# Crack a Master

### How To : Crack a master lock (not pick) to get the combo

Just like the title says, learn how to crack a master lock. Not pick the lock (picking a master lock will not get you the combo). You don't need any special tools to crack this master lock- all you need is the right technique. Crack master locks for fun only - don't use this f ...more

### How To : Crack a Master Lock No5 Padlock with a soda can shim

Here is a short instructional video describing the weakness of large Master brand locks. See how to crack a Master Lock #5 with a soda can shim. It is so easy to hack and crack open almost any type of lock if you know its weaknesses. The only tool you really need to open a loc ...more

### News : Crack a Master Lock Mathematically, Without a Shim

Apparently it is possible to reduce 64,000 possible Master Lock padlock combinations down to just 100. The entire process is clearly illustrated in the below how-to from Mark Edward Campos. For an enlarged version, click here. Looking for something a little more interactive? W ...more

### How To : Crack Any Master Combination Lock in 8 Tries or Less Using This Calculator

Master Lock combination padlocks have been known to be vulnerable to an attack that reduces their 64,000 possible combinations down to 100. I've devised a new attack for cracking any Master combo lock that simplifies the process and reduces the amount of work down to only 8 co ...more

### How To : Crack a Master Lock Combination Padlock the Easy Way

Lock picking is a great skill that takes lots of practice and patience to master, but some locks simply can't be picked, like a Master Lock combination padlock. With a combination lock, you'll have to do it the old-fashioned way—cracking combinations. Video: . If you were to t ...more

### How To : Crack a "safe" Master lock

Learn how a Master Lock known as a "safe" lock can be opened using a few simple items.

### HowTo : Conquer a Chain Lock (You Will Need: 1 Rubberband)

Chain locks are hardly highly secure to begin with, but a fun MacGyver-style trick nonetheless. Add it to the lock picking vault. Crack a Master Lock - Mathematically, No Shim. Open a Locked Door With a Credit Card. Wooden Combination Lock Demonstrates Inner Workings. DIY Digi ...more

### News : Download MIT's Ultimate Lock Picking Bible (FREE)

Via WonderHowTo World, Zine Fiends: "Looking for a good source of information on how to pick a lock? Someone has anonymously posted the classic text from MIT (Massachusetts Institute of Technology) on how to pick any lock in the online Zine Library. (Sort of constitutes as a ...more

### News : DIY Digital Combination Clock

Ever wondered how a digital combination lock works? Instructables member Nino123 is kind enough to demonstrate the inner workings, with a step-by-step HowTo on building your own. "You can connect it to anything from 1v to 400v (or maybe more that depends on the RELAY), DC or ...more

### HowTo : Build a Vibrating Lock Pick With a Toothbrush

Unbeknownst to the general public, picking a lock can be a very easy process once you get the hang of it (yes, surprising AND frightening). A vibrating lock pick set takes the general ease of picking even further by speeding up the process. Now, with the help of Invent Geek, y ...more

### News : Wooden Combination Lock Demonstrates Inner Workings

Lockpickers, school yourself. The incredibly prolific, woodworking whiz Matthias Wandel demonstrates the inner workings of a combination lock with his wooden mechanical model. "In terms of neat mechanical things to build out of wood, I figured a single dial sequential combin ...more

### How To : Crack a Combination Bike Lock in Under 30 Seconds

Have an old bike combination lock that you can't remember the code for? If it's a simply four-digit cable lock, you can easily figure out the combination with a quick peck-and-go method. Best of all, this technique doesn't require any tools or special know-how, and let's you r ...more

### Oops : Some Security Doors Can Be "Picked" with Canned Air

Security researcher Samy Kamkar, best known for his MySpace Worm, and most recently for his online calculator that can help you crack any Master Lock combination, is at it again. This time he's figured out how to break into security doors that have a motion-sensing egress syst ...more

### Safe-Cracking Made Stupid Easy : Just Use a Magnet

SentrySafe puts all sorts of measures in place to protect your valuables and important documents. This particular SentrySafe has an electronic lock, four 1-inch bolts to keep the door firmly in place, pry-resistant hinges, and it's able to withstand drops of up to 15 feet. Tha ...more

### How To : This Is Why Your TSA-Approved Luggage Locks Are Useless

Last year, the Washington Post's Ashley Halsey wrote an article on what really happens to your luggage at airports. In it, they unwittingly published a photo of the master keys the TSA uses for TSA-approved baggage locks. Now, thanks to that picture and a French lock-picking e ...more

### How To : Break into Locks with Beer Can Shims, Bump Keys, & Just Plain Brute Force

Mechanical locks have been around since ancient Egypt, with the oldest known artifact found in the ruins of Nineveh, an ancient city in Assyria, Mesopotamia, which is just across the Tigris River from what is now Mosul, Iraq. It was a forerunner to our modern day pin tumbler l ...more

### How To : Hack an American Lock combination

You've seen plenty of videos about hacking Master Lock combinations. But what about those American Locks? They always seem to be forgotten, since Master Lock is the biggest combination lock producer out there. To get the American Lock combination hack, you needn't pull up on ...more

### How To : Crack and open a combination lock

This video won't show you how to crack a safe but it will show you the next best thing: cracking a combination lock or master lock! We do recommend only trying this on a lock you have forgotten the combination to and not other unlawful purposes. Watch this video tutorial and l ...more

### How To : Identify problems with pecans & pruning grapevines

Master Gardener Rosamarie Maddox asks John White, Doña Ana County Extension Agent, about problems facing her pecans, grapevines, and native shrubs. An unidentified insect found on her pecan tree is identified by John White as a Twice Stabbed Ladybug. This ladybug is a useful i ...more

### How To : Pick multi-disk combination locks

We may not all be Macgyver, but we can certainly channel our inner detective by bolstering our lock picking skills. And some of the hardest locks to crack open are combination locks, which have several disks are require advanced lockpicking skills. This con tutorial will guid ...more

### How To : Do a heelside 360 while wakeboarding

Check out this instructional wakeboarding video that demonstrates how to crack the heelside 360 with instructor Matt Crowhurst. When you get it right, this move looks absolutely awesome. To learn all kinds of crazy spin tricks, you gotta start somewhere. That somewhere, is wit ...more

### How To : Solve extreme sudoku with Wayne Gould

Learn from the world's bestselling Sudoku Master - watch as Wayne Gould explains a key technique in breaking Extreme Sudoku puzzles. Part two's advice is on using X-wings to crack Extreme Susoku puzzles. Part 1 of 2 - How to Solve extreme sudoku with Wayne Gould. Part 2 of 2 ...more

### HowTo : Poach an Egg Perfectly

Since we've already mastered the fried egg, it's time to move on to a slightly more ambitious task. Apartment Therapy brings us another step-by-step on the art of the egg. This time around, HowTo: poach an egg perfectly. You Will Need: 1 or more eggs White vinegar Water Sma ...more

### News : Canning Mission Warning!

Beware the Canning Mission! The Zynga Community Forum is full of complaints about the new Canning Mission. Here is an outline: Mmm Tomato Gravy! Canning Master Part I - Harvest 50 Tomatoes - Collect 5 butter - Have 5,000 food (This will be consumed) Hot and Saucy: Canning M ...more

### How To : Crack open a Dudley combination lock

Alright, there are lots of videos out there dealing with Master combination locks, but this how-to video will show you how to open a Dudley combination lock. These locks are commonly used in schools, so you've likely seen one there. This method opens the lock permanently, mean ...more

### News : Advanced Cracking Techniques, Part 1: Custom Dictionaries

How did it happen? How did your ultra-secure WPA password on your wireless network get broken into? Well, you might have just found yourself at the mercy of a cracker. Crackers are malicious computer users who specialize in breaking into things. Whether it be passwords, login ...more

### News : Free Protein Folding Game Cracks HIV Molecule Riddle

Foldit is definitely a niche game. The sole gameplay mechanic is attempting to fold complex proteins into smaller and more efficient shapes following the rules of molecular physics and biology. Points are awarded based on how small one can make the protein. Online leaderboards ...more

### News : "Snow" by Seido Ray Ronci (Poem of the Day)

Snow by: Seido Ray Ronci On my way out the door, my son says, "Dad, I have to poop." After all the work of bundling him up, "Go ahead," I say. He sheds his parka, drops his snow pants, and mounts the high white seat of the toilet. I unbutton my coat, loosen my scarf, let it h ...more

### HowTo : Make the Perfect Fried Egg

The art of the sunny side up, fried egg. Master it, and you're sure to impress. Luckily, Apartment Therapy is here to instruct with another Home Hack. HowTo: make a perfectly cooked fried egg. You Will Need: One or more eggs Butter Nonstick OR stainless steel skillet or fr ...more

### Mastering Security, Part 1 : How to Manage and Create Strong Passwords

I've seen numerous tutorials on how to create a "strong" password. This makes me laugh. These titles imply "one" password, which is wrong in and of itself. A person should have many passwords, all different, and all extremely long. People may ask how they're supposed to rememb ...more

### How To : Make Surface-Mount Electronics at Home for Smaller, Cheaper DIY Gadgets

Whenever we make a homemade circuit, we use what are called through-hole components. Any components with long metal leads is a through-hole component. They are great for soldering to, but it's tough to fit enough through-hole resistors and capacitors into a smartphone. To get ...more

### How To : Cheat at pin the tail on the donkey

They say cheaters never prosper, but how will your know for sure if you don't give it a try? By a little repositioning of the blindfold and some spacial awareness you can be the master at this classic party game. Follow these tips to make sure your tail wins the prize. You W ...more

### How To : Manage Stored Passwords So You Don't Get Hacked

Chrome, Firefox, and Safari all provide built-in features that allow you to save your username and password for your favorite sites, making the process for entering your credentials a breeze when you revisit them. While this automation does make your life a little easier, it ...more

### How To : Unlock Any Master Lock Combination Padlock

Let's say you forgot the code to your Master Lock combination padlock. What can you do besides buy another one? Well, there's a surprising abundance of ways to open a combination lock other than with just the combination, some of which will even let you reset the code. Of cour ...more

### How To : Use Leaked Password Databases to Create Brute-Force Wordlists

To name just a few companies, VK, µTorrent, and ClixSense all suffered major data breaches at some point in the past. The leaked password databases from those and other online sites can be used to better understand how human-passwords are created and increase a hacker's succes ...more

### How To : For Perfect Sunny-Side Up Eggs Every Time, Whisk Them (Seriously)

Don't Miss: How to Make Perfect Poached Eggs, Every Single Time Any Sunday morning is better with a sunny-side up egg. Unfortunately, while I've mastered my favorite breakfast sausage and waffle-making skills, I have yet to conquer the perfect technique for these runny-yolke ...more

### Behind the Hack : How I Discovered the 8-Try Master Combo Lock Exploit

In my last guide, I showed how you could crack the combination of any Master Lock combination padlock in 8 tries or less using my online calculator. Now, as promised, I'll be showing you how I devised the attack, which is based off the well-known technique that reduces the 64, ...more

### How To : Become a Hacker

Many of our members here at Null Byte are aspiring hackers looking to gain skills and credentials to enter the most-valued profession of the 21st century. Hackers are being hired by IT security firms, antivirus developers, national military and espionage organizations, private ...more

### How To : Crack WPS with Wifite

Hi, dear co-apprentices and wise masters. I've been recently trying to learn the basics to hacking here, and I've read all guides on Wi-Fi hacking and noticed no word is dedicated to this awesome script that comes bundled with Kali! Okay, it may be a potential skiddie toy, bu ...more

### News : New Case Puts iPhone & Android Back to Back

It's the bane of many a tech geek's existence that the customizability of Android software cannot be combined with the sleek design of the iPhone. A new Kickstarter project titled Eye, however, is looking to change that with a new iPhone case that allows you to combine the two ...more

### News : Samy's MagSpoof Hacking Device Was Just Featured on Mr. Robot

Samy Kamkar, security researcher and friend of WonderHowTo, just had one of his devices featured in Mr. Robot. If you've never heard of Samy, you've at least probably heard of one of his hacks. For instance, the Samy computer worm that hacked MySpace, his compressed air trick ...more

### Hacking Windows 10 : How to Steal & Decrypt Passwords Stored in Chrome & Firefox Remotely

Passwords stored in web browsers like Google Chrome and Mozilla Firefox are a gold mine for hackers. An attacker with backdoor access to a compromised computer can easily dump and decrypt data stored in web browsers. So, you'll want to think twice before hitting "Save" next ti ...more

### How To : 15 Ingenious Ways to Make Breakfast in a Slow Cooker

Your slow cooker isn't just for making lunch and dinner—it's also perfect for making a complete and super delicious breakfast with little work. Slow cookers let you wake up to the smell of breakfast, or will let you spend your morning outside of the kitchen while they do the ...more

### Guide : Wi-Fi Cards and Chipsets

Greetings aspiring hackers. I have observed an increasing number of questions, both here on Null-Byte and on other forums, regarding the decision of which USB wireless network adapter to pick from when performing Wi-Fi hacks. So in today's guide I will be tackling this dilemm ...more

### How To : Post to Null Byte [4.10.15 Revision]

Hello readers, and welcome to Null Byte. Before we start, for those of you who may not know me, my name is ghost_; I'm a relatively active member of our community and have been around for a while. During my time here, I've seen our community cultivate into the brilliant one ...more

### Ingredients 101 : How & Why You Should Always Brown Butter

Butter can be even more delicious than it already is. While that may be a shocking claim, it's most definitely true. Many new cooks and even seasoned chefs don't realize this, but the few minutes it takes to do these things will pay you back exponentially when it comes to that ...more

### How To : The Essential Skills to Becoming a Master Hacker

Many of my aspiring hackers have written to me asking the same thing. "What skills do I need to be a good hacker?" As the hacker is among the most skilled information technology disciplines, it requires a wide knowledge of IT technologies and techniques. To truly be a great h ...more

### Hack Like a Pro : How to Exploit SNMP for Reconnaissance

Welcome back, my rookie hackers! The more we know about a system or network, the better our chances of owning it and not leaving a trace for investigators to follow. One of the often overlooked sources for information is the Simple Network Management Protocol (SNMP). Many roo ...more

### How To : Drill a Hole in Ceramic Tile

Drilling holes in wall tiles is a fairly easy skill to master once you know how. Follow these simple steps on how to drill a hole in a tiled wall for a hassle free experience. Please Note Drilling a ceramic wall tile is a completely different experience to drilling a hole th ...more

### Hacking macOS : How to Dump Passwords Stored in Firefox Browsers Remotely

Passwords and data stored in web browsers are extremely valuable to hackers. If not for financial gain, black hat hackers may still leak your passwords and personal information for amusement. Never undervalue what you're worth to a hacker. While I'm definitely no black hat, d ...more

### Ranked : The 7 Best Paid Word Games for iPhone & Android

Word games can expand your vocabulary skills in all sorts of exciting and creative ways. Because of this, both the iOS App Store and the Google Play Store are awash with word games, making it hard to differentiate between good and bad titles. This is especially troublesome if ...more

### How To : Find XSS Vulnerable Sites with the Big List of Naughty Strings

Dirty, malformed, and outright mischievous text strings have long been the enemy of interactive website developers. Strings contain any combination of letters, numbers, spaces, and punctuation, and are entered into text boxes on websites by users. These strings in particular c ...more

### How To : Get Your Cheesecake Fix with These 10-Minute Parfaits

Cheesecake is a nearly flawless dessert. It's rich but light, has a toothsome crust but a creamy body, and tastes good served room temperature or frozen. What's not to like? Don't Miss: How to Prevent Cracks in Cheesecake (Or Fix Them) I can only think of one thing cheeseca ...more

### How To : Automate Brute-Force Attacks for Nmap Scans

Using Hydra, Ncrack, and other brute-forcing tools to crack passwords for the first time can be frustrating and confusing. To ease into the process, let's discuss automating and optimizing brute-force attacks for potentially vulnerable services such as SMTP, SSH, IMAP, and FTP ...more

### How To : Extract Windows Usernames, Passwords, Wi-Fi Keys & Other User Credentials with LaZagne

After exploiting a vulnerable target, scooping up a victim's credentials is a high priority for hackers, since most people reuse passwords. Those credentials can get hackers deeper into a network or other accounts, but digging through the system by hand to find them is difficu ...more

### How To : If You're Missing Burger King's Mac n' Cheetos, Make 'Em Yourself

If you're here, you're probably one of the seven people dedicated to making Mac n' Cheetos a permanent part of the Burger King menu. For the rest of you that stumbled onto this page out of sheer curiosity, Burger King's Mac n' Cheetos were deep-fried, creamy macaroni and chee ...more

### How To : Make a Python Basic Unix Password Cracker!

Greetings fellow students! I'm currently reading a book called "Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers" This book will teach you different kinds of Python programs for hacking, forensics or penetration purposes ! ...more

### Tutorial : Password Profiling with CUPP

Greetings all. I'm back with another informational review of the diversity of utilities for use in the sphere of hacking at your disposal. Today we are going to cover the insides of CUPP (Common User Passwords Profiler) in its entirety. The tool is very basic in nature, as th ...more

### How To : Food Processor Pasta Is So Easy Anyone Can Do It

Fresh, homemade pasta definitely beats the dried stuff from the store. However, most of us aren't usually in the mood to knead dough for 10 minutes... or to clean up a sticky, doughy, floury mess afterward. Lucky for us, there's an easier and cleaner way to make pasta in a qu ...more

### News : How to Study for the White Hat Hacker Associate Certification (CWA)

Since I first announced the new Null Byte recognition for excellence a few weeks ago, several of you have written me asking, "How can I study for this certification exam, and what material will be covered on the exam?" Now I have an answer for you. The White Hat Hacker Associa ...more

Prev Page

• Hot
• Latest