I have my Kali vm in NAT mode where I can access the internet and ping other computers on my network. The only problem is that it has a different internal IP. My vm internal IP is 10.0.2.15 and my computer IP is 192.168.10.103. I cant seem to ping the vm from my computer though. When I switched it to bridged adapter mode then it got a similar ip '192.168.10.108'however I could not ping my computer and couldn't connect to Google. An help? Thanks.
i just download kali torrent (2.0) from its site....i make a bootable pendrive to install..i graphical install it but when it restart after installing it shows a dash and does not start..i waited for 30 mins but nothing happen...i try to re install it but same problem.....HELP ME FAST AS U CAN....PLZ
hello every one , i was starting up to build my channel on youtube i wanted some advise how to get more viewers on there. (ofc subject of channel gonna be programming / pentesting )
Mostly all hackers like to have a laugh. We like to have fun! We like to troll. And maybe, even cause some havoc once in a while. But, while we do this, we must always stay in the line of the law.
Okay I am trying to learn how to build a Python program to crawl a network and out-put ip addresses and mac addresses to a text file on the device running it. I am looking at running this from a phone and laptop. Any help would be great.
hello guys, i really need help. i recently managed to hack into a java aplications database and passwords were encrypted in this way . " 54CE5EBE53B874","3f 757D145C75FA4A4A36BA667A57A" to mention but a few. after along google searching, i realised these java applications use keys to encrypt passwords. i even downloaded the full system on my pc but dont know how to find the encryption keys. can some one help?? help will be apreciated
So i have been going through all the post's on here and practicing on some computers mainly mine, family and friends and learned how easy it was to gain access and browse all files access camera and microphone... but my question is how do i test other services for weakness's ? you hear about people finding bugs in facebook's server and getting rewarded etc.. is it just a matter right "lets sit here and hack facebook, if i get in woohoo (what to do now share or report)"... or is they something...
as the tittle says, can anyone tell me how to install them in kali sana...???i've done all the possible methods to install them but just failed...so if anyone knows how to install them, kindly reply asap...any help would be greatly appreciated...
I have tried DOS attack in the network on various PC's at a time.It works Fine. By arp spoofBut when i try to do it on the router it doesn't work. i want to do DOSon the whole network. I think the router is highly configured to prevent DOS, hence m not succeding in doing DOS on it.I also read several articals on DOS attack in null bytes, they work fluenton specific victim but don't work against the Router.Please help.. My exams are approaching (CEH).. and i have to do this before the exams.
I am a beginner in this field, but I am trying hard to succeed. If I say something that doesn't make sense, please correct me. I am going to buy a raspberry pi 2, and I'm intending to put Kali Linux on it, but I would like the functionality to connect back like in this post. But after many Google searches, my answer is somewhat mixed. Every example I've seen uses local IP addresses to connect back, but I intend to use it in remote situations. What can I do?
Hi guyssince the update of kali sana (2.0) monitor mode has been renamed from mon0 to wlan0monin websploit when you enter in the mon device it only accepts four characters.
I am a regular user here and have been following many articles. I just want to understand, what if an attacker gets access to my router, what possible attacks can be carried out. One I can think of is MITM by diverting traffic... What others options work? Can internal networks be scanned using nmap? or can attacker join the network?
Ok so , I'm trying to make a very very very simple Python 3.4 program because I'm just starting out, so please try to dumb things down for me, so the program just asks you for your name and asks you what's 2+ 2, it goes like this
When attempting to gain access to a server, there may come a point when you need to get around file upload restrictions to upload something. If we can find a way to get around the restrictions, then we can upload anything we want to the server, effectively compromising it. That is what we'll be doing here today, so let's get started!
Greetings. This how-to on hacking Windows 7/8/10 etc. admin account passwords using Windows Magnifier is focused on adding, changing, or deleting an admin level account on a Windows 7/8/10 etc.
Null byte has been a great source of knowledge regarding ethical hacking and the tutorials have been marvelous.Recently i tried dictionary attacks on my wpa 2 encrypted router but i found that cracking wps pin is a more effective method to get wpa2 pass phrase.The problem is that every time i use reaver or bully for this purpose,the wps locks out after 3 or 4 pins.I have tried adding delays of upto 350 seconds on each pin but still wps is locked.I even tried wps pixie dust attack by modifying...
Hi , Today i will show you how to do HID Keyboard Attacks With Android BUT without using Kali NetHunter BUT You will need to install custom kernel to your Android device, that will add keyboard+mouse functions to it's USB port,So Lets Get Started
This might sound weird for null byte but I trust it the most.A friend on facebook sent me a link which did look suspicious, so I scanned it online blah blah and it didn't find anything. I don't even know that "friend" personally and it looked like she wasn't sending it - perhaps a bot.So I trusted the knowledge I learned here knowing that nothing can actually happen If i just click the link and not enter any info. The link was obviously malicious as it took me to a facebook post, however the...
Hi, Ive Just Only Taken a Interest in Hacking and Since Most of the Tutorials on Null Byte Are on Kali Linux I Tried to Boot Kali to a Usb Through win32 but I Keep Getting a Error Message to Format the Usb So I Tried Universal-Usb-Installer Which Worked but I Dont Know What to Do from There, Any Help Please?
I have only .crypt8 file and don't have root permission on my phone.I want to decrypt it.Is there any tool to decrypt it.Another option is to convert it to .db file.But it requires root permission.Is there any other option?
Hi I'm a greenhorn Hacker and I just wanted to start with Armitage. It connects and shows me no error messages but after connecting nothing appears on the screen. Any help?
i've checked all the available step-by-step guides about how to install kali linux with dual boot win 7.but still i've some questions abot those guides.here's my scenario :...I've 5 partitions (Drive : C,D,E,F,G) in win 7 .I've removed all the data from D drive to install kali in it.now my question is : If I'll go in this way,
I have done allot of my own research and after lots of searches I seem to come to no conclusion. Does anyone know if there is a way to hack an iPhone. Or is there not because I really can't imagine that they are so secure there is no way?
I tried using hydra but it does'nt work..i checked for syntax error but everything was fine.Does'nt work means it does not crack the password.i tried to crack my gmail with the wordlist having my password.but it does not crack.anyone please tell what to do.
I tried using hydra but it does'nt work..i checked for syntax error but everything was fine.Does'nt work means it does not crack the password.i tried to crack my gmail with the wordlist having my password.but it does not crack.anyone please tell what to do.
I suspect my wife is cheating on me and I want to find out how much she's not telling me. I know she uses Facebook and Twitter to message him. She's locked everything up, her laptop, droid phone (via fingerprint), email accounts, etc. She does have a Guest account open on her laptop and leaves it home when she goes to work so I have all the time I need on it. I think she may have a keylogger or other antispyware on her laptop so I don't want to tip my hand that I have hacked her password.
i tried apt-get install mitmf in backbox.. but it did not work.then i added kali 2.0 repositories links to backbox. MITMF got install butbackbox started creating problems. it used to not shutdown..Please tell how to install mitmf and cupp in Backbox.
I have been looking for a way to get accurate information (IP , Location, OS , Browser) from only a link. Once the target clicks on the link , I can get all the basic information about what he is running on his machine ?
Hey, so im farely new to the hacking world. For the last couple months ive been scouring the enternet learing all that i can. I've installed Kali Linux 2.0 in a VirtualBox and was wondering what are the first tools i should i start playing with if im just starting out hacking?
I've set up an apache server listening on port 8080 on my friends computer (192.168.1.15). For testing, I've only allowed my IP to access it by going to router (Huawei 192.168.1.1) NAT port mapping and specified External IP to my WAN IP, and port 8080 for both external and internal ports, with internal IP set to his apache-running PC.
They essentially developed malware that can create a bidirectional channel of communication between your device and a sealed off network. All you need is actual physical proximity and malware to have infected the target (via a USB drive etc)
How would it be done? What programs would be used to recover the passwords and emails even if encrypted, would it be possible to mass DDOS to lower security, but even after that how would you go?
Hello, fellow grey hat hackers and aspiring coders. I'm back again with another python tutorial. Just that this one is gonna be a lot cooler ;-). We gonna make an encryption program, that well you know encrypts all the files on your pendrive or hdd or whatever you want....Also lots of thanks to DrapsTV. They have helped me a lot with Python and making awesome programs. The video is here: