Weekend Homework: How to Become a Null Byte Contributor (1/29/2012)

How to Become a Null Byte Contributor (1/29/2012)

We're officially seeking Null Byters on a weekly basis who are willing to take the time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (IF up to par, of course). There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials on any skill level, and about anything you feel like sharing that is related to tech, hacking, psychology and social manipulation—or whatever other life hacks you think mesh with our community.

Can I Help in Another Way?

This isn't inclusive of tutorials, even if you simply post useful links and articles to the corkboard, you are doing the community a huge favor, because at some point, someone will need the information you have provided. Let's continue to make Null Byte the best forum ever by stuffing it with the latest and greatest hacking tutorials and topics.

If you have skills and want to share knowledge on any of the topics below, please leave a response in the comments with which topic you would like to write, post directly to the corkboard, or message me privately. If you have any additional ideas at all, please submit them below.

This Weeks Topics

  1. How to Nmap from Behind a Proxy—Teach users how to Nmap from behind a proxy to mask traffic. I would also love if you added in BASH proxying, since the two are similar.
  2. Guide to Asking Questions—Teach the new Null Byters how to ask questions and what we expect before being asked a question (the person researched the topic beforehand, isn't just being lazy, etc).
  3. How to Make Homemade Napalm (The Bird AndBear, Pending)—Teach users how to make Napalm with home supplies. If you need to know how it's done, just ask me.
  4. How to Code a War Dialer in Python Using Gvoice API—Again, if anyone needs the concepts, just ask me how and I will tell you how it's done and help you when you need it. Create a program to call people using Google voice and hang up (major points if you can push audio through from a local sound file when they pick up!).
  5. How to DOS Attack a Windows Media Share—Code an exploit to engage in a DOS attack against a Windows box running a media share. A successful DOS is when legitimate users cannot use the resources. This is simpler than you may think, inquire for details for proof-of-concept.
  6. Learn How to Make a USB Hacksaw (Mr F)—Make a guide on how to create a USB hacksaw, which is a PnP USB device that copies sensitive files from the host machine automatically.
  7. Guide to Binary Numbers (Mr F)—This guide should explain how binary works, hex conversion, decimal, and more. Explain the importance of them and their roles in computing.
  8. A Brief Overview of Hacking History—Drop a few of the big names and people who started it all in a short outline of what hackers are and where they come from. Name some big time exploits and hacking stories to make it interesting.
  9. Create an SMS Bomber with the Gvoice API—Teach users how to code a SMS spammer/bomber in Python. Bonus points if you make it threaded. You can use libraries, but a tip of my hat to those who don't.
  10. A Simple Port Scanner in Python—Educate the forum on how to create a port scanner in the Python programming language. You should teach the concepts behind port scanning before you get into the code portion of it. If you add SYN stealth scanning to it, you're extra cool.
  11. How to Remove Windows Viruses with Linux (Mr F)—Make a tutorial on how to use clamav to remove Windows viruses using Linux. You should explain why we would use this and what situations that this would be helpful in.
  12. How to Create an Image Uploader in Python—Teach the community how to make a command line image uploader in Python using the Imgur API.
  13. How to Make a Cantenna—Make a hands-on guide on how to make the infamous cantenna, which is a high-gain Wi-Fi antenna made from a few house-hold supplies—namely, a Pringles can.

Just updated your iPhone? You'll find new features for Podcasts, News, Books, and TV, as well as important security improvements and fresh wallpapers. Find out what's new and changed on your iPhone with the iOS 17.5 update.

Image via charlesayoub


I call the Cantenna! ive already made a bunch of variations :D

I guess I can do the question one, and I'll do one on how to pick the right linux distro for you.

The USB Hacksaw seems interesting, but 1: is it already claimed? (it says Mr F next to it) and 2: can I get a few more details? Would it involve making a spider (to crawl through directories searching for the files) or would it copy files from a specific place? Also, I assume that it would be impractical (time and memory) to copy the entire hard drive.
I have an epic idea for one (as soon as I can get back to my laptop, I've been traveling with my iPad all weekend) in which it is basically a program that stays hidden, registering random key presses and mouse movements. (alt-f4, ctrl-alt-del, etc.)

Me and Chris are doing the hacksaw. Just to clarify the hacksaw script Im currently working on is two-pronged. 1 - It will scan for password databases from google chrome, firefox, safari (not researched this particular db yet) and possibly opera. Since those are plaintext effectively. 2 - It will get all user info for the account and MAYBE if my brain does'nt fail me will return the password hash for windows. I'm not quite sure on how to approach that one yet. I personally see no reason to let it crawl through every directory as it is too time consuming and you will probably get away with nothing. Specific targeting is - i think - the best approach here. Get in, get what I specified, get out. ;P

To be honest, I'd rather do the one about pissing people off in windows and get a script that will actually work for the hacksaw.

"get a script that will actually work for the hacksaw." - And what do you learn in the process of taking someone's script and pasting it into your program? You would gain no understanding of how it works, what it does etc... That's basically bypassing the whole point of this website - To learn something.

If we all wrote articles based on ripped off stuff from other websites this blog would be a re-hash of every other website on the web. Granted I can just slap a piece of code into a blog post, bypassing all explanations and tips and just say - open python, paste this in, run. :)

Don't worry, you stick around here for a bit, and we shall hold your head beneath the putrid waters of wisdom, for your own benefit of course. :D

well said! as a monk once said, "I do not fear the man who has practised a thousand kicks once, but I fear a man who has practised one kick, a thousand times"

Share Your Thoughts

  • Hot
  • Latest