<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Null Byte « WonderHowTo</title>
    <link>https://null-byte.wonderhowto.com/</link>
    <description>The aspiring white-hat hacker/security awareness playground</description>
    <language>en-us</language>
    <pubDate>Wed, 01 Jul 2020 22:00:00 GMT</pubDate>
    <lastBuildDate>Wed, 01 Jul 2020 22:00:00 GMT</lastBuildDate>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>WonderHowTo.com FeedBuilder v1.2</generator>
    <managingEditor>contact@wonderhowto.com (Contact WonderHowTo)</managingEditor>
    <image>
      <link>https://null-byte.wonderhowto.com/</link>
      <title>Null Byte « WonderHowTo</title>
      <description>The aspiring white-hat hacker/security awareness playground</description>
      <url>https://img.wonderhowto.com/images/logos/wonderhowto.feed.logo.gif</url>
      <width>144</width>
      <height>144</height>
    </image>
    <item>
      <title>Hacking macOS: How to Use Images to Smuggle Data Through Firewalls</title>
      <link>https://null-byte.wonderhowto.com/how-to/hacking-macos-use-images-smuggle-data-through-firewalls-0197128/</link>
      <comments>https://null-byte.wonderhowto.com/how-to/hacking-macos-use-images-smuggle-data-through-firewalls-0197128/#comments</comments>
      <description><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/hacking-macos-use-images-smuggle-data-through-firewalls-0197128/"><img src="https://img.wonderhowto.com/img/79/78/63692776381968/0/hacking-macos-use-images-smuggle-data-through-firewalls.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>Data can be injected into images quickly without the use of metadata tools. Attackers may use this knowledge to exfiltrate sensitive information from a MacBook by sending the pictures to ordinary file-sharing websites.

Continuing on the topics of DPI evasion, payload obfuscation, and utilizing popular websites to bypass firewalls, we'll be looking at an alternative way of embedding data into images. Unlike using metadata tags to store payloads inside a picture, this method involves injecting text directly into the footer of the image file.

Understanding the Attack

A simple Bash script was<a href="https://null-byte.wonderhowto.com/how-to/hacking-macos-use-images-smuggle-data-through-firewalls-0197128/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></description>
      <content:encoded><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/hacking-macos-use-images-smuggle-data-through-firewalls-0197128/"><img src="https://img.wonderhowto.com/img/79/78/63692776381968/0/hacking-macos-use-images-smuggle-data-through-firewalls.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>Data can be injected into images quickly without the use of metadata tools. Attackers may use this knowledge to exfiltrate sensitive information from a MacBook by sending the pictures to ordinary file-sharing websites.

Continuing on the topics of DPI evasion, payload obfuscation, and utilizing popular websites to bypass firewalls, we'll be looking at an alternative way of embedding data into images. Unlike using metadata tags to store payloads inside a picture, this method involves injecting text directly into the footer of the image file.

Understanding the Attack

A simple Bash script was<a href="https://null-byte.wonderhowto.com/how-to/hacking-macos-use-images-smuggle-data-through-firewalls-0197128/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></content:encoded>
      <pubDate>Wed, 01 Jul 2020 22:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://null-byte.wonderhowto.com/how-to/hacking-macos-use-images-smuggle-data-through-firewalls-0197128/</guid>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">tokyoneon</dc:creator>
      <dc:publisher xmlns:dc="http://purl.org/dc/elements/1.1/">WonderHowTo</dc:publisher>
      <media:title>Hacking macOS: How to Use Images to Smuggle Data Through Firewalls</media:title>
      <media:description type="html"><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/hacking-macos-use-images-smuggle-data-through-firewalls-0197128/"><img src="https://img.wonderhowto.com/img/79/78/63692776381968/0/hacking-macos-use-images-smuggle-data-through-firewalls.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>Data can be injected into images quickly without the use of metadata tools. Attackers may use this knowledge to exfiltrate sensitive information from a MacBook by sending the pictures to ordinary file-sharing websites.

Continuing on the topics of DPI evasion, payload obfuscation, and utilizing popular websites to bypass firewalls, we'll be looking at an alternative way of embedding data into images. Unlike using metadata tags to store payloads inside a picture, this method involves injecting text directly into the footer of the image file.

Understanding the Attack

A simple Bash script was<a href="https://null-byte.wonderhowto.com/how-to/hacking-macos-use-images-smuggle-data-through-firewalls-0197128/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></media:description>
      <media:thumbnail url="https://img.wonderhowto.com/img/79/78/63692776381968/0/hacking-macos-use-images-smuggle-data-through-firewalls.1280x600.jpg" width="1280" height="600" />
      <media:rating scheme="urn:mpaa">g</media:rating>
      <media:content duration="113" medium="video" lang="en" />
      <media:player url="https://null-byte.wonderhowto.com/how-to/hacking-macos-use-images-smuggle-data-through-firewalls-0197128/" />
    </item>
    <item>
      <title>How to Conduct a Pentest Like a Pro in 6 Phases</title>
      <link>https://null-byte.wonderhowto.com/how-to/conduct-pentest-like-pro-6-phases-0285035/</link>
      <comments>https://null-byte.wonderhowto.com/how-to/conduct-pentest-like-pro-6-phases-0285035/#comments</comments>
      <description><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/conduct-pentest-like-pro-6-phases-0285035/"><img src="https://img.wonderhowto.com/img/05/55/63722028793912/0/conduct-pentest-like-pro-6-phases.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>Penetration testing, or pentesting, is the process of probing a network or system by simulating an attack, which is used to find vulnerabilities that could be exploited by a malicious actor. The main goal of a pentest is to identify security holes and weaknesses so that the organization being tested can fix any potential issues. In a professional penetration test, there are six phases you should know.

Pentesting Lingo

Like many industries, and especially within IT, certain terms can cause initial confusion for people not familiar with them. Penetration testing can get pretty technical, but<a href="https://null-byte.wonderhowto.com/how-to/conduct-pentest-like-pro-6-phases-0285035/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></description>
      <content:encoded><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/conduct-pentest-like-pro-6-phases-0285035/"><img src="https://img.wonderhowto.com/img/05/55/63722028793912/0/conduct-pentest-like-pro-6-phases.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>Penetration testing, or pentesting, is the process of probing a network or system by simulating an attack, which is used to find vulnerabilities that could be exploited by a malicious actor. The main goal of a pentest is to identify security holes and weaknesses so that the organization being tested can fix any potential issues. In a professional penetration test, there are six phases you should know.

Pentesting Lingo

Like many industries, and especially within IT, certain terms can cause initial confusion for people not familiar with them. Penetration testing can get pretty technical, but<a href="https://null-byte.wonderhowto.com/how-to/conduct-pentest-like-pro-6-phases-0285035/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></content:encoded>
      <pubDate>Wed, 01 Jul 2020 18:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://null-byte.wonderhowto.com/how-to/conduct-pentest-like-pro-6-phases-0285035/</guid>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">drd_</dc:creator>
      <dc:publisher xmlns:dc="http://purl.org/dc/elements/1.1/">WonderHowTo</dc:publisher>
      <media:title>How to Conduct a Pentest Like a Pro in 6 Phases</media:title>
      <media:description type="html"><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/conduct-pentest-like-pro-6-phases-0285035/"><img src="https://img.wonderhowto.com/img/05/55/63722028793912/0/conduct-pentest-like-pro-6-phases.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>Penetration testing, or pentesting, is the process of probing a network or system by simulating an attack, which is used to find vulnerabilities that could be exploited by a malicious actor. The main goal of a pentest is to identify security holes and weaknesses so that the organization being tested can fix any potential issues. In a professional penetration test, there are six phases you should know.

Pentesting Lingo

Like many industries, and especially within IT, certain terms can cause initial confusion for people not familiar with them. Penetration testing can get pretty technical, but<a href="https://null-byte.wonderhowto.com/how-to/conduct-pentest-like-pro-6-phases-0285035/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></media:description>
      <media:thumbnail url="https://img.wonderhowto.com/img/05/55/63722028793912/0/conduct-pentest-like-pro-6-phases.1280x600.jpg" width="1280" height="600" />
      <media:rating scheme="urn:mpaa">g</media:rating>
    </item>
    <item>
      <title>Harness the Power of Big Data with This 10-Course Bundle</title>
      <link>https://null-byte.wonderhowto.com/how-to/harness-power-big-data-with-10-course-bundle-0320638/</link>
      <comments>https://null-byte.wonderhowto.com/how-to/harness-power-big-data-with-10-course-bundle-0320638/#comments</comments>
      <description><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/harness-power-big-data-with-10-course-bundle-0320638/"><img src="https://img.wonderhowto.com/img/50/00/63729126899458/0/harness-power-big-data-with-10-course-bundle.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>We're living in a world that runs on Big Data. As the driving force behind everything from self-driving cars and Google algorithms to the latest medical technology and financial platforms, massive sets of increasingly complex data lie at the heart of today's most exciting and important innovations.

That means that if you want to be successful in virtually any field, you'll want to have more than just a baseline understanding of how to work with numbers and information. The 2020 Master Microsoft Excel & Power BI Certification Bundle will teach you how to harness the power of two ubiquitous<a href="https://null-byte.wonderhowto.com/how-to/harness-power-big-data-with-10-course-bundle-0320638/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></description>
      <content:encoded><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/harness-power-big-data-with-10-course-bundle-0320638/"><img src="https://img.wonderhowto.com/img/50/00/63729126899458/0/harness-power-big-data-with-10-course-bundle.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>We're living in a world that runs on Big Data. As the driving force behind everything from self-driving cars and Google algorithms to the latest medical technology and financial platforms, massive sets of increasingly complex data lie at the heart of today's most exciting and important innovations.

That means that if you want to be successful in virtually any field, you'll want to have more than just a baseline understanding of how to work with numbers and information. The 2020 Master Microsoft Excel & Power BI Certification Bundle will teach you how to harness the power of two ubiquitous<a href="https://null-byte.wonderhowto.com/how-to/harness-power-big-data-with-10-course-bundle-0320638/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></content:encoded>
      <pubDate>Tue, 30 Jun 2020 22:17:30 GMT</pubDate>
      <guid isPermaLink="true">https://null-byte.wonderhowto.com/how-to/harness-power-big-data-with-10-course-bundle-0320638/</guid>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">The Hookup</dc:creator>
      <dc:publisher xmlns:dc="http://purl.org/dc/elements/1.1/">WonderHowTo</dc:publisher>
      <media:title>Harness the Power of Big Data with This 10-Course Bundle</media:title>
      <media:description type="html"><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/harness-power-big-data-with-10-course-bundle-0320638/"><img src="https://img.wonderhowto.com/img/50/00/63729126899458/0/harness-power-big-data-with-10-course-bundle.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>We're living in a world that runs on Big Data. As the driving force behind everything from self-driving cars and Google algorithms to the latest medical technology and financial platforms, massive sets of increasingly complex data lie at the heart of today's most exciting and important innovations.

That means that if you want to be successful in virtually any field, you'll want to have more than just a baseline understanding of how to work with numbers and information. The 2020 Master Microsoft Excel & Power BI Certification Bundle will teach you how to harness the power of two ubiquitous<a href="https://null-byte.wonderhowto.com/how-to/harness-power-big-data-with-10-course-bundle-0320638/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></media:description>
      <media:thumbnail url="https://img.wonderhowto.com/img/50/00/63729126899458/0/harness-power-big-data-with-10-course-bundle.1280x600.jpg" width="1280" height="600" />
      <media:rating scheme="urn:mpaa">g</media:rating>
    </item>
    <item>
      <title>The Null Byte Guide to 3D Printing for Hackers</title>
      <link>https://null-byte.wonderhowto.com/how-to/null-byte-guide-3d-printing-for-hackers-0319126/</link>
      <comments>https://null-byte.wonderhowto.com/how-to/null-byte-guide-3d-printing-for-hackers-0319126/#comments</comments>
      <description><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/null-byte-guide-3d-printing-for-hackers-0319126/"><img src="https://img.wonderhowto.com/img/63/81/63729043175786/0/null-byte-guide-3d-printing-for-hackers.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>3D printers allow hackers and makers alike to create something from nothing. They're an incredible technology that lets you build protective cases and covers for gear such as a wardriving phone and Raspberry Pi-Hole. 3D printers can even help you out in a bind when something breaks, and it's impossible to get the part, since you can just print one out yourself.

And with 3D printers being relatively cheap these days, there's little reason not to get one if you think you'd have many uses for it. Anyone with $200 to $300 can get started 3D printing simple or sophisticated plastic objects at home<a href="https://null-byte.wonderhowto.com/how-to/null-byte-guide-3d-printing-for-hackers-0319126/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></description>
      <content:encoded><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/null-byte-guide-3d-printing-for-hackers-0319126/"><img src="https://img.wonderhowto.com/img/63/81/63729043175786/0/null-byte-guide-3d-printing-for-hackers.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>3D printers allow hackers and makers alike to create something from nothing. They're an incredible technology that lets you build protective cases and covers for gear such as a wardriving phone and Raspberry Pi-Hole. 3D printers can even help you out in a bind when something breaks, and it's impossible to get the part, since you can just print one out yourself.

And with 3D printers being relatively cheap these days, there's little reason not to get one if you think you'd have many uses for it. Anyone with $200 to $300 can get started 3D printing simple or sophisticated plastic objects at home<a href="https://null-byte.wonderhowto.com/how-to/null-byte-guide-3d-printing-for-hackers-0319126/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></content:encoded>
      <pubDate>Mon, 29 Jun 2020 23:13:30 GMT</pubDate>
      <guid isPermaLink="true">https://null-byte.wonderhowto.com/how-to/null-byte-guide-3d-printing-for-hackers-0319126/</guid>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Retia</dc:creator>
      <dc:publisher xmlns:dc="http://purl.org/dc/elements/1.1/">WonderHowTo</dc:publisher>
      <media:title>The Null Byte Guide to 3D Printing for Hackers</media:title>
      <media:description type="html"><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/null-byte-guide-3d-printing-for-hackers-0319126/"><img src="https://img.wonderhowto.com/img/63/81/63729043175786/0/null-byte-guide-3d-printing-for-hackers.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>3D printers allow hackers and makers alike to create something from nothing. They're an incredible technology that lets you build protective cases and covers for gear such as a wardriving phone and Raspberry Pi-Hole. 3D printers can even help you out in a bind when something breaks, and it's impossible to get the part, since you can just print one out yourself.

And with 3D printers being relatively cheap these days, there's little reason not to get one if you think you'd have many uses for it. Anyone with $200 to $300 can get started 3D printing simple or sophisticated plastic objects at home<a href="https://null-byte.wonderhowto.com/how-to/null-byte-guide-3d-printing-for-hackers-0319126/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></media:description>
      <media:thumbnail url="https://img.wonderhowto.com/img/63/81/63729043175786/0/null-byte-guide-3d-printing-for-hackers.1280x600.jpg" width="1280" height="600" />
      <media:rating scheme="urn:mpaa">g</media:rating>
      <media:content duration="97" medium="video" lang="en" />
      <media:player url="https://null-byte.wonderhowto.com/how-to/null-byte-guide-3d-printing-for-hackers-0319126/" />
    </item>
    <item>
      <title>Zuitte Offers 50+ Must-Have Tools for Entrepreneurs</title>
      <link>https://null-byte.wonderhowto.com/how-to/zuitte-offers-50-must-have-tools-for-entrepreneurs-0319827/</link>
      <comments>https://null-byte.wonderhowto.com/how-to/zuitte-offers-50-must-have-tools-for-entrepreneurs-0319827/#comments</comments>
      <description><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/zuitte-offers-50-must-have-tools-for-entrepreneurs-0319827/"><img src="https://img.wonderhowto.com/img/47/02/63728506149241/0/zuitte-offers-50-must-have-tools-for-entrepreneurs.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>The life of a busy entrepreneur isn't easy. In addition to coming up with original business ideas and marketing strategies, you also need to be continually thinking about investors, overhead, the competition, and expanding your customer base — often with a limited budget.

So why not make your life a bit easier by treating yourself to a suite of tools that can help you drastically streamline your entire workflow? The multifaceted Zuitte 50+ Tools for Entrepreneurs package offers over 50 robust solutions that can help everyday modern entrepreneurs run and grow a business. The cost of a lifetime<a href="https://null-byte.wonderhowto.com/how-to/zuitte-offers-50-must-have-tools-for-entrepreneurs-0319827/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></description>
      <content:encoded><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/zuitte-offers-50-must-have-tools-for-entrepreneurs-0319827/"><img src="https://img.wonderhowto.com/img/47/02/63728506149241/0/zuitte-offers-50-must-have-tools-for-entrepreneurs.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>The life of a busy entrepreneur isn't easy. In addition to coming up with original business ideas and marketing strategies, you also need to be continually thinking about investors, overhead, the competition, and expanding your customer base — often with a limited budget.

So why not make your life a bit easier by treating yourself to a suite of tools that can help you drastically streamline your entire workflow? The multifaceted Zuitte 50+ Tools for Entrepreneurs package offers over 50 robust solutions that can help everyday modern entrepreneurs run and grow a business. The cost of a lifetime<a href="https://null-byte.wonderhowto.com/how-to/zuitte-offers-50-must-have-tools-for-entrepreneurs-0319827/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></content:encoded>
      <pubDate>Tue, 23 Jun 2020 17:50:30 GMT</pubDate>
      <guid isPermaLink="true">https://null-byte.wonderhowto.com/how-to/zuitte-offers-50-must-have-tools-for-entrepreneurs-0319827/</guid>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">The Hookup</dc:creator>
      <dc:publisher xmlns:dc="http://purl.org/dc/elements/1.1/">WonderHowTo</dc:publisher>
      <media:title>Zuitte Offers 50+ Must-Have Tools for Entrepreneurs</media:title>
      <media:description type="html"><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/zuitte-offers-50-must-have-tools-for-entrepreneurs-0319827/"><img src="https://img.wonderhowto.com/img/47/02/63728506149241/0/zuitte-offers-50-must-have-tools-for-entrepreneurs.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>The life of a busy entrepreneur isn't easy. In addition to coming up with original business ideas and marketing strategies, you also need to be continually thinking about investors, overhead, the competition, and expanding your customer base — often with a limited budget.

So why not make your life a bit easier by treating yourself to a suite of tools that can help you drastically streamline your entire workflow? The multifaceted Zuitte 50+ Tools for Entrepreneurs package offers over 50 robust solutions that can help everyday modern entrepreneurs run and grow a business. The cost of a lifetime<a href="https://null-byte.wonderhowto.com/how-to/zuitte-offers-50-must-have-tools-for-entrepreneurs-0319827/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></media:description>
      <media:thumbnail url="https://img.wonderhowto.com/img/47/02/63728506149241/0/zuitte-offers-50-must-have-tools-for-entrepreneurs.1280x600.jpg" width="1280" height="600" />
      <media:rating scheme="urn:mpaa">g</media:rating>
    </item>
    <item>
      <title>How to Identify Antivirus Software Installed on a Target's Windows 10 PC</title>
      <link>https://null-byte.wonderhowto.com/how-to/identify-antivirus-software-installed-targets-windows-10-pc-0198775/</link>
      <comments>https://null-byte.wonderhowto.com/how-to/identify-antivirus-software-installed-targets-windows-10-pc-0198775/#comments</comments>
      <description><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/identify-antivirus-software-installed-targets-windows-10-pc-0198775/"><img src="https://img.wonderhowto.com/img/32/63/63721958492416/0/identify-antivirus-software-installed-targets-windows-10-pc.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>Determining the antivirus and firewall software installed on a Windows computer is crucial to an attacker preparing to create a targeted stager or payload. With covert deep packet inspection, that information is easily identified.

This attack assumes the Wi-Fi password to the target network is already known. With the password, an attacker can observer data traversing the network and enumerate installed security software. Popular antivirus and firewall solutions become easily identifiable when benign web traffic is filtered out.

We'll learn how to capture and decrypt Wi-Fi traffic without<a href="https://null-byte.wonderhowto.com/how-to/identify-antivirus-software-installed-targets-windows-10-pc-0198775/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></description>
      <content:encoded><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/identify-antivirus-software-installed-targets-windows-10-pc-0198775/"><img src="https://img.wonderhowto.com/img/32/63/63721958492416/0/identify-antivirus-software-installed-targets-windows-10-pc.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>Determining the antivirus and firewall software installed on a Windows computer is crucial to an attacker preparing to create a targeted stager or payload. With covert deep packet inspection, that information is easily identified.

This attack assumes the Wi-Fi password to the target network is already known. With the password, an attacker can observer data traversing the network and enumerate installed security software. Popular antivirus and firewall solutions become easily identifiable when benign web traffic is filtered out.

We'll learn how to capture and decrypt Wi-Fi traffic without<a href="https://null-byte.wonderhowto.com/how-to/identify-antivirus-software-installed-targets-windows-10-pc-0198775/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></content:encoded>
      <pubDate>Fri, 19 Jun 2020 23:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://null-byte.wonderhowto.com/how-to/identify-antivirus-software-installed-targets-windows-10-pc-0198775/</guid>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">tokyoneon</dc:creator>
      <dc:publisher xmlns:dc="http://purl.org/dc/elements/1.1/">WonderHowTo</dc:publisher>
      <media:title>How to Identify Antivirus Software Installed on a Target's Windows 10 PC</media:title>
      <media:description type="html"><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/identify-antivirus-software-installed-targets-windows-10-pc-0198775/"><img src="https://img.wonderhowto.com/img/32/63/63721958492416/0/identify-antivirus-software-installed-targets-windows-10-pc.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>Determining the antivirus and firewall software installed on a Windows computer is crucial to an attacker preparing to create a targeted stager or payload. With covert deep packet inspection, that information is easily identified.

This attack assumes the Wi-Fi password to the target network is already known. With the password, an attacker can observer data traversing the network and enumerate installed security software. Popular antivirus and firewall solutions become easily identifiable when benign web traffic is filtered out.

We'll learn how to capture and decrypt Wi-Fi traffic without<a href="https://null-byte.wonderhowto.com/how-to/identify-antivirus-software-installed-targets-windows-10-pc-0198775/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></media:description>
      <media:thumbnail url="https://img.wonderhowto.com/img/32/63/63721958492416/0/identify-antivirus-software-installed-targets-windows-10-pc.1280x600.jpg" width="1280" height="600" />
      <media:rating scheme="urn:mpaa">g</media:rating>
      <media:content duration="73" medium="video" lang="en" />
      <media:player url="https://null-byte.wonderhowto.com/how-to/identify-antivirus-software-installed-targets-windows-10-pc-0198775/" />
    </item>
    <item>
      <title>How to Use Postenum to Gather Vital Data During Post-Exploitation</title>
      <link>https://null-byte.wonderhowto.com/how-to/use-postenum-gather-vital-data-during-post-exploitation-0244777/</link>
      <comments>https://null-byte.wonderhowto.com/how-to/use-postenum-gather-vital-data-during-post-exploitation-0244777/#comments</comments>
      <description><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/use-postenum-gather-vital-data-during-post-exploitation-0244777/"><img src="https://img.wonderhowto.com/img/54/52/63717190712453/0/use-postenum-gather-vital-data-during-post-exploitation.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>Post-exploitation is often not quite as exciting as popping the initial shell, but it's a crucial phase for gathering data and further privilege escalation. Once a target is compromised, there's a lot of information to find and sift through. Luckily, there are tools available that can make the process easy. One such tool is Postenum.

To show everything Postenum has to offer for post-exploitation, we're using Kali Linux as our local machine. As for the target, if you want to follow along and try the tool out as a white hat or penetration tester, Metasploitable 2 is a good intentionally<a href="https://null-byte.wonderhowto.com/how-to/use-postenum-gather-vital-data-during-post-exploitation-0244777/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></description>
      <content:encoded><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/use-postenum-gather-vital-data-during-post-exploitation-0244777/"><img src="https://img.wonderhowto.com/img/54/52/63717190712453/0/use-postenum-gather-vital-data-during-post-exploitation.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>Post-exploitation is often not quite as exciting as popping the initial shell, but it's a crucial phase for gathering data and further privilege escalation. Once a target is compromised, there's a lot of information to find and sift through. Luckily, there are tools available that can make the process easy. One such tool is Postenum.

To show everything Postenum has to offer for post-exploitation, we're using Kali Linux as our local machine. As for the target, if you want to follow along and try the tool out as a white hat or penetration tester, Metasploitable 2 is a good intentionally<a href="https://null-byte.wonderhowto.com/how-to/use-postenum-gather-vital-data-during-post-exploitation-0244777/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></content:encoded>
      <pubDate>Thu, 18 Jun 2020 21:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://null-byte.wonderhowto.com/how-to/use-postenum-gather-vital-data-during-post-exploitation-0244777/</guid>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">drd_</dc:creator>
      <dc:publisher xmlns:dc="http://purl.org/dc/elements/1.1/">WonderHowTo</dc:publisher>
      <media:title>How to Use Postenum to Gather Vital Data During Post-Exploitation</media:title>
      <media:description type="html"><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/use-postenum-gather-vital-data-during-post-exploitation-0244777/"><img src="https://img.wonderhowto.com/img/54/52/63717190712453/0/use-postenum-gather-vital-data-during-post-exploitation.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>Post-exploitation is often not quite as exciting as popping the initial shell, but it's a crucial phase for gathering data and further privilege escalation. Once a target is compromised, there's a lot of information to find and sift through. Luckily, there are tools available that can make the process easy. One such tool is Postenum.

To show everything Postenum has to offer for post-exploitation, we're using Kali Linux as our local machine. As for the target, if you want to follow along and try the tool out as a white hat or penetration tester, Metasploitable 2 is a good intentionally<a href="https://null-byte.wonderhowto.com/how-to/use-postenum-gather-vital-data-during-post-exploitation-0244777/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></media:description>
      <media:thumbnail url="https://img.wonderhowto.com/img/54/52/63717190712453/0/use-postenum-gather-vital-data-during-post-exploitation.1280x600.jpg" width="1280" height="600" />
      <media:rating scheme="urn:mpaa">g</media:rating>
    </item>
    <item>
      <title>Become a Big Data Expert with This 10-Course Bundle</title>
      <link>https://null-byte.wonderhowto.com/how-to/become-big-data-expert-with-10-course-bundle-0318073/</link>
      <comments>https://null-byte.wonderhowto.com/how-to/become-big-data-expert-with-10-course-bundle-0318073/#comments</comments>
      <description><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/become-big-data-expert-with-10-course-bundle-0318073/"><img src="https://img.wonderhowto.com/img/95/00/63727984381020/0/become-big-data-expert-with-10-course-bundle.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>In today's data-driven world, being well-versed in Big Data and analytics can help land an exciting and high-paying career. Whether you're interested in working for a major tech company or pursuing freelance work in development, you need to have a thorough understanding of the latest and greatest platforms in analytics if you want to succeed.

The Complete 2020 Big Data and Machine Learning Bundle comes with ten courses and over 600 lessons that will get you up to speed with the world's most popular and powerful data and machine learning methodologies and tools, and it's currently available<a href="https://null-byte.wonderhowto.com/how-to/become-big-data-expert-with-10-course-bundle-0318073/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></description>
      <content:encoded><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/become-big-data-expert-with-10-course-bundle-0318073/"><img src="https://img.wonderhowto.com/img/95/00/63727984381020/0/become-big-data-expert-with-10-course-bundle.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>In today's data-driven world, being well-versed in Big Data and analytics can help land an exciting and high-paying career. Whether you're interested in working for a major tech company or pursuing freelance work in development, you need to have a thorough understanding of the latest and greatest platforms in analytics if you want to succeed.

The Complete 2020 Big Data and Machine Learning Bundle comes with ten courses and over 600 lessons that will get you up to speed with the world's most popular and powerful data and machine learning methodologies and tools, and it's currently available<a href="https://null-byte.wonderhowto.com/how-to/become-big-data-expert-with-10-course-bundle-0318073/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></content:encoded>
      <pubDate>Wed, 17 Jun 2020 17:00:02 GMT</pubDate>
      <guid isPermaLink="true">https://null-byte.wonderhowto.com/how-to/become-big-data-expert-with-10-course-bundle-0318073/</guid>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">The Hookup</dc:creator>
      <dc:publisher xmlns:dc="http://purl.org/dc/elements/1.1/">WonderHowTo</dc:publisher>
      <media:title>Become a Big Data Expert with This 10-Course Bundle</media:title>
      <media:description type="html"><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/become-big-data-expert-with-10-course-bundle-0318073/"><img src="https://img.wonderhowto.com/img/95/00/63727984381020/0/become-big-data-expert-with-10-course-bundle.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>In today's data-driven world, being well-versed in Big Data and analytics can help land an exciting and high-paying career. Whether you're interested in working for a major tech company or pursuing freelance work in development, you need to have a thorough understanding of the latest and greatest platforms in analytics if you want to succeed.

The Complete 2020 Big Data and Machine Learning Bundle comes with ten courses and over 600 lessons that will get you up to speed with the world's most popular and powerful data and machine learning methodologies and tools, and it's currently available<a href="https://null-byte.wonderhowto.com/how-to/become-big-data-expert-with-10-course-bundle-0318073/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></media:description>
      <media:thumbnail url="https://img.wonderhowto.com/img/95/00/63727984381020/0/become-big-data-expert-with-10-course-bundle.1280x600.jpg" width="1280" height="600" />
      <media:rating scheme="urn:mpaa">g</media:rating>
    </item>
    <item>
      <title>How to Use One-Lin3r to Quickly Generate Reverse Shells, Privesc Commands &amp; More</title>
      <link>https://null-byte.wonderhowto.com/how-to/use-one-lin3r-quickly-generate-reverse-shells-privesc-commands-more-0201614/</link>
      <comments>https://null-byte.wonderhowto.com/how-to/use-one-lin3r-quickly-generate-reverse-shells-privesc-commands-more-0201614/#comments</comments>
      <description><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/use-one-lin3r-quickly-generate-reverse-shells-privesc-commands-more-0201614/"><img src="https://img.wonderhowto.com/img/14/37/63699129165042/0/use-one-lin3r-quickly-generate-reverse-shells-privesc-commands-more.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>A lot of time can be wasted performing trivial tasks over and over again, and it's especially true when it comes to hacking and penetration testing. Trying different shells to own a target, and testing out privilege escalation commands afterward, can eat up a lot of time. Fortunately, there is a tool called One-Lin3r that can quickly generate shells, privesc commands, and more.

One-Lin3r is a Python tool that acts as a framework to automate the generation of one-liners commonly used in pentesting and hacking. Its usage is very similar to Metasploit, so it's natural and simple to pick up for<a href="https://null-byte.wonderhowto.com/how-to/use-one-lin3r-quickly-generate-reverse-shells-privesc-commands-more-0201614/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></description>
      <content:encoded><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/use-one-lin3r-quickly-generate-reverse-shells-privesc-commands-more-0201614/"><img src="https://img.wonderhowto.com/img/14/37/63699129165042/0/use-one-lin3r-quickly-generate-reverse-shells-privesc-commands-more.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>A lot of time can be wasted performing trivial tasks over and over again, and it's especially true when it comes to hacking and penetration testing. Trying different shells to own a target, and testing out privilege escalation commands afterward, can eat up a lot of time. Fortunately, there is a tool called One-Lin3r that can quickly generate shells, privesc commands, and more.

One-Lin3r is a Python tool that acts as a framework to automate the generation of one-liners commonly used in pentesting and hacking. Its usage is very similar to Metasploit, so it's natural and simple to pick up for<a href="https://null-byte.wonderhowto.com/how-to/use-one-lin3r-quickly-generate-reverse-shells-privesc-commands-more-0201614/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></content:encoded>
      <pubDate>Tue, 16 Jun 2020 23:00:00 GMT</pubDate>
      <guid isPermaLink="true">https://null-byte.wonderhowto.com/how-to/use-one-lin3r-quickly-generate-reverse-shells-privesc-commands-more-0201614/</guid>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">drd_</dc:creator>
      <dc:publisher xmlns:dc="http://purl.org/dc/elements/1.1/">WonderHowTo</dc:publisher>
      <media:title>How to Use One-Lin3r to Quickly Generate Reverse Shells, Privesc Commands &amp; More</media:title>
      <media:description type="html"><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/use-one-lin3r-quickly-generate-reverse-shells-privesc-commands-more-0201614/"><img src="https://img.wonderhowto.com/img/14/37/63699129165042/0/use-one-lin3r-quickly-generate-reverse-shells-privesc-commands-more.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>A lot of time can be wasted performing trivial tasks over and over again, and it's especially true when it comes to hacking and penetration testing. Trying different shells to own a target, and testing out privilege escalation commands afterward, can eat up a lot of time. Fortunately, there is a tool called One-Lin3r that can quickly generate shells, privesc commands, and more.

One-Lin3r is a Python tool that acts as a framework to automate the generation of one-liners commonly used in pentesting and hacking. Its usage is very similar to Metasploit, so it's natural and simple to pick up for<a href="https://null-byte.wonderhowto.com/how-to/use-one-lin3r-quickly-generate-reverse-shells-privesc-commands-more-0201614/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></media:description>
      <media:thumbnail url="https://img.wonderhowto.com/img/14/37/63699129165042/0/use-one-lin3r-quickly-generate-reverse-shells-privesc-commands-more.1280x600.jpg" width="1280" height="600" />
      <media:rating scheme="urn:mpaa">g</media:rating>
      <media:content duration="85" medium="video" lang="en" />
      <media:player url="https://null-byte.wonderhowto.com/how-to/use-one-lin3r-quickly-generate-reverse-shells-privesc-commands-more-0201614/" />
    </item>
    <item>
      <title>Become a Computer Forensics Pro with This $29 Training</title>
      <link>https://null-byte.wonderhowto.com/how-to/become-computer-forensics-pro-with-29-training-0317514/</link>
      <comments>https://null-byte.wonderhowto.com/how-to/become-computer-forensics-pro-with-29-training-0317514/#comments</comments>
      <description><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/become-computer-forensics-pro-with-29-training-0317514/"><img src="https://img.wonderhowto.com/img/33/72/63727838152302/0/become-computer-forensics-pro-with-29-training.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>The increasingly important world of white hat or "ethical" hacking is getting competitive. Thanks to growing salaries and opportunities for talented and trained coding pros who can infiltrate servers and safeguard networks against digital threats, demand for intrepid cyber warriors is through the roof, and it shows no signs of slowing down any time soon.

That means that if you want to stand out from the crowd and land the best positions in the field, you need to find a niche or specialization — something that shows current and future employers that you have what it takes to be an expert in a<a href="https://null-byte.wonderhowto.com/how-to/become-computer-forensics-pro-with-29-training-0317514/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></description>
      <content:encoded><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/become-computer-forensics-pro-with-29-training-0317514/"><img src="https://img.wonderhowto.com/img/33/72/63727838152302/0/become-computer-forensics-pro-with-29-training.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>The increasingly important world of white hat or "ethical" hacking is getting competitive. Thanks to growing salaries and opportunities for talented and trained coding pros who can infiltrate servers and safeguard networks against digital threats, demand for intrepid cyber warriors is through the roof, and it shows no signs of slowing down any time soon.

That means that if you want to stand out from the crowd and land the best positions in the field, you need to find a niche or specialization — something that shows current and future employers that you have what it takes to be an expert in a<a href="https://null-byte.wonderhowto.com/how-to/become-computer-forensics-pro-with-29-training-0317514/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></content:encoded>
      <pubDate>Tue, 16 Jun 2020 10:00:02 GMT</pubDate>
      <guid isPermaLink="true">https://null-byte.wonderhowto.com/how-to/become-computer-forensics-pro-with-29-training-0317514/</guid>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">The Hookup</dc:creator>
      <dc:publisher xmlns:dc="http://purl.org/dc/elements/1.1/">WonderHowTo</dc:publisher>
      <media:title>Become a Computer Forensics Pro with This $29 Training</media:title>
      <media:description type="html"><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/become-computer-forensics-pro-with-29-training-0317514/"><img src="https://img.wonderhowto.com/img/33/72/63727838152302/0/become-computer-forensics-pro-with-29-training.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>The increasingly important world of white hat or "ethical" hacking is getting competitive. Thanks to growing salaries and opportunities for talented and trained coding pros who can infiltrate servers and safeguard networks against digital threats, demand for intrepid cyber warriors is through the roof, and it shows no signs of slowing down any time soon.

That means that if you want to stand out from the crowd and land the best positions in the field, you need to find a niche or specialization — something that shows current and future employers that you have what it takes to be an expert in a<a href="https://null-byte.wonderhowto.com/how-to/become-computer-forensics-pro-with-29-training-0317514/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></media:description>
      <media:thumbnail url="https://img.wonderhowto.com/img/33/72/63727838152302/0/become-computer-forensics-pro-with-29-training.1280x600.jpg" width="1280" height="600" />
      <media:rating scheme="urn:mpaa">g</media:rating>
    </item>
    <item>
      <title>This Extensive Python Training Is Under $40 Today</title>
      <link>https://null-byte.wonderhowto.com/how-to/extensive-python-training-is-under-40-today-0316081/</link>
      <comments>https://null-byte.wonderhowto.com/how-to/extensive-python-training-is-under-40-today-0316081/#comments</comments>
      <description><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/extensive-python-training-is-under-40-today-0316081/"><img src="https://img.wonderhowto.com/img/90/62/63727575289948/0/extensive-python-training-is-under-40-today.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>Choosing which programming language to learn next can seem like a nearly impossible task, regardless of whether you're a novice developer or a seasoned coding pro with years of experience creating apps and websites. But if you haven't already learned Python, look no further.

We've already established why Python is an excellent programming language for penetration testers, white-hat hackers, and those in cybersecurity, so we won't repeat ourselves. Instead, check out our post on the benefits of Python for hacking to read more about why you need to hone your Python skills.

In general, Python<a href="https://null-byte.wonderhowto.com/how-to/extensive-python-training-is-under-40-today-0316081/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></description>
      <content:encoded><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/extensive-python-training-is-under-40-today-0316081/"><img src="https://img.wonderhowto.com/img/90/62/63727575289948/0/extensive-python-training-is-under-40-today.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>Choosing which programming language to learn next can seem like a nearly impossible task, regardless of whether you're a novice developer or a seasoned coding pro with years of experience creating apps and websites. But if you haven't already learned Python, look no further.

We've already established why Python is an excellent programming language for penetration testers, white-hat hackers, and those in cybersecurity, so we won't repeat ourselves. Instead, check out our post on the benefits of Python for hacking to read more about why you need to hone your Python skills.

In general, Python<a href="https://null-byte.wonderhowto.com/how-to/extensive-python-training-is-under-40-today-0316081/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></content:encoded>
      <pubDate>Fri, 12 Jun 2020 23:18:43 GMT</pubDate>
      <guid isPermaLink="true">https://null-byte.wonderhowto.com/how-to/extensive-python-training-is-under-40-today-0316081/</guid>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">The Hookup</dc:creator>
      <dc:publisher xmlns:dc="http://purl.org/dc/elements/1.1/">WonderHowTo</dc:publisher>
      <media:title>This Extensive Python Training Is Under $40 Today</media:title>
      <media:description type="html"><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/extensive-python-training-is-under-40-today-0316081/"><img src="https://img.wonderhowto.com/img/90/62/63727575289948/0/extensive-python-training-is-under-40-today.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>Choosing which programming language to learn next can seem like a nearly impossible task, regardless of whether you're a novice developer or a seasoned coding pro with years of experience creating apps and websites. But if you haven't already learned Python, look no further.

We've already established why Python is an excellent programming language for penetration testers, white-hat hackers, and those in cybersecurity, so we won't repeat ourselves. Instead, check out our post on the benefits of Python for hacking to read more about why you need to hone your Python skills.

In general, Python<a href="https://null-byte.wonderhowto.com/how-to/extensive-python-training-is-under-40-today-0316081/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></media:description>
      <media:thumbnail url="https://img.wonderhowto.com/img/90/62/63727575289948/0/extensive-python-training-is-under-40-today.1280x600.jpg" width="1280" height="600" />
      <media:rating scheme="urn:mpaa">g</media:rating>
    </item>
    <item>
      <title>How to Program an ESP8266 or ESP32 Microcontroller Over Wi-Fi with MicroPython</title>
      <link>https://null-byte.wonderhowto.com/how-to/program-esp8266-esp32-microcontroller-over-wi-fi-with-micropython-0212355/</link>
      <comments>https://null-byte.wonderhowto.com/how-to/program-esp8266-esp32-microcontroller-over-wi-fi-with-micropython-0212355/#comments</comments>
      <description><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/program-esp8266-esp32-microcontroller-over-wi-fi-with-micropython-0212355/"><img src="https://img.wonderhowto.com/img/43/08/63727560530636/0/program-esp8266-esp32-microcontroller-over-wi-fi-with-micropython.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>The only thing better than programming MicroPython is programming MicroPython over Wi-Fi. So once you set up MicroPython on a microcontroller and have it on its own power source, you won't need to use a data cable to connect to it whenever you need to interact with it, program it, upload files, or grab data.

The MicroPython REPL interface is very simple, which makes it an attractive option for an ESP8266 or EP32 board, and the WebREPL interface is even more convenient. After setting everything up initially, you can connect and control the board over its Wi-Fi access point, then program or<a href="https://null-byte.wonderhowto.com/how-to/program-esp8266-esp32-microcontroller-over-wi-fi-with-micropython-0212355/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></description>
      <content:encoded><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/program-esp8266-esp32-microcontroller-over-wi-fi-with-micropython-0212355/"><img src="https://img.wonderhowto.com/img/43/08/63727560530636/0/program-esp8266-esp32-microcontroller-over-wi-fi-with-micropython.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>The only thing better than programming MicroPython is programming MicroPython over Wi-Fi. So once you set up MicroPython on a microcontroller and have it on its own power source, you won't need to use a data cable to connect to it whenever you need to interact with it, program it, upload files, or grab data.

The MicroPython REPL interface is very simple, which makes it an attractive option for an ESP8266 or EP32 board, and the WebREPL interface is even more convenient. After setting everything up initially, you can connect and control the board over its Wi-Fi access point, then program or<a href="https://null-byte.wonderhowto.com/how-to/program-esp8266-esp32-microcontroller-over-wi-fi-with-micropython-0212355/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></content:encoded>
      <pubDate>Fri, 12 Jun 2020 19:10:52 GMT</pubDate>
      <guid isPermaLink="true">https://null-byte.wonderhowto.com/how-to/program-esp8266-esp32-microcontroller-over-wi-fi-with-micropython-0212355/</guid>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Retia</dc:creator>
      <dc:publisher xmlns:dc="http://purl.org/dc/elements/1.1/">WonderHowTo</dc:publisher>
      <media:title>How to Program an ESP8266 or ESP32 Microcontroller Over Wi-Fi with MicroPython</media:title>
      <media:description type="html"><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/program-esp8266-esp32-microcontroller-over-wi-fi-with-micropython-0212355/"><img src="https://img.wonderhowto.com/img/43/08/63727560530636/0/program-esp8266-esp32-microcontroller-over-wi-fi-with-micropython.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>The only thing better than programming MicroPython is programming MicroPython over Wi-Fi. So once you set up MicroPython on a microcontroller and have it on its own power source, you won't need to use a data cable to connect to it whenever you need to interact with it, program it, upload files, or grab data.

The MicroPython REPL interface is very simple, which makes it an attractive option for an ESP8266 or EP32 board, and the WebREPL interface is even more convenient. After setting everything up initially, you can connect and control the board over its Wi-Fi access point, then program or<a href="https://null-byte.wonderhowto.com/how-to/program-esp8266-esp32-microcontroller-over-wi-fi-with-micropython-0212355/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></media:description>
      <media:thumbnail url="https://img.wonderhowto.com/img/43/08/63727560530636/0/program-esp8266-esp32-microcontroller-over-wi-fi-with-micropython.1280x600.jpg" width="1280" height="600" />
      <media:rating scheme="urn:mpaa">g</media:rating>
      <media:content duration="71" medium="video" lang="en" />
      <media:player url="https://null-byte.wonderhowto.com/how-to/program-esp8266-esp32-microcontroller-over-wi-fi-with-micropython-0212355/" />
    </item>
    <item>
      <title>How to Write Your Own Bash Script to Automate Recon</title>
      <link>https://null-byte.wonderhowto.com/how-to/write-your-own-bash-script-automate-recon-0302808/</link>
      <comments>https://null-byte.wonderhowto.com/how-to/write-your-own-bash-script-automate-recon-0302808/#comments</comments>
      <description><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/write-your-own-bash-script-automate-recon-0302808/"><img src="https://img.wonderhowto.com/img/30/88/63724355018754/0/write-your-own-bash-script-automate-recon.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>Automation has been a buzz word for quite some time now, but the principles behind it are as strong as ever. For a hacker or pentester, Bash scripting is one form of automation that cannot be ignored. Virtually any command that can be run from the terminal can be scripted — and should be, in many cases — to save valuable time and effort. And a Bash script just happens to be great for recon.

Step 1: Start the Script

To get started, create a Bash script and name it whatever you like. I'll call mine recon.sh. Using your favorite text editor, make the first line look like this:

[code]

This is<a href="https://null-byte.wonderhowto.com/how-to/write-your-own-bash-script-automate-recon-0302808/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></description>
      <content:encoded><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/write-your-own-bash-script-automate-recon-0302808/"><img src="https://img.wonderhowto.com/img/30/88/63724355018754/0/write-your-own-bash-script-automate-recon.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>Automation has been a buzz word for quite some time now, but the principles behind it are as strong as ever. For a hacker or pentester, Bash scripting is one form of automation that cannot be ignored. Virtually any command that can be run from the terminal can be scripted — and should be, in many cases — to save valuable time and effort. And a Bash script just happens to be great for recon.

Step 1: Start the Script

To get started, create a Bash script and name it whatever you like. I'll call mine recon.sh. Using your favorite text editor, make the first line look like this:

[code]

This is<a href="https://null-byte.wonderhowto.com/how-to/write-your-own-bash-script-automate-recon-0302808/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></content:encoded>
      <pubDate>Thu, 11 Jun 2020 23:28:00 GMT</pubDate>
      <guid isPermaLink="true">https://null-byte.wonderhowto.com/how-to/write-your-own-bash-script-automate-recon-0302808/</guid>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">drd_</dc:creator>
      <dc:publisher xmlns:dc="http://purl.org/dc/elements/1.1/">WonderHowTo</dc:publisher>
      <media:title>How to Write Your Own Bash Script to Automate Recon</media:title>
      <media:description type="html"><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/write-your-own-bash-script-automate-recon-0302808/"><img src="https://img.wonderhowto.com/img/30/88/63724355018754/0/write-your-own-bash-script-automate-recon.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>Automation has been a buzz word for quite some time now, but the principles behind it are as strong as ever. For a hacker or pentester, Bash scripting is one form of automation that cannot be ignored. Virtually any command that can be run from the terminal can be scripted — and should be, in many cases — to save valuable time and effort. And a Bash script just happens to be great for recon.

Step 1: Start the Script

To get started, create a Bash script and name it whatever you like. I'll call mine recon.sh. Using your favorite text editor, make the first line look like this:

[code]

This is<a href="https://null-byte.wonderhowto.com/how-to/write-your-own-bash-script-automate-recon-0302808/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></media:description>
      <media:thumbnail url="https://img.wonderhowto.com/img/30/88/63724355018754/0/write-your-own-bash-script-automate-recon.1280x600.jpg" width="1280" height="600" />
      <media:rating scheme="urn:mpaa">g</media:rating>
    </item>
    <item>
      <title>Lock Down Your DNS with a Pi-Hole to Avoid Trackers, Phishing Sites &amp; More</title>
      <link>https://null-byte.wonderhowto.com/how-to/lock-down-your-dns-with-pi-hole-avoid-trackers-phishing-sites-more-0189751/</link>
      <comments>https://null-byte.wonderhowto.com/how-to/lock-down-your-dns-with-pi-hole-avoid-trackers-phishing-sites-more-0189751/#comments</comments>
      <description><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/lock-down-your-dns-with-pi-hole-avoid-trackers-phishing-sites-more-0189751/"><img src="https://img.wonderhowto.com/img/90/94/63691092220921/0/lock-down-your-dns-with-pi-hole-avoid-trackers-phishing-sites-more.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>The Pi-hole project is a popular DNS-level ad blocker, but it can be much more than that. Its DNS-level filtering can also be used as a firewall of sorts to prevent malicious websites from resolving, as well as to keep privacy-killing trackers such as Google Analytics from ever loading in the browser. Let's take a look at setting a Pi-hole up and customizing a blacklist to suit your needs.

If you're not familiar with what DNS is, let's start there.

A domain name server, or DNS, is the equivalent of the internet's address book. It's what translates between human-readable websites such as<a href="https://null-byte.wonderhowto.com/how-to/lock-down-your-dns-with-pi-hole-avoid-trackers-phishing-sites-more-0189751/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></description>
      <content:encoded><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/lock-down-your-dns-with-pi-hole-avoid-trackers-phishing-sites-more-0189751/"><img src="https://img.wonderhowto.com/img/90/94/63691092220921/0/lock-down-your-dns-with-pi-hole-avoid-trackers-phishing-sites-more.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>The Pi-hole project is a popular DNS-level ad blocker, but it can be much more than that. Its DNS-level filtering can also be used as a firewall of sorts to prevent malicious websites from resolving, as well as to keep privacy-killing trackers such as Google Analytics from ever loading in the browser. Let's take a look at setting a Pi-hole up and customizing a blacklist to suit your needs.

If you're not familiar with what DNS is, let's start there.

A domain name server, or DNS, is the equivalent of the internet's address book. It's what translates between human-readable websites such as<a href="https://null-byte.wonderhowto.com/how-to/lock-down-your-dns-with-pi-hole-avoid-trackers-phishing-sites-more-0189751/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></content:encoded>
      <pubDate>Wed, 10 Jun 2020 22:16:00 GMT</pubDate>
      <guid isPermaLink="true">https://null-byte.wonderhowto.com/how-to/lock-down-your-dns-with-pi-hole-avoid-trackers-phishing-sites-more-0189751/</guid>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Hoid</dc:creator>
      <dc:publisher xmlns:dc="http://purl.org/dc/elements/1.1/">WonderHowTo</dc:publisher>
      <media:title>Lock Down Your DNS with a Pi-Hole to Avoid Trackers, Phishing Sites &amp; More</media:title>
      <media:description type="html"><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/lock-down-your-dns-with-pi-hole-avoid-trackers-phishing-sites-more-0189751/"><img src="https://img.wonderhowto.com/img/90/94/63691092220921/0/lock-down-your-dns-with-pi-hole-avoid-trackers-phishing-sites-more.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>The Pi-hole project is a popular DNS-level ad blocker, but it can be much more than that. Its DNS-level filtering can also be used as a firewall of sorts to prevent malicious websites from resolving, as well as to keep privacy-killing trackers such as Google Analytics from ever loading in the browser. Let's take a look at setting a Pi-hole up and customizing a blacklist to suit your needs.

If you're not familiar with what DNS is, let's start there.

A domain name server, or DNS, is the equivalent of the internet's address book. It's what translates between human-readable websites such as<a href="https://null-byte.wonderhowto.com/how-to/lock-down-your-dns-with-pi-hole-avoid-trackers-phishing-sites-more-0189751/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></media:description>
      <media:thumbnail url="https://img.wonderhowto.com/img/90/94/63691092220921/0/lock-down-your-dns-with-pi-hole-avoid-trackers-phishing-sites-more.1280x600.jpg" width="1280" height="600" />
      <media:rating scheme="urn:mpaa">g</media:rating>
      <media:content duration="77" medium="video" lang="en" />
      <media:player url="https://null-byte.wonderhowto.com/how-to/lock-down-your-dns-with-pi-hole-avoid-trackers-phishing-sites-more-0189751/" />
    </item>
    <item>
      <title>Prep for a Lucrative Project Management Career with These Courses</title>
      <link>https://null-byte.wonderhowto.com/how-to/prep-for-lucrative-project-management-career-with-these-courses-0313802/</link>
      <comments>https://null-byte.wonderhowto.com/how-to/prep-for-lucrative-project-management-career-with-these-courses-0313802/#comments</comments>
      <description><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/prep-for-lucrative-project-management-career-with-these-courses-0313802/"><img src="https://img.wonderhowto.com/img/90/76/63726964282357/0/prep-for-lucrative-project-management-career-with-these-courses.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>More and more tech-savvy leaders are flocking to the lucrative and exciting world of project management thanks to the high-pay, analytical environment, and nearly unparalleled flexibility. But this means that competition for the best positions in this dynamic field is fierce. If you want to stand out from the crowd, you're going to need to have more than a few base-level certifications on your résumé.

The Accredited Agile Project Management Bundle by SPOCE will help you earn some of project management's most powerful and coveted certifications so you can outpace the competition, and it's<a href="https://null-byte.wonderhowto.com/how-to/prep-for-lucrative-project-management-career-with-these-courses-0313802/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></description>
      <content:encoded><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/prep-for-lucrative-project-management-career-with-these-courses-0313802/"><img src="https://img.wonderhowto.com/img/90/76/63726964282357/0/prep-for-lucrative-project-management-career-with-these-courses.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>More and more tech-savvy leaders are flocking to the lucrative and exciting world of project management thanks to the high-pay, analytical environment, and nearly unparalleled flexibility. But this means that competition for the best positions in this dynamic field is fierce. If you want to stand out from the crowd, you're going to need to have more than a few base-level certifications on your résumé.

The Accredited Agile Project Management Bundle by SPOCE will help you earn some of project management's most powerful and coveted certifications so you can outpace the competition, and it's<a href="https://null-byte.wonderhowto.com/how-to/prep-for-lucrative-project-management-career-with-these-courses-0313802/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></content:encoded>
      <pubDate>Sun, 07 Jun 2020 19:00:06 GMT</pubDate>
      <guid isPermaLink="true">https://null-byte.wonderhowto.com/how-to/prep-for-lucrative-project-management-career-with-these-courses-0313802/</guid>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">The Hookup</dc:creator>
      <dc:publisher xmlns:dc="http://purl.org/dc/elements/1.1/">WonderHowTo</dc:publisher>
      <media:title>Prep for a Lucrative Project Management Career with These Courses</media:title>
      <media:description type="html"><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/prep-for-lucrative-project-management-career-with-these-courses-0313802/"><img src="https://img.wonderhowto.com/img/90/76/63726964282357/0/prep-for-lucrative-project-management-career-with-these-courses.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>More and more tech-savvy leaders are flocking to the lucrative and exciting world of project management thanks to the high-pay, analytical environment, and nearly unparalleled flexibility. But this means that competition for the best positions in this dynamic field is fierce. If you want to stand out from the crowd, you're going to need to have more than a few base-level certifications on your résumé.

The Accredited Agile Project Management Bundle by SPOCE will help you earn some of project management's most powerful and coveted certifications so you can outpace the competition, and it's<a href="https://null-byte.wonderhowto.com/how-to/prep-for-lucrative-project-management-career-with-these-courses-0313802/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></media:description>
      <media:thumbnail url="https://img.wonderhowto.com/img/90/76/63726964282357/0/prep-for-lucrative-project-management-career-with-these-courses.1280x600.jpg" width="1280" height="600" />
      <media:rating scheme="urn:mpaa">g</media:rating>
    </item>
    <item>
      <title>Become an In-Demand Web Developer with This $29 Training</title>
      <link>https://null-byte.wonderhowto.com/how-to/become-demand-web-developer-with-29-training-0313801/</link>
      <comments>https://null-byte.wonderhowto.com/how-to/become-demand-web-developer-with-29-training-0313801/#comments</comments>
      <description><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/become-demand-web-developer-with-29-training-0313801/"><img src="https://img.wonderhowto.com/img/92/17/63726963243982/0/become-demand-web-developer-with-29-training.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>Knowing just one or two programming languages is no longer sufficient if you want to make serious money in the lucrative world of web design and development. But the good news is that you don't need to spend an excessive amount of time or money on a traditional coding education to get the skills you need to thrive.

The Ultimate 2020 Web Designer & Developer Bundle will teach you everything you need to know about the world's most popular and powerful web development tools and platforms, and it's currently available for over 95% off at $29.

While it has courses on becoming a programmer and<a href="https://null-byte.wonderhowto.com/how-to/become-demand-web-developer-with-29-training-0313801/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></description>
      <content:encoded><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/become-demand-web-developer-with-29-training-0313801/"><img src="https://img.wonderhowto.com/img/92/17/63726963243982/0/become-demand-web-developer-with-29-training.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>Knowing just one or two programming languages is no longer sufficient if you want to make serious money in the lucrative world of web design and development. But the good news is that you don't need to spend an excessive amount of time or money on a traditional coding education to get the skills you need to thrive.

The Ultimate 2020 Web Designer & Developer Bundle will teach you everything you need to know about the world's most popular and powerful web development tools and platforms, and it's currently available for over 95% off at $29.

While it has courses on becoming a programmer and<a href="https://null-byte.wonderhowto.com/how-to/become-demand-web-developer-with-29-training-0313801/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></content:encoded>
      <pubDate>Sat, 06 Jun 2020 19:00:02 GMT</pubDate>
      <guid isPermaLink="true">https://null-byte.wonderhowto.com/how-to/become-demand-web-developer-with-29-training-0313801/</guid>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">The Hookup</dc:creator>
      <dc:publisher xmlns:dc="http://purl.org/dc/elements/1.1/">WonderHowTo</dc:publisher>
      <media:title>Become an In-Demand Web Developer with This $29 Training</media:title>
      <media:description type="html"><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/become-demand-web-developer-with-29-training-0313801/"><img src="https://img.wonderhowto.com/img/92/17/63726963243982/0/become-demand-web-developer-with-29-training.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>Knowing just one or two programming languages is no longer sufficient if you want to make serious money in the lucrative world of web design and development. But the good news is that you don't need to spend an excessive amount of time or money on a traditional coding education to get the skills you need to thrive.

The Ultimate 2020 Web Designer & Developer Bundle will teach you everything you need to know about the world's most popular and powerful web development tools and platforms, and it's currently available for over 95% off at $29.

While it has courses on becoming a programmer and<a href="https://null-byte.wonderhowto.com/how-to/become-demand-web-developer-with-29-training-0313801/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></media:description>
      <media:thumbnail url="https://img.wonderhowto.com/img/92/17/63726963243982/0/become-demand-web-developer-with-29-training.1280x600.jpg" width="1280" height="600" />
      <media:rating scheme="urn:mpaa">g</media:rating>
    </item>
    <item>
      <title>How to Enable Offline Chat Communications Over Wi-Fi with an ESP32</title>
      <link>https://null-byte.wonderhowto.com/how-to/enable-offline-chat-communications-over-wi-fi-with-esp32-0296277/</link>
      <comments>https://null-byte.wonderhowto.com/how-to/enable-offline-chat-communications-over-wi-fi-with-esp32-0296277/#comments</comments>
      <description><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/enable-offline-chat-communications-over-wi-fi-with-esp32-0296277/"><img src="https://img.wonderhowto.com/img/45/76/63726956512761/0/enable-offline-chat-communications-over-wi-fi-with-esp32.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>PirateBox is a great way to communicate with others nearby when cellular and Wi-Fi networks aren't available. With it, you can anonymously share any kind of media or document and even talk to one another by voice — without being online. However, it needs a Raspberry Pi, which is more expensive than ESP32 boards, and if you only need a text-based chat, there's a much simpler option.

With a cheap ESP32 microcontroller and the ChatterBox sketch for Arduino, you can create an offline anonymous chat server for communicating with others via text. As long as they can connect to the ESP32's network<a href="https://null-byte.wonderhowto.com/how-to/enable-offline-chat-communications-over-wi-fi-with-esp32-0296277/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></description>
      <content:encoded><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/enable-offline-chat-communications-over-wi-fi-with-esp32-0296277/"><img src="https://img.wonderhowto.com/img/45/76/63726956512761/0/enable-offline-chat-communications-over-wi-fi-with-esp32.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>PirateBox is a great way to communicate with others nearby when cellular and Wi-Fi networks aren't available. With it, you can anonymously share any kind of media or document and even talk to one another by voice — without being online. However, it needs a Raspberry Pi, which is more expensive than ESP32 boards, and if you only need a text-based chat, there's a much simpler option.

With a cheap ESP32 microcontroller and the ChatterBox sketch for Arduino, you can create an offline anonymous chat server for communicating with others via text. As long as they can connect to the ESP32's network<a href="https://null-byte.wonderhowto.com/how-to/enable-offline-chat-communications-over-wi-fi-with-esp32-0296277/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></content:encoded>
      <pubDate>Fri, 05 Jun 2020 19:48:00 GMT</pubDate>
      <guid isPermaLink="true">https://null-byte.wonderhowto.com/how-to/enable-offline-chat-communications-over-wi-fi-with-esp32-0296277/</guid>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Retia</dc:creator>
      <dc:publisher xmlns:dc="http://purl.org/dc/elements/1.1/">WonderHowTo</dc:publisher>
      <media:title>How to Enable Offline Chat Communications Over Wi-Fi with an ESP32</media:title>
      <media:description type="html"><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/enable-offline-chat-communications-over-wi-fi-with-esp32-0296277/"><img src="https://img.wonderhowto.com/img/45/76/63726956512761/0/enable-offline-chat-communications-over-wi-fi-with-esp32.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>PirateBox is a great way to communicate with others nearby when cellular and Wi-Fi networks aren't available. With it, you can anonymously share any kind of media or document and even talk to one another by voice — without being online. However, it needs a Raspberry Pi, which is more expensive than ESP32 boards, and if you only need a text-based chat, there's a much simpler option.

With a cheap ESP32 microcontroller and the ChatterBox sketch for Arduino, you can create an offline anonymous chat server for communicating with others via text. As long as they can connect to the ESP32's network<a href="https://null-byte.wonderhowto.com/how-to/enable-offline-chat-communications-over-wi-fi-with-esp32-0296277/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></media:description>
      <media:thumbnail url="https://img.wonderhowto.com/img/45/76/63726956512761/0/enable-offline-chat-communications-over-wi-fi-with-esp32.1280x600.jpg" width="1280" height="600" />
      <media:rating scheme="urn:mpaa">g</media:rating>
      <media:content duration="103" medium="video" lang="en" />
      <media:player url="https://null-byte.wonderhowto.com/how-to/enable-offline-chat-communications-over-wi-fi-with-esp32-0296277/" />
    </item>
    <item>
      <title>Build an Off-Grid Wi-Fi Voice Communication System with Android &amp; Raspberry Pi</title>
      <link>https://null-byte.wonderhowto.com/how-to/build-off-grid-wi-fi-voice-communication-system-with-android-raspberry-pi-0296270/</link>
      <comments>https://null-byte.wonderhowto.com/how-to/build-off-grid-wi-fi-voice-communication-system-with-android-raspberry-pi-0296270/#comments</comments>
      <description><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/build-off-grid-wi-fi-voice-communication-system-with-android-raspberry-pi-0296270/"><img src="https://img.wonderhowto.com/img/33/54/63622721305292/0/build-off-grid-wi-fi-voice-communication-system-with-android-raspberry-pi.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>When you don't have a steady cellular signal or immediate Wi-Fi access but need to communicate with others around you, you can set up an off-the-grid voice communications network using a Raspberry Pi and an Android app.

There are apps such as Bridgefy that will create a mesh network to communicate with other devices over Bluetooth. Still, when you're traveling in a convoy and want to message people in other vehicles, all the metal will make that nearly impossible. Even in situations where you're outside, but there are a lot of obstructions to block a Bluetooth signal, you're better off using<a href="https://null-byte.wonderhowto.com/how-to/build-off-grid-wi-fi-voice-communication-system-with-android-raspberry-pi-0296270/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></description>
      <content:encoded><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/build-off-grid-wi-fi-voice-communication-system-with-android-raspberry-pi-0296270/"><img src="https://img.wonderhowto.com/img/33/54/63622721305292/0/build-off-grid-wi-fi-voice-communication-system-with-android-raspberry-pi.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>When you don't have a steady cellular signal or immediate Wi-Fi access but need to communicate with others around you, you can set up an off-the-grid voice communications network using a Raspberry Pi and an Android app.

There are apps such as Bridgefy that will create a mesh network to communicate with other devices over Bluetooth. Still, when you're traveling in a convoy and want to message people in other vehicles, all the metal will make that nearly impossible. Even in situations where you're outside, but there are a lot of obstructions to block a Bluetooth signal, you're better off using<a href="https://null-byte.wonderhowto.com/how-to/build-off-grid-wi-fi-voice-communication-system-with-android-raspberry-pi-0296270/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></content:encoded>
      <pubDate>Fri, 05 Jun 2020 00:30:00 GMT</pubDate>
      <guid isPermaLink="true">https://null-byte.wonderhowto.com/how-to/build-off-grid-wi-fi-voice-communication-system-with-android-raspberry-pi-0296270/</guid>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Retia</dc:creator>
      <dc:publisher xmlns:dc="http://purl.org/dc/elements/1.1/">WonderHowTo</dc:publisher>
      <media:title>Build an Off-Grid Wi-Fi Voice Communication System with Android &amp; Raspberry Pi</media:title>
      <media:description type="html"><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/build-off-grid-wi-fi-voice-communication-system-with-android-raspberry-pi-0296270/"><img src="https://img.wonderhowto.com/img/33/54/63622721305292/0/build-off-grid-wi-fi-voice-communication-system-with-android-raspberry-pi.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>When you don't have a steady cellular signal or immediate Wi-Fi access but need to communicate with others around you, you can set up an off-the-grid voice communications network using a Raspberry Pi and an Android app.

There are apps such as Bridgefy that will create a mesh network to communicate with other devices over Bluetooth. Still, when you're traveling in a convoy and want to message people in other vehicles, all the metal will make that nearly impossible. Even in situations where you're outside, but there are a lot of obstructions to block a Bluetooth signal, you're better off using<a href="https://null-byte.wonderhowto.com/how-to/build-off-grid-wi-fi-voice-communication-system-with-android-raspberry-pi-0296270/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></media:description>
      <media:thumbnail url="https://img.wonderhowto.com/img/33/54/63622721305292/0/build-off-grid-wi-fi-voice-communication-system-with-android-raspberry-pi.1280x600.jpg" width="1280" height="600" />
      <media:rating scheme="urn:mpaa">g</media:rating>
      <media:content duration="70" medium="video" lang="en" />
      <media:player url="https://null-byte.wonderhowto.com/how-to/build-off-grid-wi-fi-voice-communication-system-with-android-raspberry-pi-0296270/" />
    </item>
    <item>
      <title>Python 2 vs. Python 3 — Important Differences Every Hacker Should Know</title>
      <link>https://null-byte.wonderhowto.com/how-to/python-2-vs-python-3-important-differences-every-hacker-should-know-0302809/</link>
      <comments>https://null-byte.wonderhowto.com/how-to/python-2-vs-python-3-important-differences-every-hacker-should-know-0302809/#comments</comments>
      <description><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/python-2-vs-python-3-important-differences-every-hacker-should-know-0302809/"><img src="https://img.wonderhowto.com/img/03/37/63726799642561/0/python-2-vs-python-3-important-differences-every-hacker-should-know.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>Python is commonly touted as one of the best programming languages for beginners to learn, and its straightforward syntax and functionality makes that hard to argue with. But a lot of tutorials still use Python 2, which is outdated now. Python 3 introduces many new features, and it's important to be aware of them going forward, as well as the key differences between Python 3 and its predecessor.

Python 2 was first released in 2000. It improved upon earlier versions of the language and introduced features common to other programming languages such as garbage collection, list comprehension, and<a href="https://null-byte.wonderhowto.com/how-to/python-2-vs-python-3-important-differences-every-hacker-should-know-0302809/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></description>
      <content:encoded><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/python-2-vs-python-3-important-differences-every-hacker-should-know-0302809/"><img src="https://img.wonderhowto.com/img/03/37/63726799642561/0/python-2-vs-python-3-important-differences-every-hacker-should-know.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>Python is commonly touted as one of the best programming languages for beginners to learn, and its straightforward syntax and functionality makes that hard to argue with. But a lot of tutorials still use Python 2, which is outdated now. Python 3 introduces many new features, and it's important to be aware of them going forward, as well as the key differences between Python 3 and its predecessor.

Python 2 was first released in 2000. It improved upon earlier versions of the language and introduced features common to other programming languages such as garbage collection, list comprehension, and<a href="https://null-byte.wonderhowto.com/how-to/python-2-vs-python-3-important-differences-every-hacker-should-know-0302809/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></content:encoded>
      <pubDate>Wed, 03 Jun 2020 23:48:00 GMT</pubDate>
      <guid isPermaLink="true">https://null-byte.wonderhowto.com/how-to/python-2-vs-python-3-important-differences-every-hacker-should-know-0302809/</guid>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">drd_</dc:creator>
      <dc:publisher xmlns:dc="http://purl.org/dc/elements/1.1/">WonderHowTo</dc:publisher>
      <media:title>Python 2 vs. Python 3 — Important Differences Every Hacker Should Know</media:title>
      <media:description type="html"><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/python-2-vs-python-3-important-differences-every-hacker-should-know-0302809/"><img src="https://img.wonderhowto.com/img/03/37/63726799642561/0/python-2-vs-python-3-important-differences-every-hacker-should-know.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>Python is commonly touted as one of the best programming languages for beginners to learn, and its straightforward syntax and functionality makes that hard to argue with. But a lot of tutorials still use Python 2, which is outdated now. Python 3 introduces many new features, and it's important to be aware of them going forward, as well as the key differences between Python 3 and its predecessor.

Python 2 was first released in 2000. It improved upon earlier versions of the language and introduced features common to other programming languages such as garbage collection, list comprehension, and<a href="https://null-byte.wonderhowto.com/how-to/python-2-vs-python-3-important-differences-every-hacker-should-know-0302809/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></media:description>
      <media:thumbnail url="https://img.wonderhowto.com/img/03/37/63726799642561/0/python-2-vs-python-3-important-differences-every-hacker-should-know.1280x600.jpg" width="1280" height="600" />
      <media:rating scheme="urn:mpaa">g</media:rating>
    </item>
    <item>
      <title>Become an In-Demand IT Pro with This Cisco Training</title>
      <link>https://null-byte.wonderhowto.com/how-to/become-demand-pro-with-cisco-training-0312994/</link>
      <comments>https://null-byte.wonderhowto.com/how-to/become-demand-pro-with-cisco-training-0312994/#comments</comments>
      <description><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/become-demand-pro-with-cisco-training-0312994/"><img src="https://img.wonderhowto.com/img/73/06/63726625961373/0/become-demand-pro-with-cisco-training.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>There are countless ways in which a talented and trained programmer and tech pro can earn a lucrative living in an increasingly data-driven age — from writing and creating apps and games to working for a cybersecurity firm or even the federal government.

But you can also opt for a stable and high-paying career in the world of IT, where avid tech enthusiasts are being employed to perform a wide range of lucrative jobs ranging from server installation and maintenance to white-hat hacking and security implementation.

If you want to be competitive in this demanding field, you're going to need to<a href="https://null-byte.wonderhowto.com/how-to/become-demand-pro-with-cisco-training-0312994/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></description>
      <content:encoded><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/become-demand-pro-with-cisco-training-0312994/"><img src="https://img.wonderhowto.com/img/73/06/63726625961373/0/become-demand-pro-with-cisco-training.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>There are countless ways in which a talented and trained programmer and tech pro can earn a lucrative living in an increasingly data-driven age — from writing and creating apps and games to working for a cybersecurity firm or even the federal government.

But you can also opt for a stable and high-paying career in the world of IT, where avid tech enthusiasts are being employed to perform a wide range of lucrative jobs ranging from server installation and maintenance to white-hat hacking and security implementation.

If you want to be competitive in this demanding field, you're going to need to<a href="https://null-byte.wonderhowto.com/how-to/become-demand-pro-with-cisco-training-0312994/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></content:encoded>
      <pubDate>Wed, 03 Jun 2020 10:00:01 GMT</pubDate>
      <guid isPermaLink="true">https://null-byte.wonderhowto.com/how-to/become-demand-pro-with-cisco-training-0312994/</guid>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">The Hookup</dc:creator>
      <dc:publisher xmlns:dc="http://purl.org/dc/elements/1.1/">WonderHowTo</dc:publisher>
      <media:title>Become an In-Demand IT Pro with This Cisco Training</media:title>
      <media:description type="html"><![CDATA[<div><div><center><a href="https://null-byte.wonderhowto.com/how-to/become-demand-pro-with-cisco-training-0312994/"><img src="https://img.wonderhowto.com/img/73/06/63726625961373/0/become-demand-pro-with-cisco-training.1280x600.jpg" width="600" height="280" border="0" /></a></center></div> <p>There are countless ways in which a talented and trained programmer and tech pro can earn a lucrative living in an increasingly data-driven age — from writing and creating apps and games to working for a cybersecurity firm or even the federal government.

But you can also opt for a stable and high-paying career in the world of IT, where avid tech enthusiasts are being employed to perform a wide range of lucrative jobs ranging from server installation and maintenance to white-hat hacking and security implementation.

If you want to be competitive in this demanding field, you're going to need to<a href="https://null-byte.wonderhowto.com/how-to/become-demand-pro-with-cisco-training-0312994/">... more</a></p><span style="clear:both;display:block;overflow:hidden;height:0;"></span></div>]]></media:description>
      <media:thumbnail url="https://img.wonderhowto.com/img/73/06/63726625961373/0/become-demand-pro-with-cisco-training.1280x600.jpg" width="1280" height="600" />
      <media:rating scheme="urn:mpaa">g</media:rating>
    </item>
  </channel>
</rss>