Everything Else
News: Anyone Else Likes TDoS?
Here on nullbyte we always hear mention of hacking being used to shut down power grids or attacking SCADA and other such cyber warlord activities, but ive never seen a TDos post come up.
News: What REALLY Happened with the Juniper Networks Hack?
Last month, it was revealed that Juniper Networks' routers/firewalls were hacked. It was reported that a backdoor was implanted in the operating system of their routers/firewalls and that attackers could listen in on all encrypted communication. There are now fears that all confidential communications by U.S. government agencies and officials could have been compromised over the last three years.
News: Encryption Is Not Enough !, Research & Conclusion (Part 1)
Hello World ! Well, welcome in my post. This will be in series, and this is first part. Throughout the series, I will share my research and findings with you. And that will be on topic, Encryption Is Not Enough. We will see, how Encryption is broken & what countermeasures should be implemented to secure it. Let's begin, Why do we encrypt ?
News: Let's Contribute That Project!
Hi, At the beginning - I am NOT an Author of that github work, but I found it on the Internet. As you see programmers are encouraged to develop it. It's written in python. You can read a lot of great tutorials here about that language, so lets do something creative. I'm also planning to add my three words, I am ready to cooperate.
SPLOIT: What to Expect in the Journey as Hackers
Greetings my fellow aspiring hackers, It's still Christmas and we have a lot of things and hugs and kisses and ... to share ( you know the things that you do ). I have never done this before but I just felt to encourage you on the quest for knowledge, security and defence, skills and a whole lot more that comes out as a result of pursuing hacking. What we mean by hacking on this forum is White hat Hacking and OTW has great articles on it and I don't need to explain myself on that one.
News: Pushing the First Null Byte Suite Update!
Hello everyone. As many of you know, we've successfully launched the Null Byte Suite for our wonderful community. In addition to the prepackaged tools, there is a dedicated GitHub repository where tools submitted by the community will be pushed to for distribution in the suite. There have only been a couple submissions, and out of them, only one fit the requirements. So, out of anticipation, we've added it to the suite!
News: What Is a White Hat Hacker?
In recent weeks, some people have been shunned from the Null Byte community because they expressed "black hat" aspirations. This is because Null Byte is the "white hat" hacker training/playground. Although most of us think we know what that means, it does beg the question; "Who and what is a white hat hacker?"
News: Announcing the Null Byte Suite!
Hello, everyone. If you've been following my recent articles, you'll know that I've been rather busy lately working on a project, a rather large one. I've been working with Pheonix750 and Ciuffy to build the Null Byte suite of tools! I got the green light from our admin a while ago, and we've been developing like mad ever since! I'm very excited to launch this project. So, let's start by explaining what it is...
News: You've Been Hacked
Greetings null-bytians. Firstly, I would like to apologize for the no images thing. I guess I can't upload them.
News: 9 Notorious Hackers
I found this article a while back and I found it underneath a bunch of junk. Anyway, it's a article on 9 notorious hacker including Walter O'Brien (You know the T.V. show Scorpion? Well that's him). Not to mention the weird names:
TypoGuy Explaining Anonymity: Who Is Anonymous?
Continuing this series, I am now moving on to the section, 'Anonymous'. Hope you are looking forward to read this.
News: Hackers and Their World
I was bored when I found this piece of literature: ==Phrack Inc.==
News: IT Security Model
Hi fellows! I finally decided to join this forum, which I find very interesting and has some great contributions into the tech and security space, appreciate it!
News: Anonymous vs ISIS
As you all know, Anonymous have declared cyber war on ISIS and have already proven what they are capable of and whats to come.
News: My Name Is Towy.
Hi guys, my name is Towy. I joined this community two weeks ago and I though that I should introduce myself.
News: Kaspersky Offs Two Ransomware Strains
According to security firm Kaspersky Lab, CoinVault and Bitcryptor ransomware are officially dead.
News: A History of Aglorithms, Cryptography and How They Relate to Online Security.
Fascinating, although admittedly highbrow, discussion on the history of cryptography from the BBC. If you are outside of the UK and don't know how to access BBC content you need to spend a bit more time browsing the Null-Byte forums ;-) http://www.bbc.co.uk/programmes/b06mtms8
News: Signal - the Encryption App That Keeps NSA & Governments Away!
Want the next level security? Well then take a read here because this is some next level stuff. Heard of It?
News: Hackers Claim 1$ Million Bounty for Security Flaw in iOS 9
Hackers are claiming money for a security flaw in Apple's new update. Quick Summary:
News: Inside Bitcoin - Part 2 - Cryptographic Hashes
If you haven't read the last article, feel free to stop by and give it a read, but abstaining from reading it will not, for the most part, be detrimental to your understanding.
News: Jobs & Salaries in Cyber Security Are Exploding!
In an article published in early-2015 by Peninsula Press, it was reported that the demand and the salaries for cyber security professionals are exploding! They cite that 209,000 cyber security jobs were unfilled last year, and that job postings have increased over 74% in the last 5 years. Job opening are expected to grow by another 53% over the next 3 years. You are definitely in the right field, my tenderfoot hackers! Some researchers are expecting information security jobs to continue to gr...
News: Islamic State (ISIS) Attacks U.S. Power Grid!
Those of you who have been a part of the Null Byte community for even a short while know that I sincerely and firmly believe that hacking is the most important skill set of the future.
News: Let Me Introduce Myself
Hi everyone This is something that I should've done the first day but hey...better later than never right?
Link: DNSteal v2.0
I found that interesting for a first share :) Description from the author:
News: The Pursuit of Knowledge
Well, here we are. We've come a long way, we really have. Watching this community grow has been amazing. Well, before I start babbling on about the community, let me get to the point...
News: A New Branch in My Career.
When I started to go to this site I found it fascinating and found myself coming here all day I have used a lot of the info I have gotten from here in my professional career and on my own. I currently am the VP of RND for a small IT company. I have been pushing toward Penetration Testing as a service for our clients and future clients. For the past 10 years here it has been a very long uphill battle and have hit a lot of road blocks. So I decided to work on this on my own of course as soon as...
News: How to Study for the White Hat Hacker Associate Certification (CWA)
Since I first announced the new Null Byte recognition for excellence a few weeks ago, several of you have written me asking, "How can I study for this certification exam, and what material will be covered on the exam?" Now I have an answer for you. The White Hat Hacker Associate (CWA) will cover 14 domains or areas. Everything you need to know is here on Null Byte. There will be no questions that are not covered here on this site, guaranteed.
News: New Pyxiewps Version Is Out.
Helo my dear friends! A few days ago, I shared with this community my wrapper-script (a wrapper is a program that joins other programs that do the real job) to automatize the attacks on Pixie-Dust vulnerable routers. I was recieving complains from non-Kali users that had problems trying to launch the program, so I decided to make a good installer so anybody can use it in any DEB based distro.
News: The Cruel Crypto Game; How to Beat CryptoLocker Ransomware
It always looks different when it's not about you. The Internet is our world's Alterego. Those many bits don't really make sense unless we want them to be valuable, to mean something.
News: Codewars
I've been frequenting this website I recently found out about called Codewars.com. It's pretty neat! In order to sign up, you need to pass a few simple coding tests and then you can start taking on the challenges, which they call kata. Basically, you are given a task and have to write a function that completes the given task and have to test it out on a bunch of test cases they give you. Once you pass the test cases, you can submit it and gain reputation points. It seems like a really good wa...
News: Just A Message
It's been a while, since I have just started High School. I have put a hiatus to my pentesting for a few weeks, and now, I am making a return. I have taken time to read about code, (even did a research article analysis on how humans can write "beautiful" code and something like that) and pentesting, but never made a full return. I will be occasionally coming back for a while.
News: Jailbreaking iOS 9
As many of you may have heard, Apple's new iOS 9 is "rootless", which supposedly would make jailbreaking much more difficult. However, it has been shown to be possible. ih8sn0w posted a youtube video of his jailbroken iphone running iOS 9 and even gave some hints about it in the video description section. However, he also stated that he will NOT be releasing it to the public. So it would be quite the feat and adventure to take his hints and comments and use that to figure out how to jailbreak...
News: Xcode Ghost
I just came across an article on Reddit about some iOS malware called XcodeGhost that has affected many apps in Apple's Chinese App Store. After reading more about it, I thought it was pretty incredible how the attackers had pulled this off. As the name might imply, the malware was not loaded onto iOS devices because the iOS devices were directly hacked, but rather it was the Xcode versions used by the developers of legitimate apps that were hacked! Basically, some devs were using hacked Xcod...
News: Is an Unhackable Kernel Really Possible?
In an effort to prevent drones from being hacked, DARPA has been developing an "unhackable system," and seems to think they're almost there. The development team "proved" mathematically that their kernel was unhackable, and they hope to use it for more than just drones (power grids, cars, phones, pacemakers, etc.).
News: The Biometric Authentication Conundrum
Computer system authentication is critical to keeping systems safe from unwanted users, intruders, and abusers. Basically, authentication is the process of the potential user proving they are an authorized user.
News: How to Better Your English (For Foreign Speakers)
Hello! I'm newbie at Null Byte and I want tho share some of my thoughts with you guys, hope you like it. I've been inspired by 3 facts for making this: 1- The post 'How to write better code', 2- A few illegible comments at some posts, 3- I myself have never written such a long text in English, this will be my first one!
News: Interesting TV Show on State Surveillance Powers
A cool show aired in the UK on Channel 4 last night where a number of ordinary subjects (note: we are not citizens!) had to disappear for 28 days whilst being pursued by professional hunters using the powers available to the State. Well worth a watch. http://www.channel4.com/programmes/hunted/on-demand/60136-001
News: The Consequences of Hacking
Mostly all hackers like to have a laugh. We like to have fun! We like to troll. And maybe, even cause some havoc once in a while. But, while we do this, we must always stay in the line of the law.
News: Social Engineering for the hell of it.
I've recently been on holiday in Europe, staying in a hotel that was part of a big chain that included many in the local area. A quick review of the wi-fi within range of my room showed that there was another in the chain that was in range of my Yagi Turbotenna, which naturally got me thinking. If I wanted an anonymous internet connection, this could be quite handy.