Hacking Wi-Fi is a lot easier than most people think, but the ways of doing so are clustered around a few common techniques most hackers use. With a few simple actions, the average user can go a long way toward defending against the five most common methods of Wi-Fi hacking, w ...more
Web application vulnerabilities are one of the most crucial points of consideration in any penetration test or security evaluation. While some security areas require a home network or computer for testing, creating a test website to learn web app security requires a slightly d ...more
The Pixel 5 is a great value proposition in this era of $1,500 phones. With its reasonable price tag, fully open-sourced software, and unlockable bootloader, it's also an ideal phone for rooting. The process of rooting the Pixel 5 is a tried and true method: Unlock the bootlo ...more
The main draw for Google's Pixel series is the software. It rocks a clean version of stock Android instead of a heavy OEM skin like TouchWiz, it gets frequent prompt OS updates, the camera software is downright amazing, and it has perhaps the most fluid UI of any phone. But an ...more
If you want to follow Null Byte tutorials and try out Kali Linux, the Raspberry Pi is a perfect way to start. In 2018, the Raspberry Pi 3 Model B+ was released featuring a better CPU, Wi-Fi, Bluetooth, and Ethernet built in. Our recommended Kali Pi kit for beginners learning e ...more
There's no doubt Kali has established itself as the most popular penetration distribution available. However, just because it's the fan favorite of beginners and security researchers doesn't make it right for everyone. Manjaro Linux is a beginner-friendly Arch-based distributi ...more
Year in and year out, OnePlus flagships top our list of the best phones for rooting. Why? Primarily because rooting does not void your warranty, and OnePlus goes out of their way to make the whole process as easy as possible. If you're new to rooting, it might seem like more ...more
Google just released the first version of the next major Android update. Early Android 11 builds will only available as developer previews, so you can't just sign up for the beta program and install the update as an OTA for the first couple months. That said, it's still pretty ...more
Hello and welcome to my article. I have made this article for anyone who wants to become a hacker, and wants to know how to get started. OVERVIEW: As you'll get further into the hacking community, and learn more about how it's all put together, you'll also realize very quick ...more
When you know how to cook it, tofu is a delicious dish in and of itself—truly. Too many people have been subjected to poor quality or badly cooked tofu and told to eat it because it's a "healthy alternative" to meat. Usually what they bite into is a bland, rubbery mess coated ...more
Sure, you could start hunting with a rifle, but the true hunters do bow hunting. If you're interested in getting into bow hunting in general, this video has all the info you will need. You will learn the anatomy of a recurve bow and also the proper way to fire, hold, and knock ...more
I've created this guide to give you some ideas for how to progress quickly as well as some basics for how to operate FrontierVille. My tips are merely suggestions based on my experience and you are welcome to explore and play the game at your own pace. I hope you benefit from ...more
From a fresh home install of Windows 7 (not factory install) this will guide you step by step to updating your Windows 7 and getting it up and running. Updating is probably one of the most important things to do when you install Windows. It contains all of the security featur ...more
WPA-secured wireless networks, or WiFI Protected Access, is a form of internet security that secures your wireless LAN from being accessed by unauthorized users. Safer than WEP, or wireless equivalent privacy, WPA still has weaknesses that are prone to cracking - IF, that is, ...more
The days of entering left, right, left, right, up, down, up, down, a, b to cheat your way through a video game are long gone. With achievements and trophies in existence, game developers have, for the most part, removed cheats from video games. But cheats aren't entirely gone ...more
Easy follow along animation of how to tie a classic windsor knot for your necktie. Video: .
Whether it's the new iPad Killer or not, one thing's for sure—the Motorola XOOM is hackable. Just hours after its release last week, Verizon's new Android-based tablet (running Honeycomb) was rooted by hacker Koushik Dutta, which seems easy enough. "Since it’s another Google ...more
The Kinect is sure to swarm the homes of Xbox 360 gamers this holiday season. Even though some of us are amazed at the hands-free gaming capabilities it offers, others feel it to be frustratingly limited. Adafruit Industries is one of them. They recently held a competition wi ...more
Hackers can be notoriously difficult to buy gifts for, so we've curated a list of the top 20 most popular items Null Byte readers are buying during their ethical-hacking studies. Whether you're buying a gift for a friend or have been dying to share this list with someone shopp ...more
Wi-Fi tools keep getting more and more accessible to beginners, and the LAZY script is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA ha ...more
Many of my aspiring hackers have written to me asking the same thing. "What skills do I need to be a good hacker?" As the hacker is among the most skilled information technology disciplines, it requires a wide knowledge of IT technologies and techniques. To truly be a great h ...more
Today's post is a small go-to guide for beginner programmers in Null Byte. With many of our community members picking up programming from our Community Bytes, it only makes sense to lay out a one-stop guide for your reference. Hopefully this guide will help you make an educate ...more
A flaw in WPS, or WiFi Protected Setup, known about for over a year by TNS, was finally exploited with proof of concept code. Both TNS, the discoverers of the exploit and Stefan at .braindump have created their respective "reaver" and "wpscrack" programs to exploit the WPS vul ...more
Halloween just isn't Halloween without Jack O'Lanterns. Below, anything and everything you need to know on the art of pumpkin carving. 1. Prepare a Pumpkin for Carving Serious Eats' video demonstration is for true novices: "This video is for you unlucky souls who never got t ...more
WonderHowTo is a how-to website made up of niche communities called Worlds, with topics ranging from Minecraft to science experiments to Scrabble and everything in-between. Check in every Wednesday evening for a roundup of user-run activities and how-to projects from the most ...more
With some of the groundwork out of the way in getting a Mac set up for hacking, it's time to start looking at toolboxes. Our first toolbox is Git, which will be used throughout future tutorials. Git is currently the most widely used version control system (VCS) in the world, ...more
Android's personal assistant is more than just a sassy backtalker—it's a full-on suite of all the information you could need at a given time. Google Now, as it's called, uses data from various sources to predict what you'll want to know before you even search for it, and it's ...more
WonderHowTo is a how-to website made up of niche communities called Worlds, with topics ranging from Minecraft to science experiments to Scrabble and everything in-between. Check in every Wednesday evening for a roundup of user-run activities and how-to projects from the most ...more
We recently covered an app called Fingerprint Quick Action that let you use your fingerprint scanner to expand your notification tray like the Google Pixel, along with a few other actions. It's definitely a useful mod, but there's a similar app can make your fingerprint scanne ...more
The mere mention of "cupcake" conjures up visions of frosting-topped treats served to partygoers and birthday-havers by the dozens. After all, how many cupcake pans have you seen with less than 12 spots? Sixers are fairly common, yes, but what if you just want to bake one or t ...more
Android's hidden Developer Options menu, sometimes called "Developer Mode," has a ton of cool settings inside of it. You can enable wireless ADB, spoof your geolocation, make the Pixel 5's screen always run at 90 Hz, or even force incompatible apps to work with dark mode. But ...more
Hacking web applications can sometimes be challenging due to the sheer amount of moving parts they possess. At the core of these apps are HTTP requests and parameters, but these things are often concealed from the user, due to security reasons, convenience, or both. However, a ...more
Design flaws in many routers can allow hackers to steal Wi-Fi credentials, even if WPA or WPA2 encryption is used with a strong password. While this tactic used to take up to 8 hours, the newer WPS Pixie-Dust attack can crack networks in seconds. To do this, a modern wireless ...more
Once a hacker has created a PowerShell payload to evade antivirus software and set up msfconsole on their attack system, they can then move onto disguising their executable to make it appear as a regular text file. This is how they will get a Windows 10 users to actually open ...more
An internet connection has become a basic necessity in our modern lives. Wireless hotspots (commonly known as Wi-Fi) can be found everywhere! If you have a PC with a wireless network card, then you must have seen many networks around you. Sadly, most of these networks are sec ...more
I think it was about Day 3 of working on our massive, all-encompassing Pixel 4a root guide for beginners when I realized something: Not everyone needs their hands held through each tiny step. If you just need a quick refresher, some links, and maybe a fastboot command to copy, ...more
If you're just getting into balloon twisting but are looking for something a little more advanced then say, a flower, then check out this awesome video! In it you will get a step-by-step beginners guide on how to create a simple air plane that will impress anyone!
Choose and buy a Guitar - A beginners guide to the Guitar. The guitar is one of the most popular musical instruments there is, appealing to both the young and the not so young and spanning different musical genre's such as blues, pop, rock, classical and many more. So, Im gu ...more
Want to generate experience and level up your Pet Society character the easy way? Watch this cheater's guide, which will show you how to hack Pet Society for all the EXP you could ever want. Check out this video tutorial to learn how to hack Pet Society (01/10/10) using the e ...more
They are after you from all over the globe. Looking for ways to exploit you. Ways to hurt you. Not political terrorists, but rather "info terrorists." Each month thousands of websites get hacked into and have hidden links inserted into the pages by people wanting their spam si ...more
The 'One Small Hack for Man' achievement in Call of Duty: Black Ops is available if you own the Rezurrection DLC and requires you to hack anything within the game with the hacking device. Take a look at this guide from the Achievement Hunters to learn just how to unlock the ac ...more
This is a 3run parkour step by step guide on how to do an essential parkour/freerunning move: the precision jump. This is a must for beginners. The precision is the first thing you should learn as a traceur. Precision walk through by Mat Kaye www.3RUN.co.uk
Getting Started Steps for Beginners If you are brand new to Expression Web 4, then read the following guide to quickly set up your web site and web pages. Set up an Empty Web Site Click Site and choose New Site. This will open a new dialog window. In the dialog window, Choo ...more
With FarmVille being one of the hottest Facebook games on the market, it's no wonder it's the primary target for scams and virus downloads. Anyone playing FarmVille is at risk, but the primary targets are those looking to improve their gameplay and build their farms and neighb ...more
These video guide will help you to fold your own origami tortoise or turtle using origami, the traditional art of Japanese paper folding. Perfect for beginners. For more information, including a step-by-step overview of the folding process, as well as to get started making you ...more
This video guide will help you to fold your own hanging origami crane ornaments to hang on a Christmas tree or in your windows. Perfect for beginners. For more information, including a step-by-step overview of the folding process, as well as to get started making your own fold ...more
If you are stuck using a computer in a place with safety filters, you can use this tutorial to bypass those controls and get to your YouTube account. So, whether you are in a school, library or your parents have parental controls activated, just follow along and you will be ab ...more
Looking for instructions on how to do USB tethering with a Samsung Vibrant smartphone? You're in luck. This free video tutorial will see that you need everything you need to know. (Note, however, that this hack will require you to download the free Samsung Kies application.) F ...more
So, a lot of people seem to be having trouble rooting their Motorola Droid X smartphone from Verizon Wireless using ADB (Android Debug Bridge). Well, there is an alternative for those having problems with the ADB version. You will need to have a Wi-Fi or Bluetooth widget handy ...more
Yes, the Droid X from Motorola can be rooted, and yes, you can do it at home. Just make sure you follow the directions precisely. If you succeed, you'll have a completely rooted smartphone. eFuse doesn't matter. If you want to expand your options on Verizon Wireless's Droid X, ...more
Want to earn coins and easy experience for your Pet Society pet without, you know, actually having to play the game? It's easy. This video guide show you everything you'll need to know to generate unlimited experience and digital cash money. Check out this video tutorial to l ...more
Unlock the secret to clothing design. If you can draft and sew a basic bodice you can design virtually any kind of t-shirt, blouse or other top! Attach a skirt and you now have a dress! Take your measurements by using the guide in the " How to Take Your Measurements" section a ...more
Check out this hide and seek how-to video. This hide and seek video is an instructional guide for beginners. Step one, select someone to be the seeker who counts to nine and a half one thousand. Step two, the seeker must shout "ready or not, hear I come" to properly play and h ...more
I'm having a hard time finding my older posts, so I'm sure you are too. I'll put them all here so you can find them easily. You can bookmark this if you want :) Facebook Page - Like it, Share it, Get updates about the game and new posts! Beginners Guide - Some screen shots o ...more
This tutorial is to explain how to change the ownership and/or permissions of a folder or file on your computer. It is very simple and easy to understand. There is a step by step guide to the process. There is a verbal as well as a visual representation of the process that you ...more
So you think you can dance? Well sorry honey, but we're here to tell you that your over the top worms and butter churning don't exactly count as hip, impressive dance moves. But fear not; this video will teach you one of the simplest ways to get started dancing like a pro. Th ...more
This is a Cheat Engine guide on how to hack this flash game - P.O.D. Kongregate Acheatment shows you how to hack P.O.D. with Cheat Engine (09/23/09). This P.O.D. cheat will give you a level hack. Play the free online flash game P.O.D. on Kongregate. Here's the description: T ...more
This hacker's guide demonstrates a quick PHP script which may allow you to crawl through the operating system on your hosting provider. demonstrate the power of PHP on a Virtual Host, or vhost, if PHP is not correctly secured by your web hosting provider. For more information ...more
This is a Cheat Engine guide on how to hack this flash game - Particles. Kongregate Acheatment shows you how to hack Particles with Cheat Engine (09/23/09). This Particles cheat will give you a speed hack with only 2 balls. Play the free online flash game Particles on Kongreg ...more
This is a Cheat Engine guide on how to hack this flash game - B29 Assault. Kongregate Acheatment shows you how to hack B29 Assault with Cheat Engine (09/23/09). This B29 Assault cheat will give you infinite nukes and an invincible hack. Play the free online flash game B29 Ass ...more