Everything Else
News: Remote Chrome Password Stealer
These days I found a very beautifull python script that just prints the google chrome usernames and passwords that are stored on your machine.
News: Simple Man-in-the-Middle Script: For Script Kiddies
This Is for the Script Kiddies: This tutorial is about a script written for the How to Conduct a Simple Man-in-the-Middle Attack written by the one and only OTW.
News: Some Great Articles on Evading AV Software
So I was searching up on AV evasion and found some really informative links that I thought was worth sharing.The links originally came from this Rapid7 forum thread.
Windows 10 : Against Privacy
The title might not be in harmony with the post, but thinking a good title that perfectly matches your post... isn't that easy. Especially for this post.
News: Predictions for the New Year
infosecinstitute posted a handy article about what to expect in the new year for cyber security, along with highlighting major game changers from 2015; 2016 Cyber Security Predictions: From Extortion to Nation-state Attacks - InfoSec Resources.
News: Collection of Spreading Tutorials
Before I start. This Collection is for educational purposes only and I am not the author of the Contents.
News: Anyone Else Likes TDoS?
Here on nullbyte we always hear mention of hacking being used to shut down power grids or attacking SCADA and other such cyber warlord activities, but ive never seen a TDos post come up.
News: What REALLY Happened with the Juniper Networks Hack?
Last month, it was revealed that Juniper Networks' routers/firewalls were hacked. It was reported that a backdoor was implanted in the operating system of their routers/firewalls and that attackers could listen in on all encrypted communication. There are now fears that all confidential communications by U.S. government agencies and officials could have been compromised over the last three years.
News: Encryption Is Not Enough !, Research & Conclusion (Part 1)
Hello World ! Well, welcome in my post. This will be in series, and this is first part. Throughout the series, I will share my research and findings with you. And that will be on topic, Encryption Is Not Enough. We will see, how Encryption is broken & what countermeasures should be implemented to secure it. Let's begin, Why do we encrypt ?
News: Let's Contribute That Project!
Hi, At the beginning - I am NOT an Author of that github work, but I found it on the Internet. As you see programmers are encouraged to develop it. It's written in python. You can read a lot of great tutorials here about that language, so lets do something creative. I'm also planning to add my three words, I am ready to cooperate.
SPLOIT: What to Expect in the Journey as Hackers
Greetings my fellow aspiring hackers, It's still Christmas and we have a lot of things and hugs and kisses and ... to share ( you know the things that you do ). I have never done this before but I just felt to encourage you on the quest for knowledge, security and defence, skills and a whole lot more that comes out as a result of pursuing hacking. What we mean by hacking on this forum is White hat Hacking and OTW has great articles on it and I don't need to explain myself on that one.
News: Reality of VPNs, Proxies, and Tor
Hello Strangers, This is my first article for null-byte and its about staying anonymous on the Internet. But the question is why would you want to stay anonymous online?
News: Pushing the First Null Byte Suite Update!
Hello everyone. As many of you know, we've successfully launched the Null Byte Suite for our wonderful community. In addition to the prepackaged tools, there is a dedicated GitHub repository where tools submitted by the community will be pushed to for distribution in the suite. There have only been a couple submissions, and out of them, only one fit the requirements. So, out of anticipation, we've added it to the suite!
News: What Is a White Hat Hacker?
In recent weeks, some people have been shunned from the Null Byte community because they expressed "black hat" aspirations. This is because Null Byte is the "white hat" hacker training/playground. Although most of us think we know what that means, it does beg the question; "Who and what is a white hat hacker?"
News: Announcing the Null Byte Suite!
Hello, everyone. If you've been following my recent articles, you'll know that I've been rather busy lately working on a project, a rather large one. I've been working with Pheonix750 and Ciuffy to build the Null Byte suite of tools! I got the green light from our admin a while ago, and we've been developing like mad ever since! I'm very excited to launch this project. So, let's start by explaining what it is...
News: You've Been Hacked
Greetings null-bytians. Firstly, I would like to apologize for the no images thing. I guess I can't upload them.
News: 9 Notorious Hackers
I found this article a while back and I found it underneath a bunch of junk. Anyway, it's a article on 9 notorious hacker including Walter O'Brien (You know the T.V. show Scorpion? Well that's him). Not to mention the weird names:
TypoGuy Explaining Anonymity: Who Is Anonymous?
Continuing this series, I am now moving on to the section, 'Anonymous'. Hope you are looking forward to read this.
News: Evil Twin(Part 3) - the Full Bash Script
Hello All, So to recap in part 1 I went through setting up the dchp server. Part 2 detailed the bash script. Now in part 3 I will post the entire bash script. I am doing this in its own post because Part 2 is just way to much info on one post IMO.
News: Hackers and Their World
I was bored when I found this piece of literature: ==Phrack Inc.==
News: IT Security Model
Hi fellows! I finally decided to join this forum, which I find very interesting and has some great contributions into the tech and security space, appreciate it!
News: Anonymous vs ISIS
As you all know, Anonymous have declared cyber war on ISIS and have already proven what they are capable of and whats to come.
News: My Name Is Towy.
Hi guys, my name is Towy. I joined this community two weeks ago and I though that I should introduce myself.
News: Kaspersky Offs Two Ransomware Strains
According to security firm Kaspersky Lab, CoinVault and Bitcryptor ransomware are officially dead.
News: ProntonMail under DDoS Attack
Recently the newly famous ProtonMail service was under attack by DDoS attack. This attack was believed to be the hacking group Armada Collective.
News: A History of Aglorithms, Cryptography and How They Relate to Online Security.
Fascinating, although admittedly highbrow, discussion on the history of cryptography from the BBC. If you are outside of the UK and don't know how to access BBC content you need to spend a bit more time browsing the Null-Byte forums ;-) http://www.bbc.co.uk/programmes/b06mtms8
News: Signal - the Encryption App That Keeps NSA & Governments Away!
Want the next level security? Well then take a read here because this is some next level stuff. Heard of It?
News: Hackers Claim 1$ Million Bounty for Security Flaw in iOS 9
Hackers are claiming money for a security flaw in Apple's new update. Quick Summary:
News: Inside Bitcoin - Part 2 - Cryptographic Hashes
If you haven't read the last article, feel free to stop by and give it a read, but abstaining from reading it will not, for the most part, be detrimental to your understanding.
News: Jobs & Salaries in Cyber Security Are Exploding!
In an article published in early-2015 by Peninsula Press, it was reported that the demand and the salaries for cyber security professionals are exploding! They cite that 209,000 cyber security jobs were unfilled last year, and that job postings have increased over 74% in the last 5 years. Job opening are expected to grow by another 53% over the next 3 years. You are definitely in the right field, my tenderfoot hackers! Some researchers are expecting information security jobs to continue to gr...
News: Islamic State (ISIS) Attacks U.S. Power Grid!
Those of you who have been a part of the Null Byte community for even a short while know that I sincerely and firmly believe that hacking is the most important skill set of the future.
News: Let Me Introduce Myself
Hi everyone This is something that I should've done the first day but hey...better later than never right?
Link: DNSteal v2.0
I found that interesting for a first share :) Description from the author:
News: The Pursuit of Knowledge
Well, here we are. We've come a long way, we really have. Watching this community grow has been amazing. Well, before I start babbling on about the community, let me get to the point...
News: Kon Boot for Bypassing Windows Logon Screen
Hi Guys, I just decided to throw this out here for anyone who might not be familiar with the utility or would like to do some reading on it.
News: A New Branch in My Career.
When I started to go to this site I found it fascinating and found myself coming here all day I have used a lot of the info I have gotten from here in my professional career and on my own. I currently am the VP of RND for a small IT company. I have been pushing toward Penetration Testing as a service for our clients and future clients. For the past 10 years here it has been a very long uphill battle and have hit a lot of road blocks. So I decided to work on this on my own of course as soon as...
News: How to Study for the White Hat Hacker Associate Certification (CWA)
Since I first announced the new Null Byte recognition for excellence a few weeks ago, several of you have written me asking, "How can I study for this certification exam, and what material will be covered on the exam?" Now I have an answer for you. The White Hat Hacker Associate (CWA) will cover 14 domains or areas. Everything you need to know is here on Null Byte. There will be no questions that are not covered here on this site, guaranteed.
News: New Pyxiewps Version Is Out.
Helo my dear friends! A few days ago, I shared with this community my wrapper-script (a wrapper is a program that joins other programs that do the real job) to automatize the attacks on Pixie-Dust vulnerable routers. I was recieving complains from non-Kali users that had problems trying to launch the program, so I decided to make a good installer so anybody can use it in any DEB based distro.
News: Test Your Hacking / Exploiting Skills with SmashTheStack!
Hello Null-Byte community. First off: this my first post here on Null-Byte. Some of you may have already seen me in the comment section, to all others: Hi, I'm the new guy.