Welcome to the second Null Byte in a series educating you on Social Engineering awareness and techniques. Today, I'm going to show you how a saavy Social Engineer would trick a friend into unknowingly surrendering their Facebook password. My intent is to warn and demonstrate h ...more
Welcome back, my rookie hackers! Many newbie hackers focus upon the technical aspects of hacking and fail to give enough attention to social engineering. In fact, I would say that technical hacks should ONLY be attempted if social engineering attacks fail. Why bother spending ...more
This Null Byte is the first part in a mini-series on the art of Social Engineering. I will be teaching you how to effectively defend yourself against it. What is Social Engineering? Social Engineering is the art of hacking humans. It's when a person is manipulated into doing ...more
Welcome back, my greenhorn hackers! Although we have focused primarily on technical hacks here, social engineering can sometimes be especially effective. This one requires a bit of technical skill, but not too much. In addition, it's limited by how specific a target you can c ...more
Welcome back my social engineers/hackarians! Today we'll be looking into a fantastic piece of software, The Social-Engineer Toolkit or just SET for short. SET is designed, Developed and used by several Social-engineers. So... Let's get started! Getting Familiar When you boot ...more
Laptops are almost a necessity in today's society. It doesn't help that a laptop that can actually increase your work productivity will put at least a $1,500 dent in your wallet. I'm sure you have searched around to try to find factory direct deals, or (shiver) even looked at ...more
Brainwashing is something that happens to us every day, whether you believe it or not. It doesn't take fancy tools or space-age technology. Even if our country didn't intentionally brainwash people (believe me, they do), our country's media is brainwashing people nonstop. Just ...more
Google is our friend, but it still has its flaws as everything tends to. A little known flaw within the media giant allows phishing to take place on Google accounts that would completely bypass advanced web protection programs in user's browsers—as well as other protections th ...more
How To : Binary Patching. The Brute Force of Reverse Engineering with IDA and Hopper (And a Hex Editor).
What if the code you are trying to reverse engineer is obfuscated or somehow corrupted? What if no way is left? Here comes what I like to call (wrongly and ironically) the "brute force of reverse engineering". Before I even start, as always, I wanted to apologize for any uncl ...more
In this article, we will explore the basics of radare2, a powerful package that comes with Kali. We are going to write a simple program, and then disassemble it, to see what is really doing in the processor. I will use Kali version 1 and x86 (64 bits) instructions. Not all ar ...more
Law enforcement can make a lot of folks cringe. Too often do we hear on the news, and even experience in our own lives, the unjust way that an unacceptable portion of law enforcement treat the very citizens they are supposed to protect. People's rights are violate each and eve ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. Youtube user FVDisco is always outdoing himself. You may know his work from the Minecraft Player Piano, or his Redstone Slot Machine. Recently, he created an automated mob slaying g ...more
Social Engineering was mentioned a few times here on Null Byte, but not very many explained what it is, or how to do it. I love this quote because it's true: Social Engineering is the key to carrying out client side attacks, and all you need is a little creativity! Social Eng ...more
Sometimes, paying for the whole Xbox LIVE service might seem like a waste of money. You're constantly experiencing lag, you've got people modding and cheating, kids are being loud and obnoxious over the mic, and your kill-to-death ratio is getting dumped on. Basically, the who ...more
Lost the product key for your game? If you have to reinstall the game and don't have that key anymore, you're out of luck, especially if you didn't "buy" the game. But never be in fear of losing product keys again with today's Null Byte, where we'll be practicing a little bit ...more
This is the first official announcement for a new weekly activity on Null Byte for the community to participate in. Starting next week, depending on how much traffic we get doing it, we are going to start doing live social engineering calls via Skype. I've made a list below so ...more
How To : Advanced Social Engineering, Part 1: Exact Revenge on Craigslist Scammers with Tabnab Phishing
A while back, I decided to sell my laptop on Craigslist. As many people know, when you post an item worth anything over the threshold of garbage, you get a million different shady emails from people pretending to be legitimate buyers. After a deluge of emails flooding my inbo ...more
You're walking down the street, minding your own business. Then you see it—a large, bright fireball in the near distance. A tremendous heat wave speeds towards you at one thousand miles an hour, and before you can think, before you can even blink, the extremely heated wind pus ...more
Today I am going to teach the various ways that you can use social engineering to hack a system. For those of you that have followed my past tutorials, you know that social engineering can unlock a world of possibilities. This is because no matter how many firewalls, no matter ...more
When it comes to social engineering, Null Byte is here to show you how it's done. Social engineering is the key fundamental to unlocking tons of possibilities and opportunities in your everyday life. So, what is social engineering? Social engineering can be called many things. ...more
Ever wondered what the inside of a burning rocket looks like? Well, thanks to Valve engineer Ben Krasnow, now we know. He built a homemade hybrid rocket engine that's see-through so you can actually watch how it works. And even though it's probably a really bad idea to try thi ...more
You might have seen our post on this last week: It's a working reproduction of the Mars Curiosity Rover made with LEGOs, but it's a bit complicated for anyone without a decent amount of robotics knowledge. Plus, you need to have some Mindstorms NXT and TECHNIC parts lying arou ...more
Last week's social engineering phone calls were a blast. We made some friends, and even some enemies. We scored cheap food for some buddies, made some phone bills disappear, and even got a few people some free pizzas. So overall, it was a very successful night. In light of its ...more
Can you dissect an equilateral triangle into pieces that can be rearranged into a square? If you think you can, you may have mastered the Pythagorean theorem. Can you figure out how to draw a straight line without a reference edge? If so, you might just be the pioneer of the ...more
Hello friends. This is actually my first how to. In this tutorial I'll be teaching how to simply copy someone's WhatsApp pictures gallery into your computer, in an automated way. It is just an example of how easy is to steal data from someone's smartphone. I am covering Whats ...more
Redoing your floors can be expensive unless you know how to do it yourself. Learn the basics for installing a new engineered wood floor in this how to video. Watch the short DIY show clip and follow along so that you too can install a new engineered floor in your kitchen.
We had a blast during last week's social engineering calls. One of our attending social engineers was so clever that she convinced several people on Craigslist that lost items were hers, even if it seemed she couldn't be trusted. But females are better social engineers, natura ...more
Social engineering makes headlines because human behavior is often the weakest link of even well-defended targets. Automated social engineering tools can help reclusive hackers touch these techniques, but the study of how to hack human interactions in person is often ignored. ...more
Autonomous vehicles, aka self-driving cars, are not yet available to the public (at least not ones SAE Level 3 and higher). However, this doesn't make the jobs any less in demand. In fact, if you meet the right qualifications, you could make a lot of money in this industry. A ...more
Apple software engineer Andrew Carol built a fully-functional replica of the Antikythera Mechanism, the world's oldest known scientific computer. The 2000-year-old analog device was used by the ancient Greeks to predict the year, date, and time of future solar and lunar eclips ...more
Are you not satisfied with haphazardly folded laundry? Learn how to make a handy tool out of cardboard and fold a t-shirt with exactitude. Make sure every t-shirt you fold is perfect.
Most of us know how to make a sandwich, but how many of us know how to make a sandwich correctly—i.e., so that the slippery ingredients like tomatoes and cucumber don't come gushing out the other end when we take a bite? And while some might classify this as a not-really-a-pr ...more
Brian Chan is an engineer who creates beautifully folded origami. Some of the pieces are incredibly complex; view a selection of his work below, click through for more. Inspired? Start folding.
Having bills to pay is one of the worst parts of life, especially around the holidays. And if you're extremely unlucky, you might also have to pay some hefty medical bills. This can put a heavy damper on plans, wants and needs. What's worse? The people that you owe money to ar ...more
Just showing off the successful social engineering results. Make sure that if you used the guide, post back here with a picture of whatever you bought!
Edit: Some of the methods I show you may be difficult, or not work at famous or high quality hotels. Welcome back, my excited hackers! Right now I am on vacation in the wonderful city of Tulum, Mexico. I thought it would be a great idea to teach you guys yet another social en ...more
French manufacturer Renault Trucks is looking to the HoloLens to improve quality control processes with its engine assembly operations. An internal incubation team of about 20 employees is collaborating with technology partner Immersion to design a prototype of the applicatio ...more
Your perfect home-baked chocolate chip cookie may be thick and chewy, or crispy and thin, or something in-between. With a little cooking know-how and experimentation, you can adjust the different ingredients and cooking steps in the baking process to create the perfect chocola ...more
The problem with HIV is that it attacks and kills the very cells of the immune system that are supposed to protect us from infections — white blood cells. But a new technique, developed by scientists at The Scripps Research Institute (TSRI) in La Jolla, California, offers a di ...more
Good day to everyone, today I will present some basic and advanced concepts that targets sophisticated attacks on the social basis, also I will write about some steps that can prevent this attacks from occuring, basically we will examine Social Engineering from the angle of at ...more
While augmented reality headset makers are faced with tackling numerous challenges before the category is truly ready for prime time, a start-up comprised of former Microsoft engineers may have nailed fast and precise tracking of hand gestures and full-body locomotion. Operat ...more
I felt our community would benefit from this article. Social engineering is a big part of what we do, so it's something you should all become familiar with. This article outlines some basic principles of social engineering. While the information we want will be more specific ...more
In this video tutorial, viewers learn how to read a micrometer. This tool allows the user to accurately measure components. They have the ability to measure dimensions accurately to within one hundredth of a millimeter. Micrometers are designed with a wide variety of styles an ...more
Your home's siding will only last so long, so when it's time to replace it, what will you do? Well, calling a professional will cost you thousands, but this home video from Buildipedia will walk you through the steps to replace your home's siding yourself.
Welcome back, my future hackers! After my first tutorial about doxing, I decided I would dive a little bit deeper into the world of social engineering. In this tutorial we will learn some basic social engineering techniques to get into a company building, find out more informa ...more
A.E Hi again this is my second post on nullbyte. The first one was on how to make a remote screenshot captor, now I will give you a presentation for a project of mine(I have named It Antisocial Engine) that It is not something extraordinary but will help many guys. It is a g ...more
This tutorial goes over all the different things you need to know in order to be a good Engineer in Battlefield 3. You will want to repair vehicles nearby while avoiding gunfire. The guide will also show you how to use javelins and lock on-missles to take out enemy vehicles.
News : Former Apple iPhone Engineer Explains Why He Thinks Augmented Reality Is the Future of Mobile
Any little bit of new light shed on Apple's rumored augmented reality plans is irresistible, and the latest comes from a fairly powerful source — a former Apple engineer who worked on the iPhone. Working as a human interface designer, Ken Kocienda joined Apple way back in 200 ...more
Check out this video to learn how to build an "A" frame structure. "A" what?
Former Google and Uber engineer Anthony Levandowski's scathing accusations challenging the physics behind Tesla CEO and founder Elon Musk's claims about Autopilot should force Musk to make his case that self-drive cars don't need LiDAR in the next few months. Besides the humo ...more
I've recently been on holiday in Europe, staying in a hotel that was part of a big chain that included many in the local area. A quick review of the wi-fi within range of my room showed that there was another in the chain that was in range of my Yagi Turbotenna, which naturall ...more
News : Investors Bet $8M on Former Google & Facebook Engineers' Platform-Bridging AR Development Tool
Augmented reality software maker 8th Wall has closed a Series A funding round of $8 million in capital to feed the growth of its development platform. Founded by former Google and Facebook engineers, 8th Wall uses computer vision to enable six degrees of freedom tracking, lig ...more
Joseph Smarr talks to O'Reilly about lessons learned from Google+, including sharing, the API, the pseudonyms issue, etc. This interview was really fascinating.
Apple staff will be put through their paces now that the company's "Automated System" for driverless cars is in motion. Earlier this month, it emerged that the notoriously secretive Apple received a permit from the California DMV, which costs a small fee but requires at least ...more
Cruise Automation is actively seeking to recruit a lead engineer to head its development efforts of 3D maps with expertise in city environments, signaling the GM driverless unit's move towards a mobility-as-a-service business model. Given what Cruise has revealed so far, the ...more
In hopes of strengthening its growing augmented reality team, Apple has reportedly hired Michael Abbott, an engineering and investment veteran with past ties to Twitter, Microsoft, Palm, and others. The report was surfaced by MacRumors, which translated a MacGeneration post o ...more
Your Windows computer may be experiencing some issues, and those issues may be a direct result of computer viruses and malicious software from the internet. One of the simplest ways to find these issues and repair them is by using a freeware program called System Repair Engine ...more
It may seem strange to find the director of engineering at a question-and-answer site all of a sudden pick up and lead a new driverless startup, but to Kah Seng Tay, both engineering tasks require building the right infrastructure to handle large amounts of AI data. Drive.ai, ...more
Faraday Future's all-electric super sports car concept attracted a lot of attention at CES earlier this year, but now it is struggling to replace key driverless engineers and program directors who left the company amid its recent financial troubles. Following cash flow shorta ...more