenticated-secured-spoofed.1280x600.jpg)
How To: Understanding Signature Schemes: How Data Sources Are Authenticated, Secured, & Spoofed
One of the biggest problems in data security is authentication of data and its source. How can Alice be certain that the executable in her inbox is from the venerable Bob, and not from the not-so-venerable Oscar? Clearly Alice wants to know because if this file is actually sent to her by Oscar, the file might not be a game, but a trojan that can do anything on her computer such as sift through her email and passwords, upload her honeymoon pictures, or even turn on microphones and webcams. Thi...
![](https://img.wonderhowto.com/img/04/64/63518302729727/0/hack-like-pro-haunt-your-bosss-computer-drive-him-insane.1280x600.jpg)
Hack Like a Pro: How to Haunt Your Boss's Computer & Drive Him Insane
Welcome back, my neophyte hackers! In today's hack, we're going to have a bit of Halloween fun. Have you ever had a boss who made you miserable with his micro-management and nagging? Maybe you thought he unfairly fired your friend/colleague? Well, now here's your chance to get a bit of revenge and keep him or her off your back!
![](https://img.wonderhowto.com/img/88/74/63518038463546/0/hack-like-pro-use-metasploits-psexec-hack-without-leaving-evidence.1280x600.jpg)
Hack Like a Pro: How to Use Metasploit's Psexec to Hack Without Leaving Evidence
Welcome back, my fledgling hackers! It's been awhile since we did a Metasploit tutorial, and several of you have pleaded with me for more. I couldn't be happier to oblige, as it's my favorite tool. For the next several weeks, I'll intersperse some new guides that'll help expand your Metasploit skills and keep you abreast of new developments in Metasploit, so look for them in the near future.
![](https://img.wonderhowto.com/img/22/44/63516157280334/0/hack-databases-terms-technologies-you-need-know-before-getting-started.1280x600.jpg)
How to Hack Databases: The Terms & Technologies You Need to Know Before Getting Started
Welcome back, my hacker apprentices! Although there is a multitude of different hacker types, the one target they all share is the database. I often refer to the database as the hacker's Holy Grail, or the ultimate prize for an effective hack.
![](https://img.wonderhowto.com/img/69/81/63516151970443/0/introduction-modern-cryptography.1280x600.jpg)
How To: Introduction to Modern Cryptography
Cryptography is the science of keeping secrets, or more specifically, the science of disguising them. As a point of fact, cryptography has progressed quite a bit farther and now encompasses file and message integrity, sender authentication, and pseudo-random number generators.
![](https://img.wonderhowto.com/img/49/82/63514582636710/0/hack-like-pro-linux-basics-for-aspiring-hacker-part-10-manipulating-text.1280x600.jpg)
Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 10 (Manipulating Text)
Welcome back, my aspiring hackers! As mentioned several times in previous Linux tutorials, nearly everything in Linux is a file, and very often they are text files. For instance, all of the configuration files in Linux are text files. To reconfigure an application in Linux, we simply need to open the configuration file, change the text file, re-save, and then restart the application and our reconfiguration is applied.
![](https://img.wonderhowto.com/img/95/85/63512594253211/0/hack-like-pro-linux-basics-for-aspiring-hacker-part-9-managing-environmental-variables.1280x600.jpg)
Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 9 (Managing Environmental Variables)
Welcome back, my aspiring hackers!
![](https://img.wonderhowto.com/img/98/15/63512070669394/0/install-backtrack-tools-ubuntu.1280x600.jpg)
How To: Install Backtrack-Tools in Ubuntu
In this "how to" I will show you how to install every backtrack tools in ubuntu. Video: .
![](https://img.wonderhowto.com/img/08/80/63511039004685/0/hack-like-pro-evade-network-intrusion-detection-system-nids-using-snort.1280x600.jpg)
Hack Like a Pro: How to Evade a Network Intrusion Detection System (NIDS) Using Snort
Welcome back, my fledgling hackers! Nearly every commercial enterprise worth hacking has an intrusion detection system (IDS). These network intrusion detection systems are designed to detect any malicious activity on the network. That means you!
![](https://img.wonderhowto.com/img/37/41/63508548913359/0/bugtraq-installation-and-first-steps.1280x600.jpg)
Bugtraq: installation and first steps
In this "HOW TO" I will show you how to install and mange yourself in bugtraq. You will jave to folllow a couple of videos and then you will know everything that you need on how to install and configure bugtraq.
![](https://img.wonderhowto.com/img/52/30/63507852751085/0/hack-like-pro-create-your-own-prism-like-spy-tool.1280x600.jpg)
Hack Like a Pro: How to Create Your Own PRISM-Like Spy Tool
Welcome back, my hacker apprentices! In recent weeks, the revelation that the NSA has been spying on all of us has many people up in arms. I guess I take it all in stride as I just assume that the NSA is spying on all of us—all of the time. Don't get me wrong, I don't condone it, but I know the NSA.