Header Banner
wonderhowto.mark.png
Gadget Hacks Next Reality Food Hacks Null Byte The Secret Yumiverse Invisiverse Macgyverisms Mind Hacks Mad Science Lock Picking Driverless
Linux
World map overlay on a digital green binary background.
HOW TO
02/14/2025 7:54 pm

How to Get Started Writing Your Own NSE Scripts for Nmap

The road to becoming a skilled white hat is paved with many milestones, one of those being learning how to perform a simple Nmap scan. A little further down that road lies more advanced scanning, along with utilizing a powerful feature of Nmap called the Nmap Scripting Engine. Even further down the ...more

Security camera mounted on a building.
HOW TO
02/14/2025 6:36 pm

How to Intercept Images from a Security Camera Using Wireshark

It's common for IoT devices like Wi-Fi security cameras to host a website for controlling or configuring the camera that uses HTTP instead of the more secure HTTPS. This means anyone with the network password can see traffic to and from the camera, allowing a hacker to intercept security camera foot ...more

Digital illustration of an eye overlaying a world map, symbolizing global vision or oversight.
HOW TO
02/14/2025 6:33 pm

How to Easily Detect CVEs with Nmap Scripts

Nmap is possibly the most widely used security scanner of its kind, in part because of its appearances in films such as The Matrix Reloaded and Live Free or Die Hard. Still, most of Nmap's best features are under-appreciated by hackers and pentesters, one of which will improve one's abilities to qui ...more

Code snippet displaying a terminal connection to a remote server.
HOW TO
02/14/2025 6:29 pm

How to Use the Chrome Browser Secure Shell App to SSH into Remote Devices

Many guides on Null Byte require using the Secure Shell (SSH) to connect to a remote server. Unfortunately for beginners, learning to use SSH can become a confusing mix of third-party programs and native OS support. For Chrome OS users, using SSH is even more difficult. We'll fix this by using the C ...more

Code snippet showcasing Python programming.
HOW TO
02/14/2025 6:12 pm

An Intro to Vim, the Unix Text Editor Every Hacker Should Be Familiar With

As pentesters and hackers, we're going to be working with text frequently — wordlists, configuration files, etc. A lot of this we'll be doing on our machine, where we have access to whatever editor we prefer. The rest of it will be on remote machines, where the tools for editing will be limited. If ...more

Coding interface with lines of code and a colorful graphic of a character.
HOW TO
02/14/2025 6:08 pm

How to Encrypt Your Notes, Photos, and Archives with EncryptPad

For anyone wanting to keep information private, plain text is a format of the past. Instead, cheap, powerful encryption is widely available, but often not easy enough to use to attract widespread adoption. An exception to this rule is EncryptPad, an easy to use application that lets you encrypt text ...more

636807495536935129.jpg
HOW TO
02/14/2025 6:01 pm

How to Locate and Exploit Devices Vulnerable to the Libssh Security Flaw

Computers all over the world rely on a program called "libssh" to use the SSH communications protocol, which allows trusted users to log in and administer computers remotely. Due to a flaw in libssh, fooling a computer into granting SSH access is as easy as telling it you already have permission. Th ...more

636751596298574714.jpg
HOW TO
02/14/2025 5:52 pm

How to Exploit Recycled Credentials with H8mail to Break into User Accounts

Many online users worry about their accounts being breached by some master hacker, but the more likely scenario is falling victim to a bot written to use leaked passwords in data breaches from companies like LinkedIn, MySpace, and Tumblr. For instance, a tool called H8mail can search through over 1 ...more

638544862469343725.jpg
HOW TO
06/20/2024 8:20 pm

How to Remove or Add 'Where from' Metadata in Files on macOS

When you download files from certain apps like Safari and Chrome on your Mac, those files are tagged with the "Where from" metadata attribute. Depending on where the file was downloaded from, this attribute may refer to the host's URL, a sender's email address, or another piece of identifying inform ...more

638532842285270498.jpg
HOW TO
06/06/2024 10:25 pm

12 Reasons Why You Should Be Using Text Replacements on Your iPhone, iPad, or Mac

You probably know of Apple's Text Replacement feature for iOS, iPadOS, and macOS, but you're probably not using it as much as you should. With it, you can create your own keyboard triggers for almost anything you can think of, whether it's an email address or an entire email. There are endless reaso ...more

Close-up of a smartphone keyboard with text entry field.
HOW TO
06/03/2024 8:30 pm

How to Unlock the Apple Logo Emoji on Your iPhone, iPad, or Mac

Thousands of emoji are available on iPhone, iPad, and Mac, and you can use these in many of the apps you have installed on your Apple devices. But there's one emoji you'll likely never see on any of Apple's official emoji keyboards, and its absence may surprise you at first, considering it's embedde ...more

Devices displaying apps on a wooden surface.
HOW TO
10/11/2023 3:55 pm

Top 9 Task Managers for iPhone and iPad

When you want a helpful task manager on your iPhone or iPad, any of the nine apps in this guide should be at the top of your list. But we'll review each app's features to help you determine which one might be best for your workflow. Using a task manager on your iPhone or iPad can help you organize, ...more

Raspberry Pi network scanning tool output displayed in terminal.
HOW TO
09/11/2023 5:33 pm

Discover & Attack Raspberry Pis Using Default Credentials with Rpi-hunter

When setting up a Raspberry Pi, it's easy to overlook changing the default password. Like many IoT devices, the Raspberry Pi's default Raspbian operating system installs with a widely-known default password, leaving the device vulnerable to remote access. Using a tool called rpi-hunter, hackers can ...more

Smartphone with an orange bow on a colorful celebration background.
NEWS
07/25/2023 11:33 pm

Gift Guide: The Best Android Accessories to Buy for the Techy Person in Your Life

Need a unique gift idea for the techy person in your life? Look no further than that phone they always have in their hand. There are plenty of great accessories, apps, subscriptions, and other smartphone-related goodies that will improve their quality of life, and thoughtful gifts like that are alwa ...more

Text message on a smartphone screen reading "Steganography is cool" with options for cut, copy, paste, and share.
HOW TO
08/03/2022 2:40 am

Use Invisible Zero-Width Characters to Hide Secret Messages in Plain Sight

With a simple web-based tool, you can hide secret messages for family, friends, and fellow spies inside of plain text communications, and anyone that intercepts the messages will be none the wiser. Steganography is the art of hiding secret messages comprised of text, code, audio, images, video, docu ...more

Smartphone notification displaying a calendar event for a coffee meeting.
HOW TO
02/01/2022 10:00 pm

Is Your Phone Getting Android 12? We've Got Answers

Android 12 was released to the Google Pixel devices on Oct. 19, 2021, so anyone with a Pixel 3 or newer model can install the new operating system with an over-the-air update. The AOSP version of Android 12 was released a few weeks earlier on Oct. 4, so OEMs could use or modify the source code on th ...more

Young woman smiling and waving while video chatting on a smartphone in a cozy café setting.
HOW TO
06/30/2021 3:51 pm

15 Awesome FaceTime Alternatives for Cross-Platform Video Calls on Android & iOS

In these times of social distancing, video calling is becoming the technological substitute for face-to-face connections. For those who carry an iPhone, the art of video calling defaults to FaceTime, the native app on iOS that is exclusive to Apple devices. But what do you do if you or the other par ...more

A smartphone displaying a playful filter on a person's face.
NEWS
06/30/2021 2:17 pm

Snapchat Extends Its AR Lenses to Viber Messaging App

Yo dawg, Snap heard you using Snapchat augmented reality Lenses in your messages, so it's putting its AR Lenses in other messaging apps. On Wednesday, Rakuten Viber flipped the switch on an update that brings Snapchat's popular AR Lenses to many users of its Viber messaging and voice communications ...more

Computer screens displaying coding and data analysis on a blue background.
HOW TO
06/30/2021 12:00 pm

Up Your Linux Game with This $19.99 Bundle

When we think about operating systems, we tend to view them from the perspective of a user. After all, most of us have spent a substantial amount of time on our computers, and so we've become more than acquainted with the ins and outs of whatever system we have running on our personal device. But th ...more

Smartphone displaying the FaceTime app interface.
HOW TO
06/09/2021 7:59 pm

iOS 15 Lets Android, Linux & Windows Users Join Your FaceTime Chats!

Apple's exclusive chat services, iMessage and FaceTime, force many of us to stay locked into iOS, iPadOS, and macOS to communicate with other Apple users, so chatting with Android-using friends means SMS texts, third-party messaging apps, and third-party video chat services. However, Apple is breaki ...more

Text message conversation asking about starting a FaceTime audio call.
HOW TO
06/09/2021 7:58 pm

The New Way to Start a FaceTime Audio Call from Messages in iOS 15

FaceTime audio calling is a great alternative to regular phone calls on your iPhone because it usually has better audio quality and fewer dropped calls than regular calls over cellular or Wi-Fi calling. Plus, it's easier to start group chats, and you have the choice to turn on your camera. If you fr ...more

Xerodeploit logo in stylized text.
HOW TO
06/08/2021 4:44 pm

Perform Advanced Man-in-the-Middle Attacks with Xerosploit

A man-in-the-middle attack, or MitM attack, is when a hacker gets on a network and forces all nearby devices to connect to their machine directly. This lets them spy on traffic and even modify certain things. Bettercap is one tool that can be used for these types of MitM attacks, but Xerosploit can ...more

Cybersecurity concept with a digital lock and hands on a laptop keyboard.
HOW TO
05/14/2021 11:05 pm

Get a Jump Start into Cybersecurity with This Bundle

Cybersecurity is an industry that isn't going anywhere. After the mass move to online work, the need for more cybersecurity professionals skyrocketed. That demand isn't going away because more and more industries are keeping online and cloud services going for their workers. The 2021 All-in-One Ethi ...more

Digital device with display showing options for scan, select, attack, packet monitor, and clock.
HOW TO
05/14/2021 10:53 pm

Hack Networks & Devices Right from Your Wrist with the Wi-Fi Deauther Watch

The Deauther Watch by Travis Lin is the physical manifestation of the Wi-Fi Deauther project by Spacehuhn, and it's designed to let you operate the Deauther project right from your wrist without needing a computer. That's pretty cool if you want to do all the interesting things that the Wi-Fi Deauth ...more

Computer screens displaying code on a blue background.
HOW TO
05/07/2021 10:24 pm

This Top-Rated Course Will Make You a Linux Master

Linux is a diverse and powerful operating system that virtually every IT professional must learn and know well. Whether you realize it or not, you have likely already used a Linux device, and learning to design things for it is a key step in any Data Science career path. The Mastering Linux Developm ...more

A close-up of a pair of binoculars resting on a surface with a sunset in the background.
HOW TO
05/07/2021 10:14 pm

Fingerprint Web Apps & Servers for Better Recon & More Successful Hacks

Web applications are ubiquitous in the modern online world, and knowing how to attack them is an increasingly valuable skill. But the key to a successful attack is good recon since it's easier to be focused and efficient with the more information you have. There are many fingerprinting tools availab ...more

Person typing on a laptop keyboard in a professional setting.
HOW TO
04/29/2021 9:00 pm

Write Your Own Subdomain Enumeration Script for Better Recon

There are tons of tools out there that do all kinds of recon, but it can be hard to narrow down what to use. A great way to be more efficient is by taking advantage of scripting. This doesn't have to mean writing everything from scratch — it can simply mean integrating existing tools into a single, ...more

Person typing on a laptop displaying data analytics charts, with a coffee mug nearby.
HOW TO
04/27/2021 9:58 pm

Master Linux, Python & Math with This $40 Bundle

IT is a competitive field, and finding success requires more than knowledge of a couple of coding languages or knowing how to google really well. To stand out among your peers and competitors, you should learn everything you can and get as much diverse experience as is available. The 2021 Complete C ...more

Two people collaborating on a coding project, with laptops and coding displayed on screens. A coffee cup is also present.
HOW TO
04/23/2021 11:48 pm

Learn to Code Today with This $20 Web Development Course

Learning to code is difficult, particularly if you're doing it alone. While coding may be among the most valued job skills in many markets, the education is sometimes inaccessible. However, the Introduction to Coding with HTML, CSS & JavaScript course provides five hours of introductory content that ...more

Kali Linux desktop environment with terminal window open.
HOW TO
04/23/2021 11:35 pm

How to Get Started with Kali Linux in 2020

Kali Linux has come a long way since its BackTrack days, and it's still widely considered the ultimate Linux distribution for penetration testing. The system has undergone quite the transformation since its old days and includes an updated look, improved performance, and some significant changes to ...more

Kali Linux boot menu screen.
HOW TO
04/23/2021 11:31 pm

Use Kali Linux as a Portable Live USB for Pen-Testing & Hacking on Any Computer

Kali Linux is the go-to Linux distribution for penetration testing and ethical hacking. Still, it's not recommended for day-to-day use, such as responding to emails, playing games, or checking Facebook. That's why it's better to run your Kali Linux system from a bootable USB drive. The hacker-friend ...more

Smartphone screen showing various app icons, including Twitter and settings.
HOW TO
04/16/2021 11:31 pm

How to Delete the T-Mobile App from Any Android Phone — No Computer Needed

If you buy an Android phone from any of the big US carriers, it will come with several extra apps in addition to any apps the manufacturer preinstalled. It's all in the name of profit, of course. Some of these apps are from companies that paid the carriers to distribute their software, and some are ...more

Person coding on two computer monitors with a Python logo.
HOW TO
04/16/2021 9:17 pm

Master Python, Django, Git & GitHub with This Bundle

If you're looking to get started with your training in web development, a natural starting point is learning to code with Python and then saving and sharing your work on Git and GitHub. These are standard tools of the industry, and mastering them will put you one big step closer to succeeding in the ...more

Silhouette of a person standing in a dimly lit corridor.
HOW TO
04/16/2021 8:45 pm

Wipe the Logs & History on Hacked Linux Systems to Cover Your Tracks

As a hacker, the final stage of exploitation is covering their tracks, which involves wiping all activity and logs so that they can avoid being detected. It's especially crucial for persistence if the target will be accessed again in the future by the attacker. To show you the basics of covering you ...more

Game controller in front of a laptop displaying a programming interface.
HOW TO
04/16/2021 6:58 pm

Learn to Design Games with Unity for Just $39.99

Game design is among the fastest-growing industries in tech. What once was a passing hobby or niche job has become a thriving industry with a huge variety of work. If you are interested in learning game design, either as a hobby or a profession, then The 2021 Complete Learn to Code by Making Games i ...more

Hands typing on a laptop with a data analytics dashboard displayed, beside a mug and pens.
HOW TO
04/10/2021 2:51 am

Master Python, Linux & More with This Training Bundle

Becoming a competitive candidate in IT and Data Science takes more than knowing a few coding languages and being good with computers. To really stand out from the crowd, your knowledge should be extensive and your experience should be diverse. The 2021 Complete Computer Science Training Bundle provi ...more

ASCII art of a chicken and text representation.
HOW TO
03/27/2021 1:17 am

Play Wi-Fi Hacking Games Using Microcontrollers to Practice Wi-Fi Attacks Legally

ESP8266-based microcontrollers can be used to create exciting and legal Wi-Fi hacking games to test your or your friends' Wi-Fi hacking skills. When you first start learning how to hack Wi-Fi, it can be tempting to use your powers on Wi-Fi networks you don't have permission to use. Needless to say, ...more

Pirate-themed wireless router on a table
HOW TO
03/18/2021 4:53 pm

How to Use a Raspberry Pi as a Dead Drop for Anonymous Offline Communication

A PirateBox creates a network that allows users to communicate wirelessly, connecting smartphones and laptops even when surrounding infrastructure has been disabled on purpose or destroyed in a disaster. Using a Raspberry Pi, we will make a wireless offline server that hosts files and a chat room as ...more

QR code displayed on a smartphone screen for sharing content.
HOW TO
03/09/2021 10:53 pm

How to Make a Cute Little Dino QR Code for Any Webpage with Google Chrome

QR codes are so handy. Nowadays, all you have to do to scan one is open your phone's camera app and tap a button. But creating one is a different story — online QR code generators aren't always trustworthy, and most phones don't have a built-in feature for it. Thankfully, Google Chrome now does. Tru ...more

Hand interacting with IoT icons and a globe representation on a digital interface.
HOW TO
03/05/2021 2:09 am

Master the Internet of Things with This Certification Bundle

These days, everything is connected. No, really — we mean everything. Your phone, your smart speaker, and even appliances like stoves and refrigerators can be connected and communicate with one another. Welcome to the Internet of Things, the start of our interconnected future. It's projected by 2027 ...more

Wi-Fi network selection menu on a computer showing available networks.
HOW TO
03/05/2021 1:55 am

There Are Hidden Wi-Fi Networks All Around You — These Attacks Will Find Them

There are hidden Wi-Fi networks all around you — networks that will never show up in the list of available unlocked and password-protected hotspots that your phone or computer can see — but are they more secure than regular networks that broadcast their name to any nearby device? The short answer is ...more

ESP8266 Wi-Fi module connected via USB.
HOW TO
02/27/2021 1:43 am

Generate Crackable Wi-Fi Handshakes with an ESP8266-Based Test Network

If you've wanted to get into Wi-Fi hacking, you might have noticed that it can be pretty challenging to find a safe and legal target to hack. But you can easily create your own test network using a single ESP8266-based microcontroller like the D1 Mini. Our goal is to crack a handshake that we captur ...more

Code snippet for establishing an SSH connection with password input.
HOW TO
02/20/2021 12:13 am

Automate Remote SSH Control of Computers with Expect Scripts

If you're getting into automation, Bash scripting is usually the way to go. However, there are a couple of limitations, and one of them is logging into another device like a Raspberry Pi and running a script automatically. To help in those situations, we're going to automate delivering an SSH payloa ...more

Person working on a computer with coding and data visualization on the screen in a dimly lit room.
HOW TO
02/19/2021 8:40 pm

Leap into Cybersecurity with This Ethical Hacking Bundle

Ethical hacking is a useful skill that can make you stand out in the field of cybersecurity. Whether you're just entering the field or are already established and are looking to stay current, learning the fundamentals of the white hat is an essential skill for your professional development. If you w ...more

Terminal window displaying a command line interaction with user inputs and outputs.
HOW TO
02/10/2021 12:11 am

Write Your Own Bash Scripts to Automate Tasks on Linux

Bash scripting is a convenient way to automate things on any Linux system, and we're going to use it here to automate certain tasks we use all the time. Bash is a simple language for stringing together several different Linux utilities. Its simplicity makes it easy for beginners to create lots of sc ...more

Two smartphones displaying messaging app interfaces.
HOW TO
01/22/2021 1:05 am

The First 12 Things to Do When Switching to Signal Private Messenger

Signal is one of the best end-to-end encrypted messengers on the market. It offers robust security, keeps minimal information about its users, and is free to use. Switching to it as your main messenger can be a bit daunting, so to help, we created a guide to walk you through the process. As Signal c ...more

Pair with device screen showing Wi-Fi details and a cancel option.
HOW TO
01/15/2021 12:03 am

How to Use Wireless ADB in Samsung's One UI 3.0 (It's Actually Pretty Easy)

Samsung's One UI 3.0 skin is built on top of Google's Android 11open source code base, which means you get all of the standard features, plus some cool bonus stuff from Samsung. However, it's one of those standard AOSP features that you might find most useful if you send a lot of ADB commands. Googl ...more

Terminal window displaying command line instructions and device connection status.
HOW TO
01/14/2021 10:57 pm

How to Open an ADB or Fastboot Command Window in Platform-Tools

When it comes to rooting and modding any Android device, ADB and Fastboot commands will quickly become your two new best friends once you realize the power they have. From unlocking your bootloader to flashing any file you could ever want — if you're serious about the modding and customization game, ...more

Command line interface displaying installation instructions with a 'START' prompt.
HOW TO
01/08/2021 8:02 pm

How to Send ADB & Fastboot Commands from One Android Phone to Another

ADB and Fastboot are powerful tools that have always required a computer. But with the right setup, you can now send commands to a phone using another phone. The ADB and Fastboot Magisk module, by osm0sis and Surge1223, will turn your phone into an ADB terminal using root access. You can then connec ...more

Digital audio editing software interface displaying colorful audio waveforms.
HOW TO
01/05/2021 11:54 pm

Remove Vocals from Any Song to Make a Karaoke or Instrumental Track

Finding an instrumental or karaoke version of a song can be pretty easy unless you're dealing with a song that isn't popular. That leaves you with just the full version of the song, complete with vocals. So how do you convert it into an instrumental or karaoke track? Accompaniment tracks are made in ...more

Smartphone displaying an error message in recovery mode.
HOW TO
12/31/2020 7:26 pm

The Easiest Way to Send Fastboot Commands to Your Google Pixel

Pixels don't have a "Download Mode" like Samsung Galaxy phones, so there's not an easy, point-and-click way to send firmware files and low-level commands from your computer. What they do have is an even more powerful tool: Fastboot Mode. Also known as Bootloader Mode, this is a way to interface with ...more

Notification on a smartphone screen displaying a message from Gadget Hacks.
HOW TO
12/30/2020 11:54 pm

How to Get the iPhone's Auto-Hiding Lock Screen Notifications on Android

The iPhone has a setting that will obfuscate the content of notifications on its lock screen until you're recognized by Face ID. Google implemented this same feature in its Pixel phones, but many Android devices have no such option. At least, not by default. If you use Android's Smart Lock feature t ...more