As pentesters and hackers, we're going to be working with text frequently — wordlists, configuration files, etc. A lot of this we'll be doing on our machine, where we have access to whatever editor we prefer. The rest of it will be on remote machines, where the tools for editi ...more
Welcome back, my hacker novitiates! Finding vulnerabilities in systems can be one of the most time-consuming tasks for a hacker. There will be times, though, when you'll find yourself in a position that you know that a particular port represents a vulnerable application or se ...more
The moment arrives when you finally pop a shell on the web server you've been working on, only you find yourself in a strange environment with limited functionality. Restricted shells are often used as an additional line of defense and can be frustrating for an attacker to stu ...more
If you're interested in learning a general purpose, high-powered programming language, Python might be the way to go. In this installment from his video tutorial series dedicated to programming in the Python programming language, you'll learn how to set up the vi editor to cod ...more
This week's roundup features three games that I've either never bothered to play, was unable to play due to PC technical limitations, or haven't played because they've just been released. None of these three games cost more than $15. Jamestown: Legend of the Lost Colony I ne ...more
Video: . Project Overview Have any old school floppy drives lying around? Get hacking... and transform them into an electronic orchestra! This project uses a myRIO embedded controller and four floppy disk drives. The myRIO effectively plays the disk drives like musical instru ...more
As Apple prepares to potentially introduce its (mostly) secretive AR headset for possible introduction later this year and launch next year, the company has made a strategic investment to ensure its supply chain can support it. On Wednesday, Apple announced an award of $410 m ...more
Note: The article assumes that the reader has a fundamental understanding of at least one other programming language, and that this is intended serve as a quick reference for Perl's basic syntax & behavior in regards to Variables, Control Structures, & Functions. Learning to ...more
The I VI II V jazz chord sequence was first popularized by the George Gershwin song "I've Got Rhythm" and later had its popularity reaffirmed for the masses by The Flintstones theme song. This guitar lesson teaches you how to play ten different versions of this chord progressi ...more
Jazz guitar is one of the deepest, most challenging, and most rewarding kinds of playing. This video by Justin teaches us an jazz guitar exercise designed to work on I VI II V I chords. Some skill is definitely required, but if you're an experienced jazz player this exercise s ...more
If you want to play games that aren't in the iOS App Store, Apple makes it pretty tough for you. Usually, the only solution is to jailbreak your iPad or iPhone, but that's something most avoid because it will void the warranty and may cause potential bricking issues. In some ...more
Welcome back, my greenhorn hackers! Continuing with my series on how to crack passwords, I now want to introduce you to one of the newest and best designed password crackers out there—hashcat. The beauty of hashcat is in its design, which focuses on speed and versatility. It ...more
Welcome back, my novice hackers! The worst thing that can happen to any hacker is being detected by a security admin, the security technologies (IDS, firewall, etc.), or a forensic investigator. Every time we send a packet to our intended target, that packet contains our IP ...more
I loved the original Star Wars trilogy when I was a kid, but loathe all of the current DVD, Blu-ray, and streaming versions available today. Ever since 1997, every version of A New Hope, The Empire Strikes Back, and Return of the Jedi has had horrendous CGI effects added in th ...more
Welcome back, my greenhorn hackers! Recently, I asked the Null Byte community what subject they would most like me to cover in future tutorials. Many of you cited scripting, and I decided it's best to cover this subject soon, so here goes. Any self-respecting hacker must be ...more
Welcome back, my aspiring hackers! In this series on Linux for aspiring hackers, I'm trying to provide you with the basic skills needed to be capable in Linux as a hacker. One area that's critical that we haven't covered yet is building and managing an Apache web server. Apac ...more
Backdoors are convenient to leave behind once you've already found a way into a server, and they can come in handy for a variety of reasons. They're good for developers who want a quick way into machines they're working on, or for systems administrators who want similar access ...more
Warnings this only for educational use i dont take responsiblety for any use of this article if you want to use this for use at a school plz contact me at sebzy4@hotmail.com hi im a computer enginer/programmer (NOT games) but i am good at hacking and i want to help. notise th ...more
Halloween is coming up, so many of you may have a need or desire to carve a pumpkin and turn it into a Jack O' Lantern. This week we are going to explore carving our pumpkins into interesting geometric shapes. In this post, we will carve the pumpkins into spherical versions of ...more
Fractals and stars are two of the most beautiful and complicated-looking classes of geometric objects out there. We're going to explore these objects and how to carve them on a pumpkin. Unlike the last one on carving polyhedral pumpkins, where we used the entire pumpkin to car ...more
In the first part of my containers series, we learned how to install Docker on our local machine, pull down "hello-world" and Ubuntu containers, SSH into containers, and install software when in a container. Now, we're going to work on building, customizing, and storing our re ...more
Final Fantasy XV, the latest release in the long-running Final Fantasy franchise, has been a massive success, shipping around 6 million copies worldwide in less than two months. Final Fantasy XV: A New Empire is a mobile game based off this popular console iteration, and has s ...more
This is the best how-to's website that I've ever seen, and I wanted to join it. It taught me a lot, but, because I'm here to learn too, please correct me if I'm wrong. You probably know that Ettercap is a very powerful tool for man in the middle attacks. You probably know tha ...more
Torus knots are beautiful knots formed by wrapping a line around a torus and tying the ends together to form a loop. The resulting knot has a star-like appearance when viewed from above. The 36 examples with the least number of crossings can be seen at the Knot Atlas's page on ...more
25-year-old Anthony Le, of Colorado is THE ultimate Iron Man fan. A cosplay fan, Anthony decided to try his hand at building a super realistic Iron Man suit, just in time for the release of Iron Man 2. The incredibly talented fitness consultant did above and beyond what you mi ...more
When you first become interested in learning how to program, it can be difficult to find a place to start. A lot of questions come up, especially if you're new to the idea of programming entirely. After you pick which language you want to learn, you have to worry about how you ...more
SSH local forwarding is a must for covering your tracks and getting out there to do your work. Also called SSH tunneling, this process will put one or more steps between your machine and the machine you're working on, for security and other purposes. It can be a bit daunting f ...more
A CNC router machine is probably the most useful tool a hobbyist can own, but the price for a CNC machine on the market is way more than the average hobbyist is willing to spend. You can build your own CNC with very basic tools, little knowledge of machinery, mechanics, or ele ...more
As a doctor, sometimes it will be necessary to perform a neurological examination of your patient to rule out any neurological disorders. Your objective is to identify abnormalities in the nervous system, to differentiate peripheral from central nervous system lesions, and to ...more
COLOSSUS n pl. COLOSSUSES or COLOSSI a gigantic statue 60 points (10 points without the bingo) A colossus is a huge statue with great size and proportions, but it could also mean a person or thing of immense size or power. It comes from the Latin word colosseus and the Greek ...more
Everyone has the same five spirits in their bar: vodka, rum, whiskey, tequila, and gin. They're all great, but every so often the mood strikes to try a cocktail with a little something different. We'd like you to meet three spirits from South America that would make a welcome ...more
Scientists have recently released a mathematical breakdown of the perfect handshake. The University of Manchester researchers discovered that nearly one-in-five people hate the handshake, listing complaints such as sweaty palms, limp wrists, gripping too hard and no eye contac ...more
Some people are what is labeled a power user. I am one of these people. No matter how fast I get my system, or how quick of programs I have, it is never good enough. There is always at least one program that I could swap out for a more advanced, text-based counterpart that inc ...more
Anyone who has used Linux long enough is familiar with sudo. Short for superuser do (or substitute user do, depending on who you ask), it allows users to run commands as either root or another user on the system. From a hacker's point of view, sudo is often all that stands bet ...more
This Cinderella inspired look consists of a soft wash of blue and a strong winged black liner. The cosmetics used for this look are Coastal Scents sparkle eye liner- light blue, AC pigment in Mutiny, Coastal Scents 88 Palette, Fyrinae Pure sugar for inner corner highlight, Urb ...more
This FL Studio tutorial is actually a music theory lesson that teaches you how to read Chord progression notations (intervals), such as (I-VI-ii-V), and an easy system to keep track of them all within FL Studio. If you are new to music and want to learn music production and wo ...more
Here's a great excuse to play with your food—and learn some math while you're at it. We've all seen a hexaflexagon folded out of paper, but how about a burrito? Vi Hart, a "mathmusician" over at the Khan Academy, came up with the Flex Mex, a burrito folded into a hexaflexagon ...more
For someone who loves math as much as Vi Hart (a self-proclaimed "mathematical musician"), she doesn't pay an awful lot of attention to her math teacher. But that's ok. Cuz somehow her wonderfully whimsical doodling transforms into mini lessons on graph theory, mobius strips, ...more
This walkthrough guide will cover the complete Overload DLC mission pack for the Mass Effect 2 action role-playing game on the Xbox 360. Overload became available for download in June 2010 on Xbox Live Arcade (XBLA), and features four different missions. Watch this series for ...more
While Snapchat had a head start in making augmented camera effects popular on smartphones, Facebook has spent the past few years in hot pursuit, with no less than three apps offering mobile AR experiences, plus its Portal hardware lineup of smart home devices. Facebook's late ...more
Video: . Being one of the most popular DIY/maker projects around, Musical Floppy Drives are nothing new. However, myFloppyDriveOrchestra includes a few unique features, which separate it from the crowd. FPGA - by implementing the drive control on an FPGA, I have effectively c ...more
Oh Data, You so Awesome! We are going to use Node.JS to gather us some data. Given nodes plethora of well abstracted network abilities and it's deep evened nature, it will make quick work of plugging into various data sources and gathering / making good use of said data. Dat ...more
Meet Vi Hart, our charming host. Vi is a self-labeled "mathematical musician", who burns paper instruments, cuts food into mathematical shapes, twists balloons into mathematical models, and makes mathematical music with candy buttons. In other words, she's awesome.
If you use Ubisoft's uPlay browser extension, you should probably get rid of it right now. An Information Security Engineer at Google discovered that the plugin has a hole in it that allows programs to be installed through uPlay, essentially letting anyone who feels so incline ...more
After awarding $410 million to the company that supplies it with VCSELs and LiDAR sensors, Apple has made another strategic investment into a company that may contribute to future augmented reality hardware innovations. On Monday, Apple announced a $45 million award from its ...more
Bring the magic of the original "Star Wars" movie back to lift, right in your own home. Learn how to draw Luke Skywalker from Star Wars - Episodes IV through VI. Luke Skywalker is the epitome of the Jedi force, so relive that spirit in your own cartoon version of the Jedi mast ...more
Notice how it seems like every player is wearing the same cleats this year? Well, according to Nike almost 40% of the World Cup roster is sporting their new Mercurial Vapor VI boots. Originally endorsed by Portugal's Cristiano Ronaldo, the colorful kicks are catching on for m ...more
Want to look like a superhero? Check out this very helpful beauty video for all of you who have troubles with makeup every now and then. Xsparkage shows you how to create the yellow and red Iron Man makeup look. Don't be afraid, it will be awesome! Iron Man in no time! Produc ...more
This beauty video demonstrates how to do an 88 Palette purple posey makeup look . Marlena, aka MakeupGeek, is a freelance makeup artist living in Michigan. Marlena says "Makeup isn’t just paint for the face, something to cover blemishes, or even something fun to do in my spar ...more
Over the past week, practically every major tech company working on augmented reality has held their quarterly earnings calls with investors, and each addressed or at least mentioned the role of AR during their prepared remarks. However, Facebook's earnings call had some of th ...more
OSAGYEFO DR. KWAME NKRUMAH (1909-72) Founder and Father of the Nation Osagyefo Dr. Kwame Nkrumah, the first Prime Minister and President of Ghana, stands out not only among the Big Six but also among the greatest statesmen of history. It was he who canalized the discontent of ...more
Apple has a sterling reputation when it comes to managing its supply chain; it's where CEO Tim Cook proved his mettle to succeed Steve Jobs. Now, the company has made a strategic investment with a supplier that will be crucial to its future plans for AR wearables. While Apple ...more
With the plethora of programming that we promote at Null Byte, I figured a lot of you newbies that stop by IRC will need a big boost in the right direction to make your dive into programming a lot easier. A hot question that has been thrown around in IRC a lot when making the ...more