So just wanted to start off by saying, I'm new to the site and to the world of computer networking. I've took a couple of computer programming classes but don"t remember a whole lot( to much smoking weed). So long story short I managed to install kali linux on a 16 gb usb stick. I ran it on my desktop and worked perfectly. I tried it on my surface pro next and it wouldn't run. I tried booting it from when the surface is off, and i tried booting it from advanced recovery. I'm totally stuck now...
If I where to program a bot in python and I make a installer or executable will it still run on a windows computer that doesn't have python installed on it??
hello everyone . I've just installed WINDOWS 7 french version . but whenever i'm trying to compromise that machine , i'm never connecting to the target . so i'm wondering is it because most of the exploits are made for windows 7 english ?
Welcome back! In our last training session we covered classes and how OOP can make programming/scripting easier. Today we'll be taking a breather and covering something fairly simple, bitwise operators.
Hello fellas i'm wondering how everyone from you decide to start with kali linux ... what was the thing that motivate you ? :) it will be interesting to see !
I see a lot of posts basically asking for handouts when it come to hacking, the community fortunately down votes these most of the time. My advice for newcomers to the hacking world, don't ask for handouts. Try your hardest, you need put as much effort into hacking as you can. If we give you handouts on everything, it won't teach you anything. You can't teach anyone else anything. Understand how to fail is step one in understanding how to succeed. Rant over.
Hi, is there a way to brute force facebook or gmail (or a no lock out login) for example, using the power of gpus, not only by the cpu, just like offline brute forcing ?
I am using mitmf in kali linux 2.0(sana). it works in IE browser. but when i tested the mitmf in mozilla firefox it works fine with google.com and gmail.com but not with facebook.com.what may be the cause ?
Someone in India Built my website. I Need Errors on It Fixed/Edited. The Person in India Will Not Respond to My Email Requests to Fix the Issues. Is There a Way to Get the Information on Website So That I Can Pay Someone Else to Fix These Issues and Reclaim My Website That Is Being Held Hostage? Thanks.
I have been reading here on Null Byte for a while now and I will admit I am as green as a greenhorn can be. I only recently started using Linux and had to find my way around a command line interface using YouTube tutorials and many texts here on NB. I started playing HackNet awhile ago and totally loved it! I know it over simplified by a lot but did get my interests up even more. See this post as my personal introduction to the NB community; dlagel says HI!
At First i am apologizing for give you link.This is not my tutorial and i am no promoting any website. i thought we should know how to Hack True Identity of Tor.I have found a tutorial here,if you are interested you can see this or if someone know better than make a tutorial on it.Or anyone can copy and paste from this link and make a tutorial, i don't want credit, knowledge is free.............http://fossbytes.com/tor-honeypot-how-to-hack-the-true-identity-of-tor-users/
So if you have used windows without an AV (Anti Virus) program running you all probably know how easy it is to get a virus and have everything from fake advertisements to having your stuff be destroyed... So I want to talk a little about downloads. Honestly the most safest way to download stuff is by using linux witch most linux distros have built in package managers (such as apt-get or pacman) but git is also half safe in my opinion. Just tell me what you guys think!
So, you want to perform an exploit on a victim, but you're not on the same network as their machine. In this tutorial, I'll be showing you how to set up a meterpreter reverse_tcp attack to work over the internet.
So yeah, he is pretty much making fun of me for trying to learn hacking, and we are on the same network, can i do it remotely? i have Kali Linux on a laptop with a fully working internet connection.
So yeah. Its AugustFackYou and I felt like posting today and being an active member of the community. After reading this please tell me if you have any comments on what I can do better or if this method is bad. Anyway today I will be showing you how to get root on a mac. I managed to become an administrator at my school with this and one other method.
I decided to document my recent encounter with a very interesting virus that I found. Beware, this post lacks the juicy screenshot proof that you may be here to look for. When I realized what this malware was doing I went on a crazy rampage to get it out of my system so the following screenshots are not real but are an accurate depiction of what I've seen this malware do. I will try my best to get the malware again and have real screenshots sooner or later.
I extended the disk capacity in Vmware settings for Kali Sana but it is telling me to do the same inside the guest OS, too. I don't know how it is done and I can't find it on the internet either. Does anyone know how to expand disk capacity inside GUEST OS Kali Sana?
I'm using huawei e303f datacard in windows 7. How can i make it work on kali sana? Huawei doesn't give driver for linux. where can i get those drivers?
I do known that Mac can be hacked and sometimes is easier than windows, but i haven't seem a useful way to hack OSX so far. Meterpreter and even zeus botnet have no mac versions... So how to hack mac? use RAT or MITM?
Hello can you tell me is there possible to install some programm on Windows that have backdoor vurnability ,so i will exploit it from Metasploit? thats possible or not?
Hey guys, my first post here and till now i was just a ghost :Pwell, i dropped here from a serie who got my attention called "hack like a pro" and really got involved in that thing
I was going through XSS tutorials to be more specific the non-persistent one, and almost got a general idea on how the attack function , when i came down to practice it, one part wasn't able to get through my head, it may be a stupid question, but i actually don't know!
I have this wifi adapter which was working perfectly on my windows 7 computer until it was hit accidentally by my brother... So now windows won't even recognize it!
I was practicing metasploit when i was asked for the IP address of the RHOST, I've never used nmap before, and i think its time to get some basics on it, especially how to get IP addresses on my network,
It has been a while since my last Raspberry Pi tutorial , but now I am back with another tutorial. This one I should note isn't your typical tutorial, but as always lets boot up our Pi and wreck havoc.
can you give me solution?SSLStrip plugin: bind 80 on 59263SSLStrip: cannot setup the redirect, did you uncomment the redircommandon command on your etter.conf file?SSLStrip: plugin load failed: Could not set up HTTP redirect
Can anyone provide me with references/advice on programming USB's. USB have a micro controller. I want to use C to program it. I am no touching it if any assembly is required. My end goal is to code my own bad usb
How to defend yourself from SQL injection. All I know is that the attacker upload a PHP script from application form or any form from where you can upload a photo/video/ppt/etc . And then relocate the location of the PHP script by typing the name and location of the file in URL. The PHP script then run and may delete or stole your complete website . According to me the one solution is to put the uploading file in the folders like (62gHgU29hs) . So that the attacker cannot find the location but...
Hello sir,is there any way to Hack account which is secured by HTTPS?As much as I know http secured account can be hack easily by sniffing or MITM attack. But is there any way to hack https secured account like google or facebook by cookies hijacking or session hijacking?... And please not by using SET (dns spoofing)..... thanks for reading..... And i am apologizing if i disturbed someone by asking terrible questions (may be)...But sir i want to know... Thanks again