The Shadow Brokers, a hacker group known for its dump of NSA hacking tools in 2016, has just leaked their remaining set of data which implies that the NSA compromised SWIFT, the global provider of secure financial services, to spy on banks in the Middle East. The hackers have ...more
WikiLeaks. In recent weeks, it's been the hottest topic on the web. It's been attacked on a multinational level by political influence peddling. First, U.S. Senator Joe Lieberman swayed Amazon's decision to stop hosting WikiLeaks. Then, Tableau Software removed graphs from th ...more
Before you bite into that beautiful tomato in your garden, the tomato fruitworm, or the Colorado potato beetle, might have beat you to it. At the annual meeting of the American Association for the Advancement of Science (AAAS), researchers explained how microbes inside the gu ...more
Google just bought a huge chunk of HTC for $1.1 billion. They're bringing in around 2,000 employees, mostly from the hardware division, and these folks will presumably work under hardware chief Rick Osterloh. There's a massive patent portfolio involved, too, so stop me if you' ...more
Google, Amazon, and Facebook are always listening. But what's worse? Hackers are listening, too. Windows PCs are particularly vulnerable, but with a few simple commands, a remote attacker can even take over the microphone on someone's Mac computer, streaming audio and listenin ...more
While you might suspect your MacOS computer has been infected with malware, it can be difficult to know for sure. One way to spot malicious programs is to look for suspicious behavior — like programs listening in on our keyboard input or launching themselves every time we boot ...more
Passwords on Windows are stored as hashes, and sometimes they can be tough to crack. In certain situations, though, we can get around that by using the hash as is, with no need to know the plaintext password. It's especially interesting if we can manage to get the hash of an a ...more
Microsoft Office files can be password-protected in order to prevent tampering and ensure data integrity. But password-protected documents from earlier versions of Office are susceptible to having their hashes extracted with a simple program called office2john. Those extracted ...more
Web 2.0 technology has provided a convenient way to post videos online, keep up with old friends on social media, and even bank from the comfort of your web browser. But when applications are poorly designed or incorrectly configured, certain flaws can be exploited. One such f ...more
A convincing domain name is critical to the success of any phishing attack. With a single Python script, it's possible to find hundreds of available phishing domains and even identify phishing websites deployed by other hackers for purposes such as stealing user credentials. ...more
A remote administration tool, or RAT, is a piece of software used for remotely controlling machines. They are commonly used by tech support to gain remote access for troubleshooting purposes, but RATs are also an important part of a hacker's advanced persistent threat (APT) to ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
It's possible to stream a MacBook's entire computer screen without using Apple's Screen Sharing application and without opening any ports on the target device. A hacker with low user privileges on the backdoored Mac may be able to view a victim's every move in real time no mat ...more
A stager is a small piece of software that's typically used by malware to hide what's happening in the early stages of infection and to download a larger payload later. We're going to explore how it works by creating a single line that downloads and runs potentially infinite ...more
A powered-off MacBook can be compromised in less than three minutes. With just a few commands, it's possible for a hacker to extract a target's password hash and crack it without their knowledge. The goal in this article is to acquire a target's .plist file which contains the ...more
Nmap is more powerful than you know. With a few scripts, we can extend its functionality beyond a simple port scanner and start to identify details about target servers sysadmins don't want us to know. Possibly the most popular and well-known reconnaissance tool currently ava ...more
In the previous article in this short series, we learned how to find our neighbor's name using publicly accessible information and how to monitor device activity on their home network. With this information at our disposal, it's time to get into installing and configuring the ...more
With tools such as Reaver becoming less viable options for pen-testers as ISPs replace vulnerable routers, there become fewer certainties about which tools will work against a particular target. If you don't have time to crack the WPA password or it's unusually strong, it can ...more
Beginners learning brute-forcing attacks against WPA handshakes are often let down by the limitations of default wordlists like RockYou based on stolen passwords. The science of brute-forcing goes beyond using these default lists, allowing us to be more efficient by making cus ...more
The Windows 10 desktop and microphone can be livestreamed without using Remote Desktop Protocol (RDP) software and without opening any ports on the target computer. A hacker with low user privileges can monitor and exfiltrate a target's every move and private conversation in r ...more
Computers all over the world rely on a program called "libssh" to use the SSH communications protocol, which allows trusted users to log in and administer computers remotely. Due to a flaw in libssh, fooling a computer into granting SSH access is as easy as telling it you alre ...more
If you want to follow Null Byte tutorials and try out Kali Linux, the Raspberry Pi is a perfect way to start. In 2018, the Raspberry Pi 3 Model B+ was released featuring a better CPU, Wi-Fi, Bluetooth, and Ethernet built in. Our recommended Kali Pi kit for beginners learning e ...more
It's easy to have your password stolen. Important people like executives, government workers, journalists, and activists face sophisticated phishing attacks to compromise their online accounts, often targeting Google account credentials. To reduce this risk, Google created the ...more
Clumsiness is the great equalizer when it comes to smartphones — it makes no distinction between the most expensive flagship handset and cheaper mid-range models. A hard drop onto pavement will usually result in a shattered screen, regardless of how pricey your device is. And ...more
There are nearly 100,000 unique onion service addresses online with over two million people using Tor every single day. Join me as I explore a small fraction of what the Tor network has to offer. It's puzzling to imagine about 100,000 .onion websites in existence. Readers who ...more
Sudo is a necessity on most Linux systems, most of which are probably being used as web servers. While the principle of least privilege is typically applied, sudo misconfigurations can easily lead to privilege escalation if not properly mediated. Which brings us to SUDO_KILLER ...more
What appears to be an ordinary MP4 may have been designed by an attacker to compromise your Linux Mint operating system. Opening the file will indeed play the intended video, but it will also silently create a connection to the attacker's system. Understanding the Attack Whi ...more
You know what's effective against zombies? Armored tanks are effective against zombies. If you want to mow down the hordes in Dead Island, why not learn how to defend the warehouse against the oncoming waves of infected zombies? If you can defend it, Earl will reward you with ...more
In this tutorial you'll learn how to make a cardboard shield, quickly and cheaply. All you need is some stuff you've probably already got around the house. Get to work, so you'll be ready to defend yourself against any barbarian invaders with cardboard swords! Materials neede ...more
The siege is on! This video will show you how to defend your fortress against a human siege and also explain the most-used and best traps in Dwarf Fortress. The second part is not a how-to, but shows the defense against a human siege playing out so you can understand it better ...more
Time to get started playing League of Legends! This recently released game is a completely free to play multiplayer online battle area game. Play a powerful summoner and pit your chosen champion against your oppnents and defend your tower! Here's an easy guide to getting start ...more
Are you having problems because the game was released a long time ago and the more experienced players are better than you? Then you should be very excited to find out that I will be giving you some general tips & tricks about the different classes that I have learned the hard ...more
In this video, you'll learn about the basics of using your military to defend your fortress, in this case against a dinosaur attack, in Dwarf Fortress. Slaves of Arnok II: Dwarf Fortress, or Dwarf Fortress as it is more commonly known, is one of the most intimidating, challen ...more
The basic idea of cleaning laminate floors is to use a dry or damp mop or cleaner for cleaning spills and as little moisture as possible. Laminate floors are resistant products and are made to last, but they also are sensible to moisture and thus it can produce damage. Also ve ...more
Warwick is one of the champions your summoner can bring onto the Fields of Justice, whose speciality is jungling. This tutorial lays out the best items, glyphs and masteries to take advantage of his innate talents so you can ensure victory in your next League of Legends game. ...more
Your summoner is the core character in your League of Legends game, the one who summons the champions to fight on your behalf on the Fields of Justice. Going screenshot by screenshot, the summoner aspect of the game is explained. Stay up to date on your score, monitor your cha ...more
Miss Fortune excels at ranged DPS combat on the Fields of Justice. Here's a good overview of this champion for League of Legends, which gives some useful tips and strategy ideas for building her and bringing her into battle. Become a champion at League of Legends. League of L ...more
Urgot is a unique champion who can deal out high amounts of damage early in his game, and eventually evolves into a tank/assassin hybrid who can be sent after important enemy targets. Here's a guide for building and leveling Urgot to take advantage of his capabilities to help ...more
Galio's strength on the Fields of Justice comes from his ability to tank, though he can provide a bit of team support as well. This guide goes over his strengths, and gives good advice when it comes to making an optimum build for the Sentinel's Sorrow for your next League of L ...more
Vladimir the Crimson Reaper makes a good champion when you want a tank/caster hybrid. When he casts, he draws on health. His health and ability points are also symbiotic, improving one as the other goes up. Here are few tips on runes, masteries and strategy to make Vladimir a ...more
Play an ice phoenix as your League of Legends champion! Here's a tutorial that shows you how to build Anivia the Cryophoenix to maximize her damage capability. She's not fast, but she can hit hard and ensure victory for your team on the Fields of Justice. Become a champion at ...more
Runes are special abilities in the game which allow you customize your summoner in League of Legends. Here's how to equip runes and unlock the abilities to accumulate more runes. You can even save rune configurations in your tome and combine them to create special runes! Beco ...more
This spotlight focuses on Garen, the Might of Demacia, a melee champion who can be brutal with a sword. This video goes over how his abilities let him deal a great deal of damage to others while taking very little himself. Here are also some useful strategies when it comes to ...more
Heimerdinger is one of the weakest champions in League of Legends, but that doesn't mean you can't still win with him! This video shows you useful strategy tips when you play the Revered Inventor based on his unique abilities and the optimized build to ensure victory for your ...more
Is Kennen one of your favorite champions to play for League of Legends? This strategy guide goes over how to best use the unique abilities, masteries and optimal items to make sure this tiny ninja fights his best for your summoner! Become a champion at League of Legends. Leag ...more
You wanna play too? It'll be fun! This is a video which explains the best way to play the rather creepy nuker Annie, the Dark Child. Achieve victory for your team by making sure you've optimized her abilities, spells and items! Become a champion at League of Legends. League o ...more
Keep your enemies at bay and control as much space on the map with your champion as possible. This tutorial shows you how to dominate the map for greater control during your League of Legends game. Be aware of your surroundings, and learn a few tricks to get out of a bad spot ...more
Introduction Halo: Reach is Bungie's latest and final addition to the franchise. Microsoft has claimed the title and from now on 343 Industries will be working on the Halo franchise. In my opinion, Bungie's last game is the best out of all of them. These are some tactics and ...more
This is an article about Maxine Waters and how she has tried to defend herself against accusations that she helped bailout OneUnited Bank because her husband had stock there. The article also has a link to video of the news conference she held at Capitol Hill in Washington D.C.
The headlock is a very common move used in the playground or in a bar fight. This simple Jiu-Jitsu escape will help you defend yourself against a headlock.
Working on the inside requires great cardiovascular training, be prepared to train hard. These shots are effective against people who do not know how to defend themselves on the inside. If you are up against someone who is very smart at shots it is essential to know how to def ...more
You never know when you'll have to defend yourself against one of these bloodsuckers, so be prepared to bring a vampire to his knees. While you may not believe in vampires, there are those that do. In any case, prepare now for a hypothetical attack from the un-dead and you won ...more
Women can use a variety of basic self-defense techniques and tactics to defend themselves against attackers. Learn basic self-defense moves and techniques in this free video on women's self-defense. Part 1 of 10 - How to Master the basics of women's self-defense. Master the ba ...more
If you're trying to figure out how to play the Disgaea 4 combat modes effectively, take a look at this guide on positioning, attacking, defending, and more while fighting against opponents in the PS3 game. The combat can be a little confusing but there are many different optio ...more
Your family and estates have come under attack, and you must defend them! This walkthrough for Assassin's Creed: Brotherhood shows you how to get through this part of the game, in large part by manning the cannons against your enemies.
This how-to video demonstrates Krav Maga Worldwide Sherman Oaks 3rd degree Dave Bluestein teaching defense against a basic choke from the front with a push. Follow along and improve your Krava Maga skills or just learn how to defend yourself from an attack. Watch this video ma ...more
This Null Byte is the first part in a mini-series on the art of Social Engineering. I will be teaching you how to effectively defend yourself against it. What is Social Engineering? Social Engineering is the art of hacking humans. It's when a person is manipulated into doing ...more
Hey now! Brazil, Paraguay, Chile, Argentina and Uruguay are doing very well in their respective groups. The are all expected to qualify to the final 16. In fact, they are doing better than any other continent. Europe's top flight teams are disappointing, as are the host Africa ...more
Ezreal is a champion you can bring onto the Fields of Justice. This video demonstrates what Ezreal, a strong ranged fighter, can do and the best ways to use him in combat. Here are a few good strategy tips when it comes to scaling his abilities, and a few ideas on how to fight ...more
Start with Ryze as your champion at Level 1 and play him straight up through until Level 12. This tutorial shows you how to start his build and what spells, items and abilities to invest your points into so you can maximize his damage potential. Become a champion at League of ...more