I've been thinking if its possible or not to craft a special webpage that has a direct download to a trojan or whatever and it automatically opens it without user interaction, Maybe it could be done using a Script or code in the webpage?
Hello Guys,I want know how to use DDNS for metasploit attack with kali ,I search googel for this, it has lot of solutions, but i was unable to find clear solution ,So, if any one can give me a explanation, tutorial or link to a tutorial it is very appreciate ,
My local library has decent WiFi but unfortunately it doesn't allow you to visit every webpage including youtube ,Facebook etc.I was wondering is there I way I can allow full access fromy android phone or laptop?
This is for the knowledge purpose only . can anyone tell me how to access the password files in windows 8 and how to Decrypt the encrypted passwords in Windows 8
Hello guys, i was trying to send a fake e-mail with Social Engineering Toolkit. I am selecting:1) Social-Engineering Attacks5) Mass Mailer Attack1) E-Mail Attack Single Email AddressI am doing everything right. But when i entered my gmail, i have this error. How can i fix this?
So since IPv4 can't be here forever and the number of IPs is bigger and bigger, sooner or later i suppose many will have to switch to IPv6 , or all if coexistance gets removed. So what do you think how much time since the change becomes noticable and a question for experts - how will that affect network security and hacking. I am interested will the laws of IPv4 network dramatically change that it would require a new understanding of IPv6 to keep up with time (Packet structure, connections,...
As we're all aware, recon is vital to a successful hack. We need to know everything we can about the target in order to perform the best possible attack. Port scanning is a basic recon concept that is introduced very early in learning proper reconnoissance.
Hello. I want to stay up-to-date on news revolving around technology and tech enthusiasts. More importantly, I would love to keep up with cyber security as well. I was wondering what sources of information you use to stay up-to-date.
I just rooted my LG android phone and I have dsploit already installed so what's some other hacking tools for hacking wifi and computer? I also have heard that someone has found a way to put a androids wifi card into monitor mode if that's true can someone link me to that?
Can someone explain what BadUSB is? I know it have something to do with plugging a USB into a computer and then it can issue commands, the attacker can access the camera and microphone, etc. but how does it work and is it available to the public? Thanks!
So i was adding a wireless device to my BThub4 and typing in the password i realised that no characters were after f so immediately thinking this hex must be generated someways i delved online and found some material on gnucitizen on a researcher who cracked the generation for the old the old BTHub 1.0 based on the Thomson SpeedTouch 7G and ST790. Although this was WEP encryption to give an idea of how dated this is.
So i ran into a problem few days ago and it seemed to be very annoying one. I got hands on ASUS X55A with broken HDD. So i changed HDD and woo enter bios password. I hit enter and got into bios where uder security tab was shining ADMINISTRATOR PASSWORD INSTALLED. There was no user password but administrator password was set and it led to that i wasnt able to boot anything. At all.
Hi there,I have some encrypted passwords from cyberoam UTM.I want to get them decrypted,but dont know how(beacuse i am newbie)?I can anyone please help...and I have also some decrypted password of them.
Hi,I want to ask that how i can get knowledge like Elliot in Mr.Robot.I am very impressed by his knowledge(may be beacuse i am newbie) like he he finds the infected server in 2nd episod,like he concludes that the server is rootkited,and many more...
Hello again my fellow Hackerzz!! I was trying hashcat and when converting my .cap file to .hccap, i noticed that even after converting, hashcat was not working. So i got to know that sometimes, even if aircrack-ng suite tells you that a 4-way handshake was succesful, it is not. So, in this How-To, i'll be telling you how to check a captured 4-way handshake in a .cap file was succesful or not.
I have recently contributed to Nullbyte by sharing one of my learned skill of finding hacked account online. https://null-byte.wonderhowto.com/how-to/find-hacked-accounts-online-part-1-haveibeenpwned-0164611/ Along with this, I also know and sometimes use other methods to access such information. I do not have any evil plans like ransom, blackmail, theft, dox etc. but if such information is shared someone might use it in a wrong way. And I do not want it to be applied for wrong reasons.
Hello every one !I'm using kali linux 2.0& I set up Cobaltstrike & I added Beef Script To it !But when I Open CObaltstrike & when Beef console StartMy kali Logout :/When i repeat it logout again !But when I removed Beef from it ! The problem don't show again !But i need Beef !Is there any solution ?
I have Kali Linux installed on a separate computer and I have a windows 7 computer. Im trying to use nmap on armitage to scan my wifi for the computer so I scan the network by using mylocalip.0/24 and only my router shows up. it says there is 4 host as you can see in the picture below but why does only 1 show up?
Hey guys, i have a new problem with ProxyChains and i think i fix other one. When i type ' proxychains iceweasel ' to terminal, an Iceweasel browser opens but everything is same and i got this on terminal (process:6454): GLib-CRITICAL *: gslicesetconfig: assertion 'syspagesize == 0' failed How can i fix this?
Hello guys, please help me if you have any ideas. Thanks in advance. The thing is I program as a hobby. I create fun and network chat application for my friends so we could chat. I am faced with a problem that I never thought i would meet? How can i create or is there any language that can run independently off a new Windows installation without the need to download dependencies. Like Python needs a python installer to run and VB.NET needs .Net framework to run, C# needs a framework to run? Is...
As the title says, I am wondering if it is possible to know the external address of an access point (attributed by the ISP) just by sniffing the packets it emits and without being connected to it.
I am just so curious how the whatsapp(android) work, how they send a photo ? How the whole process of sending a message form 1 phone to other ?Did they will change the photo content? That kind of question .Can someone help? plz!!!!
So I had Word opened and Microsoft AutoUpdate ran and I saw that there were updates to install. Being curious as I was, I went to the link listed about the "security update" and saw that there were exploits that allowed for the possibility of remote code execution in various versions of Excel. To see the table showing which are exploitable, check this link out. That is where I also found the two CVE numbers that were associated with the version of Excel that I'm running: Excel 2016 for Mac. I...
As many of you may have heard, Apple's new iOS 9 is "rootless", which supposedly would make jailbreaking much more difficult. However, it has been shown to be possible. ih8sn0w posted a youtube video of his jailbroken iphone running iOS 9 and even gave some hints about it in the video description section. However, he also stated that he will NOT be releasing it to the public. So it would be quite the feat and adventure to take his hints and comments and use that to figure out how to jailbreak...
I just came across an article on Reddit about some iOS malware called XcodeGhost that has affected many apps in Apple's Chinese App Store. After reading more about it, I thought it was pretty incredible how the attackers had pulled this off. As the name might imply, the malware was not loaded onto iOS devices because the iOS devices were directly hacked, but rather it was the Xcode versions used by the developers of legitimate apps that were hacked! Basically, some devs were using hacked Xcode...
I was its installing my Kali 2.0 on on dual boot with Windows 8.1 when i try to re size the partition during installation in Kali its show you are using dynamic partition e.t.c error . are there any way to convert dynamic partition of windows to basic with out loosing data
Hey guys, i was trying to use proxy with https://null-byte.wonderhowto.com/how-to/hacks-mr-robot-elliot-fsociety-made-their-hack-evil-corp-untraceable-0164294/ this guide. I have edited my .config file.I checked proxy with SamAir's proxy checker and it says its elite :D.But when i type proxychains iceweasel to terminal. An iceweasel browser opens but i cannot surf. It says "Server not found" how can i do?
There's a new show on the UK's channel 4 called Hunted. 14 ordinary people go on the run from 30 experts in surveillance, profiling, and general person hunting(ex CIA, ex police, private investigators etc.). The fugitives have to last 30 days without being caught. The hunters claim to be using the same techniques that the state would use to track down a fugitive.