These days I found a very beautifull python script that just prints the google chrome usernames and passwords that are stored on your machine.
This Is for the Script Kiddies: This tutorial is about a script written for the How to Conduct a Simple Man-in-the-Middle Attack written by the one and only OTW.
So I was searching up on AV evasion and found some really informative links that I thought was worth sharing.The links originally came from this Rapid7 forum thread.
The title might not be in harmony with the post, but thinking a good title that perfectly matches your post... isn't that easy. Especially for this post.
infosecinstitute posted a handy article about what to expect in the new year for cyber security, along with highlighting major game changers from 2015; 2016 Cyber Security Predictions: From Extortion to Nation-state Attacks - InfoSec Resources.
Before I start. This Collection is for educational purposes only and I am not the author of the Contents.
Here on nullbyte we always hear mention of hacking being used to shut down power grids or attacking SCADA and other such cyber warlord activities, but ive never seen a TDos post come up.
Last month, it was revealed that Juniper Networks' routers/firewalls were hacked. It was reported that a backdoor was implanted in the operating system of their routers/firewalls and that attackers could listen in on all encrypted communication. There are now fears that all confidential communications by U.S. government agencies and officials could have been compromised over the last three years.
Hello World ! Well, welcome in my post. This will be in series, and this is first part. Throughout the series, I will share my research and findings with you. And that will be on topic, Encryption Is Not Enough. We will see, how Encryption is broken & what countermeasures should be implemented to secure it. Let's begin, Why do we encrypt ?
Hi, At the beginning - I am NOT an Author of that github work, but I found it on the Internet. As you see programmers are encouraged to develop it. It's written in python. You can read a lot of great tutorials here about that language, so lets do something creative. I'm also planning to add my three words, I am ready to cooperate.
Greetings my fellow aspiring hackers, It's still Christmas and we have a lot of things and hugs and kisses and ... to share ( you know the things that you do ). I have never done this before but I just felt to encourage you on the quest for knowledge, security and defence, skills and a whole lot more that comes out as a result of pursuing hacking. What we mean by hacking on this forum is White hat Hacking and OTW has great articles on it and I don't need to explain myself on that one.
Hello Strangers, This is my first article for null-byte and its about staying anonymous on the Internet. But the question is why would you want to stay anonymous online?
Hello everyone. As many of you know, we've successfully launched the Null Byte Suite for our wonderful community. In addition to the prepackaged tools, there is a dedicated GitHub repository where tools submitted by the community will be pushed to for distribution in the suite. There have only been a couple submissions, and out of them, only one fit the requirements. So, out of anticipation, we've added it to the suite!
In recent weeks, some people have been shunned from the Null Byte community because they expressed "black hat" aspirations. This is because Null Byte is the "white hat" hacker training/playground. Although most of us think we know what that means, it does beg the question; "Who and what is a white hat hacker?"
Hello, everyone. If you've been following my recent articles, you'll know that I've been rather busy lately working on a project, a rather large one. I've been working with Pheonix750 and Ciuffy to build the Null Byte suite of tools! I got the green light from our admin a while ago, and we've been developing like mad ever since! I'm very excited to launch this project. So, let's start by explaining what it is...
Greetings null-bytians. Firstly, I would like to apologize for the no images thing. I guess I can't upload them.
I found this article a while back and I found it underneath a bunch of junk. Anyway, it's a article on 9 notorious hacker including Walter O'Brien (You know the T.V. show Scorpion? Well that's him). Not to mention the weird names:
Continuing this series, I am now moving on to the section, 'Anonymous'. Hope you are looking forward to read this.
Hello All, So to recap in part 1 I went through setting up the dchp server. Part 2 detailed the bash script. Now in part 3 I will post the entire bash script. I am doing this in its own post because Part 2 is just way to much info on one post IMO.
I was bored when I found this piece of literature: ==Phrack Inc.==
Hi fellows! I finally decided to join this forum, which I find very interesting and has some great contributions into the tech and security space, appreciate it!
As you all know, Anonymous have declared cyber war on ISIS and have already proven what they are capable of and whats to come.
Hi guys, my name is Towy. I joined this community two weeks ago and I though that I should introduce myself.
According to security firm Kaspersky Lab, CoinVault and Bitcryptor ransomware are officially dead.
Recently the newly famous ProtonMail service was under attack by DDoS attack. This attack was believed to be the hacking group Armada Collective.
Fascinating, although admittedly highbrow, discussion on the history of cryptography from the BBC. If you are outside of the UK and don't know how to access BBC content you need to spend a bit more time browsing the Null-Byte forums ;-) http://www.bbc.co.uk/programmes/b06mtms8
Want the next level security? Well then take a read here because this is some next level stuff. Heard of It?
Hackers are claiming money for a security flaw in Apple's new update. Quick Summary:
If you haven't read the last article, feel free to stop by and give it a read, but abstaining from reading it will not, for the most part, be detrimental to your understanding.
In an article published in early-2015 by Peninsula Press, it was reported that the demand and the salaries for cyber security professionals are exploding! They cite that 209,000 cyber security jobs were unfilled last year, and that job postings have increased over 74% in the last 5 years. Job opening are expected to grow by another 53% over the next 3 years. You are definitely in the right field, my tenderfoot hackers! Some researchers are expecting information security jobs to continue to gr...
Those of you who have been a part of the Null Byte community for even a short while know that I sincerely and firmly believe that hacking is the most important skill set of the future.
Hi everyone This is something that I should've done the first day but hey...better later than never right?
I found that interesting for a first share :) Description from the author:
Well, here we are. We've come a long way, we really have. Watching this community grow has been amazing. Well, before I start babbling on about the community, let me get to the point...
Hi Guys, I just decided to throw this out here for anyone who might not be familiar with the utility or would like to do some reading on it.
When I started to go to this site I found it fascinating and found myself coming here all day I have used a lot of the info I have gotten from here in my professional career and on my own. I currently am the VP of RND for a small IT company. I have been pushing toward Penetration Testing as a service for our clients and future clients. For the past 10 years here it has been a very long uphill battle and have hit a lot of road blocks. So I decided to work on this on my own of course as soon as...
Since I first announced the new Null Byte recognition for excellence a few weeks ago, several of you have written me asking, "How can I study for this certification exam, and what material will be covered on the exam?" Now I have an answer for you. The White Hat Hacker Associate (CWA) will cover 14 domains or areas. Everything you need to know is here on Null Byte. There will be no questions that are not covered here on this site, guaranteed.
Helo my dear friends! A few days ago, I shared with this community my wrapper-script (a wrapper is a program that joins other programs that do the real job) to automatize the attacks on Pixie-Dust vulnerable routers. I was recieving complains from non-Kali users that had problems trying to launch the program, so I decided to make a good installer so anybody can use it in any DEB based distro.
Hello Null-Byte community. First off: this my first post here on Null-Byte. Some of you may have already seen me in the comment section, to all others: Hi, I'm the new guy.