Just like the title says, learn how to crack a master lock. Not pick the lock (picking a master lock will not get you the combo). You don't need any special tools to crack this master lock- all you need is the right technique. Crack master locks for fun only - don't use this f ...more
Here is a short instructional video describing the weakness of large Master brand locks. See how to crack a Master Lock #5 with a soda can shim. It is so easy to hack and crack open almost any type of lock if you know its weaknesses. The only tool you really need to open a loc ...more
Apparently it is possible to reduce 64,000 possible Master Lock padlock combinations down to just 100. The entire process is clearly illustrated in the below how-to from Mark Edward Campos. For an enlarged version, click here. Looking for something a little more interactive? W ...more
Master Lock combination padlocks have been known to be vulnerable to an attack that reduces their 64,000 possible combinations down to 100. I've devised a new attack for cracking any Master combo lock that simplifies the process and reduces the amount of work down to only 8 co ...more
Lock picking is a great skill that takes lots of practice and patience to master, but some locks simply can't be picked, like a Master Lock combination padlock. With a combination lock, you'll have to do it the old-fashioned way—cracking combinations. Video: . If you were to t ...more
Learn how a Master Lock known as a "safe" lock can be opened using a few simple items.
Chain locks are hardly highly secure to begin with, but a fun MacGyver-style trick nonetheless. Add it to the lock picking vault. Crack a Master Lock - Mathematically, No Shim. Open a Locked Door With a Credit Card. Wooden Combination Lock Demonstrates Inner Workings. DIY Digi ...more
Via WonderHowTo World, Zine Fiends: "Looking for a good source of information on how to pick a lock? Someone has anonymously posted the classic text from MIT (Massachusetts Institute of Technology) on how to pick any lock in the online Zine Library. (Sort of constitutes as a ...more
Ever wondered how a digital combination lock works? Instructables member Nino123 is kind enough to demonstrate the inner workings, with a step-by-step HowTo on building your own. "You can connect it to anything from 1v to 400v (or maybe more that depends on the RELAY), DC or ...more
Unbeknownst to the general public, picking a lock can be a very easy process once you get the hang of it (yes, surprising AND frightening). A vibrating lock pick set takes the general ease of picking even further by speeding up the process. Now, with the help of Invent Geek, y ...more
Lockpickers, school yourself. The incredibly prolific, woodworking whiz Matthias Wandel demonstrates the inner workings of a combination lock with his wooden mechanical model. "In terms of neat mechanical things to build out of wood, I figured a single dial sequential combin ...more
Have an old bike combination lock that you can't remember the code for? If it's a simply four-digit cable lock, you can easily figure out the combination with a quick peck-and-go method. Best of all, this technique doesn't require any tools or special know-how, and let's you r ...more
Security researcher Samy Kamkar, best known for his MySpace Worm, and most recently for his online calculator that can help you crack any Master Lock combination, is at it again. This time he's figured out how to break into security doors that have a motion-sensing egress syst ...more
SentrySafe puts all sorts of measures in place to protect your valuables and important documents. This particular SentrySafe has an electronic lock, four 1-inch bolts to keep the door firmly in place, pry-resistant hinges, and it's able to withstand drops of up to 15 feet. Tha ...more
Last year, the Washington Post's Ashley Halsey wrote an article on what really happens to your luggage at airports. In it, they unwittingly published a photo of the master keys the TSA uses for TSA-approved baggage locks. Now, thanks to that picture and a French lock-picking e ...more
The latest film addition in the American-produced Millennium series, The Girl in the Spider's Web, was just released on Blu-ray a few days ago. As you could expect, the movie has many hacking scenes throughout, just like the previous English and Swedish language movies centere ...more
Apple AirTags are super helpful for keeping track of your keys, backpack, and other frequently misplaced items, but there are some pretty clever things you can do with them beyond finding your stuff. Apple's $29 Bluetooth beacons definitely drew some inspiration from Tile's l ...more
Mechanical locks have been around since ancient Egypt, with the oldest known artifact found in the ruins of Nineveh, an ancient city in Assyria, Mesopotamia, which is just across the Tigris River from what is now Mosul, Iraq. It was a forerunner to our modern-day pin tumbler ...more
You've seen plenty of videos about hacking Master Lock combinations. But what about those American Locks? They always seem to be forgotten, since Master Lock is the biggest combination lock producer out there. To get the American Lock combination hack, you needn't pull up on ...more
This video won't show you how to crack a safe but it will show you the next best thing: cracking a combination lock or master lock! We do recommend only trying this on a lock you have forgotten the combination to and not other unlawful purposes. Watch this video tutorial and l ...more
Master Gardener Rosamarie Maddox asks John White, Doña Ana County Extension Agent, about problems facing her pecans, grapevines, and native shrubs. An unidentified insect found on her pecan tree is identified by John White as a Twice Stabbed Ladybug. This ladybug is a useful i ...more
We may not all be Macgyver, but we can certainly channel our inner detective by bolstering our lock picking skills. And some of the hardest locks to crack open are combination locks, which have several disks are require advanced lockpicking skills. This con tutorial will guid ...more
Check out this instructional wakeboarding video that demonstrates how to crack the heelside 360 with instructor Matt Crowhurst. When you get it right, this move looks absolutely awesome. To learn all kinds of crazy spin tricks, you gotta start somewhere. That somewhere, is wit ...more
Learn from the world's bestselling Sudoku Master - watch as Wayne Gould explains a key technique in breaking Extreme Sudoku puzzles. Part two's advice is on using X-wings to crack Extreme Susoku puzzles. Part 1 of 2 - How to Solve extreme sudoku with Wayne Gould. Part 2 of 2 ...more
Snow by: Seido Ray Ronci On my way out the door, my son says, "Dad, I have to poop." After all the work of bundling him up, "Go ahead," I say. He sheds his parka, drops his snow pants, and mounts the high white seat of the toilet. I unbutton my coat, loosen my scarf, let it h ...more
Alright, there are lots of videos out there dealing with Master combination locks, but this how-to video will show you how to open a Dudley combination lock. These locks are commonly used in schools, so you've likely seen one there. This method opens the lock permanently, mean ...more
Beware the Canning Mission! The Zynga Community Forum is full of complaints about the new Canning Mission. Here is an outline: Mmm Tomato Gravy! Canning Master Part I - Harvest 50 Tomatoes - Collect 5 butter - Have 5,000 food (This will be consumed) Hot and Saucy: Canning M ...more
Since we've already mastered the fried egg, it's time to move on to a slightly more ambitious task. Apartment Therapy brings us another step-by-step on the art of the egg. This time around, HowTo: poach an egg perfectly. You Will Need: 1 or more eggs White vinegar Water Sma ...more
The art of the sunny side up, fried egg. Master it, and you're sure to impress. Luckily, Apartment Therapy is here to instruct with another Home Hack. HowTo: make a perfectly cooked fried egg. You Will Need: One or more eggs Butter Nonstick OR stainless steel skillet or fr ...more
How did it happen? How did your ultra-secure WPA password on your wireless network get broken into? Well, you might have just found yourself at the mercy of a cracker. Crackers are malicious computer users who specialize in breaking into things. Whether it be passwords, login ...more
Foldit is definitely a niche game. The sole gameplay mechanic is attempting to fold complex proteins into smaller and more efficient shapes following the rules of molecular physics and biology. Points are awarded based on how small one can make the protein. Online leaderboards ...more
Whenever we make a homemade circuit, we use what are called through-hole components. Any components with long metal leads is a through-hole component. They are great for soldering to, but it's tough to fit enough through-hole resistors and capacitors into a smartphone. To get ...more
I've seen numerous tutorials on how to create a "strong" password. This makes me laugh. These titles imply "one" password, which is wrong in and of itself. A person should have many passwords, all different, and all extremely long. People may ask how they're supposed to rememb ...more
They say cheaters never prosper, but how will your know for sure if you don't give it a try? By a little repositioning of the blindfold and some spacial awareness you can be the master at this classic party game. Follow these tips to make sure your tail wins the prize. You W ...more
Chrome, Firefox, and Safari all provide built-in features that allow you to save your username and password for your favorite sites, making the process for entering your credentials a breeze when you revisit them. While this automation does make your life a little easier, it ...more
Let's say you forgot the code to your Master Lock combination padlock. What can you do besides buy another one? Well, there's a surprising abundance of ways to open a combination lock other than with just the combination, some of which will even let you reset the code. Of cour ...more
In my last guide, I showed how you could crack the combination of any Master Lock combination padlock in 8 tries or less using my online calculator. Now, as promised, I'll be showing you how I devised the attack, which is based off the well-known technique that reduces the 64, ...more
Many of our members here at Null Byte are aspiring hackers looking to gain skills and credentials to enter the most-valued profession of the 21st century. Hackers are being hired by IT security firms, antivirus developers, national military and espionage organizations, private ...more
It's nearly impossible not to be at least somewhat familiar with Microsoft Excel. While it's needed for many office jobs and data analysis fields, hackers could also benefit from improving their spreadsheet skills. Many white hats already know some of the essential Excel hacks ...more
It's the bane of many a tech geek's existence that the customizability of Android software cannot be combined with the sleek design of the iPhone. A new Kickstarter project titled Eye, however, is looking to change that with a new iPhone case that allows you to combine the two ...more
Samy Kamkar, security researcher and friend of WonderHowTo, just had one of his devices featured in Mr. Robot. If you've never heard of Samy, you've at least probably heard of one of his hacks. For instance, the Samy computer worm that hacked MySpace, his compressed air trick ...more
Don't Miss: How to Make Perfect Poached Eggs, Every Single Time Any Sunday morning is better with a sunny-side up egg. Unfortunately, while I've mastered my favorite breakfast sausage and waffle-making skills, I have yet to conquer the perfect technique for these runny-yolke ...more
When the titular hero of your superhero movie activates his powers with a catchphrase, it would be pretty neat if your augmented reality promotion for that film could react to the user's voice. Luckily for Warner Bros., Snapchat happens to have relatively new voice recognitio ...more
Passwords stored in web browsers like Google Chrome and Mozilla Firefox are a gold mine for hackers. An attacker with backdoor access to a compromised computer can easily dump and decrypt data stored in web browsers. So, you'll want to think twice before hitting "Save" next ti ...more
Welcome back, my rookie hackers! The more we know about a system or network, the better our chances of owning it and not leaving a trace for investigators to follow. One of the often overlooked sources for information is the Simple Network Management Protocol (SNMP). Many roo ...more
Drilling holes in wall tiles is a fairly easy skill to master once you know how. Follow these simple steps on how to drill a hole in a tiled wall for a hassle free experience. Please Note Drilling a ceramic wall tile is a completely different experience to drilling a hole th ...more
Passwords and data stored in web browsers are extremely valuable to hackers. If not for financial gain, black hat hackers may still leak your passwords and personal information for amusement. Never undervalue what you're worth to a hacker. While I'm definitely no black hat, d ...more
Dirty, malformed, and outright mischievous text strings have long been the enemy of interactive website developers. Strings contain any combination of letters, numbers, spaces, and punctuation, and are entered into text boxes on websites by users. These strings in particular c ...more
Cheesecake is a nearly flawless dessert. It's rich but light, has a toothsome crust but a creamy body, and tastes good served room temperature or frozen. What's not to like? Don't Miss: How to Prevent Cracks in Cheesecake (Or Fix Them) I can only think of one thing cheeseca ...more
After exploiting a vulnerable target, scooping up a victim's credentials is a high priority for hackers, since most people reuse passwords. Those credentials can get hackers deeper into a network or other accounts, but digging through the system by hand to find them is difficu ...more
If you're here, you're probably one of the seven people dedicated to making Mac n' Cheetos a permanent part of the Burger King menu. For the rest of you that stumbled onto this page out of sheer curiosity, Burger King's Mac n' Cheetos were deep-fried, creamy macaroni and chee ...more
Greetings fellow students! I'm currently reading a book called "Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers" This book will teach you different kinds of Python programs for hacking, forensics or penetration purposes ! ...more
Greetings aspiring hackers. I have observed an increasing number of questions, both here on Null-Byte and on other forums, regarding the decision of which USB wireless network adapter to pick from when performing Wi-Fi hacks. So in today's guide I will be tackling this dilemm ...more
Greetings all. I'm back with another informational review of the diversity of utilities for use in the sphere of hacking at your disposal. Today we are going to cover the insides of CUPP (Common User Passwords Profiler) in its entirety. The tool is very basic in nature, as th ...more
Hi, dear co-apprentices and wise masters. I've been recently trying to learn the basics to hacking here, and I've read all guides on Wi-Fi hacking and noticed no word is dedicated to this awesome script that comes bundled with Kali! Okay, it may be a potential skiddie toy, bu ...more
Hello readers, and welcome to Null Byte. Before we start, for those of you who may not know me, my name is ghost_; I'm a relatively active member of our community and have been around for a while. During my time here, I've seen our community cultivate into the brilliant one ...more
Butter can be even more delicious than it already is. While that may be a shocking claim, it's most definitely true. Many new cooks and even seasoned chefs don't realize this, but the few minutes it takes to do these things will pay you back exponentially when it comes to that ...more
Many of my aspiring hackers have written to me asking the same thing. "What skills do I need to be a good hacker?" As the hacker is among the most skilled information technology disciplines, it requires a wide knowledge of IT technologies and techniques. To truly be a great h ...more
Apple's macOS operating system is just as vulnerable to attacks as any Windows 10 computer or Android smartphone. Hacker's can embed backdoors, evade antivirus with simple commands, and utilize USB flash drives to completely compromise a MacBook. In this always-updated guide, ...more
The Play Store hasn't been the most secure place for apps lately. A quick Google search for "Play Store malware" will give you a taste of some of the malicious apps that snuck their way onto Android's official app store. Google is aware of the problem and they're tying to fix ...more