The reason why I ask this question is for another source for understanding. I've read through OTW's articles and threads many, many times. However, I'm finding it challenging to successfully engage a node here at the home network. All computers are running windows 7 or windows 8.1 with ALL updates from the OS, and software as well. So I'm finding it very challenging to hack one of my nodes. Any help or suggestions for other ways to go about it? Maybe, manually install meterpreter on their...
I am using Ubuntu 13.10 Saucy Salamander and I want to do some hacking. I'm thinking is it worth to install Backtrack or customize Ubuntu to be like Backtrack?
Now that a new year is here, I thought it would be a good time to give all my novice hackers a heads-up on what to expect in 2014 on Null Byte. We just began to scratch the surface of the art and science of hacking in 2013, and now we will delve a bit deeper this year to advance your hacking skills toward your ultimate goal of becoming a professional hacker!
Is there any (hopefully easy) way to figure out the AV used by target if they are behind a NAT device? I was having troubles scanning them with nmap/xprobe2.
Let's just say it's been a pretty bad year for spies and government agencies and an even worse one for the privacy of U.S. citizens. Edward Snowden blew the lid off the NSA's spy program, and the FBI was recently discovered to have the ability to access your webcam any time they want—without triggering the "camera on" light. Yeah, that means those Justin Bieber lip sync videos you recorded weren't just for your private collection.
This past year's (2013) DefCon featured a demonstration of a relatively new type of hacking, the automobile hack. As automobiles become more and more high tech, they include more and more microprocessors and software. In recent years, we have developed autos that park themselves, autos that detect and avert crashes and very soon, automobiles that drive themselves. Each of these developments requires microprocessors and software and therefore opens up new avenues for the hacking of the...
Several of you have written asking me questions regarding the best hacking platform. Should you use a USB flash drive, a DVD, a Virtual Machine or a dual boot system?
When software companies publish or manufacture a defective product, the losses from a security breach resulting from that defective product can reach the millions of $US, and in rare cases, billions of dollars. Presently, the purchaser/consumer of that product bears the entire burden of those losses. This means that if Microsoft turns out a defective Internet Explorer (IE) that is then exploited to steal your bank account, the loss in borne by you and you have no recourse for compensation from...
hey guys whats up ? hmm i hope you got the title :D today i am going to show you how can you change the MAC address in windows.. its very easy just 123 and done :) Just follow me and you'll get it ;).
Hey guys sup ? i hope you all are fine so as you can the read the title today i'll try tell you that how can you make your WordPress secured from hackers.
hey guys whats up ? you may be heard of MAC address and this time , i am going to show you how to change MAC address in Backtrack :p its very easy just a game of 2 commands and game over :P
Hey guys whats up ? today i am going to teach you the dual boot installation of Backtrack5 Gnome 32 Bit Release 3. Don't get scared by the title its very easy to do. Just follow me and see how we are going to make dual boot installation..
In this short How-to I'll tell you how to make your WordPress blog more secure.by doing this no one will be able to see your WordPress database config. It is very important to secure the Database Config
Hi all,I'm beginner but i need learn how to hack server and get key from database.I haven't enough time to learn too hard, so can you tell me ?I have 32h from now.help me. Tks all for reading.
Welcome back My sleepless army of young hackers,Everyone uses internet, right? So for this tutorial, i'll start with the basics and slowly we'll get to the UPD Protocol.
I used to post regularly but since my Linux crashed somehow (probably did something wrong installing incompatible packages), well... all my projects i was working on were so much delayed that i decided to quit on them. But that´s about to change!
Hello, I have an NTLM hash from my Windows 7 computer. I created the account myself as a test. I know the password. I can load this hash into Cain, then load this test wordlist http://www.rainbowtables.net/tutorials/Cain_Sampl_Dictionary.txt with the correct password that I know appended at the end of the test list. I then run the dictionary attack and it is successful. Now, I create a custom wordlist myself in Notepad and I insert the known password and the dictionary attack fails every time....
We've entered a new era in the history of human-kind in the last decade. Almost from the beginning of time, wars have been fought with physical violence meaning spears, knives, arrows, bullets, bombs and attack helicopters. Now, wars can be fought with a single computer. If an aggressor nation or rebel movement can attack and shutdown another nation's electrical grid, water system, sewer system and communications, they won't last very long in a war.
Many in the security industry (including yours truly) estimate that over 1/3 of all home computers are infected with bots and are part of a botnet. This enables someone to remotely control and use that system for good or ill. If these estimates are correct, over 100 million computers in the U.S. are part of some botnet. Sometimes these bots are used for spam, DDoS attacks, password cracking, proxying attacks, etc.
In this digital era of cyber crime, cyber attacks, and cyber warfare, the warrior of the future will be a cyber warrior. No longer will nations fight wars with guns, bullets, bombs and soldiers, but rather with computers and hacks.
Many people believe that hacking is a simple process. Someone hands you a silver bullet and you own the system! That is far from the truth. Hacking is a slow, methodical and sometimes tedious process. You have to do your "homework" to be successful.
If you are reading this , you too probably aspire to become a hacker. That's good. Hacking is rapidly becoming one of the most sought after skill sets by IT security firms, pentesters, militaries, spy and espionage organizations, and military contractors. Right now, most of these organizations cannot get enough well-trained hackers, so now is a great time to train as a hacker. That having been said, let's take a moment to look at what makes a good hacker.
One of the biggest problems in data security is authentication of data and its source. How can Alice be certain that the executable in her inbox is from the venerable Bob, and not from the not-so-venerable Oscar? Clearly Alice wants to know because if this file is actually sent to her by Oscar, the file might not be a game, but a trojan that can do anything on her computer such as sift through her email and passwords, upload her honeymoon pictures, or even turn on microphones and webcams. This...
My previous post below-and not trying to flame here-but did not see many points of view on this issue. Given that I am not up to other pen testers levels I went to the web and the links below seem to suggest that you can do this--Which gets back to original question--REALLY! If someone has tried these on their own account, and its worked-I would like to see the step by step- as it still seem like the auto default is for captcha to intervene? Again for hypothetical and for educational purposes...
Those of you who are fans of the Showtime TV show Homeland remember the episode last season when the main character, Nicholas Brody, had the pacemaker of the Vice President hacked. He chose this method of assassinating a man he felt deserved it, while leaving no trace of his involvement.
So far, I have now done eleven (11) tutorials on Linux Basics for Aspiring Hackers. Most of you seem to appreciate them. As I consider what areas of Linux to cover in future tutorials, I thought I would throw it out to the members of Null Byte to give me some direction. What skills would you like me to cover in upcoming tutorials?
I am sure this is being monitored -So for conversation sake/hypothetical free speech and educational purposes only . Basically looking for the steps to remain unidentifiable as mush as possible. A step by step guide with backedup information that can show that a computer / laptop gives off this information when connecting to the internet and what to do to avoid such.? For the paranoid--do we know that Intel or AMD,or other parts of the machine are not encoding their chips / equiptment to give...
After reading and as well trying stuff from Null Byte for some while, I thought of getting some literature on "Hacking" to expand my knowledge. After a short research on Amazon I became aware of the variety of books about IT Security and Hacking.
Hi OTW. I am following the steps you mentioned in that MS Word trojan tutorial:https://null-byte.wonderhowto.com/how-to/hack-like-pro-exploit-ms-word-embed-listener-your-roommates-computer-0140868/
I don't know if anyone can help me here, but if not, can someone please point me to a site that can? my computer keeps blue screening. this is what it gives me: