In this Computers & Programming video tutorial you will learn how to change the default Windows Remote Desktop port. It is actually a registry hack. You can check the IP address of our machine by typing ipconfig into the cmd prompt. For hacking into a machine, you should have ...more
Make your coffee maker sparkle with these easy tips. This Howcast video presents a helpful guide on cleaning your coffee maker. You Will Need * A drip coffee maker * White vinegar * Ice cubes * Table salt or rock salt * Dishwasher detergent * A dish brush * Baking soda * Alka ...more
Here is a short instructional video describing the weakness of large Master brand locks. See how to crack a Master Lock #5 with a soda can shim. It is so easy to hack and crack open almost any type of lock if you know its weaknesses. The only tool you really need to open a loc ...more
Learn how to turn a t-shirt into a sexy one piece swimsuit. This swimwear project is cheap and easy. The sexy GiannyL demonstrates this DIY closet hack that's simple and cheap. All you need is a t-shirt, pins and a sewing machine. Cut along the pattern Gianny L has demonstrate ...more
Ever worked on a painting project and had the paint spill everywhere? This quick and easy pot made from a plastic soda bottle and tape will not spill, even when it tips over. Learn how to make this pot that does not spill(for paint, glue, machine oil, etc.) by watching this vi ...more
Learn how to recycle a frumpy winter sweater into a sporty strapless dress! The sexy GiannyL demonstrates this DIY closet hack that's simple and cheap. All you need is one old frumpy winter sweater, pins, scissors, and a sewing machine. Cut along the pattern that Gianny L has ...more
Learn how to create your own shawl in two easy steps with Gianny L. You need fabric, chalk, trim, a sewing machine and scissors. Voila! You have a cheap, cute DIY shawl. The sexy GiannyL demonstrates this DIY closet hack that's simple and cheap.
Well, only if you also happen to have an ARM powered LEGO Speedcuber device. Promotional video by maker David Gilday for ARM Ltd. With the help of the Android, the machine cracks the Rubik's Cube in 25 seconds (compare to LEGO Mindstorms solvers' 4 seconds.... or the human re ...more
Home chemistry is great, but what happens when you forget to label your chemicals? How do you know if you turned a clear glass of ammonia into a clear glass of unobtainium? Chemists have a tool for just that. Litmus paper are small bits of filter paper saturated with a reacti ...more
Don't panic if you spill grease on your clothes or the couch. Start tackling it instead. Learn how to get grease stains out of fabric with this how-to video. You Will Need Salt, baking soda, cornstarch, or talcum powder A gentle brush, like a pastry brush Colorless dishwashi ...more
In this series of videos, you can get first hand instruction on strength training machines. For example, you can see clips of our expert using different press machines like the chest press and leg press machines. Learn how to work out your glutious maximus using a glute isolat ...more
Learn how to save money by making your own Nepresso coffee maker capsules. Hack your coffee machine with this video.
Check out this video guide on how to make a cheap special effects blood cannon. This inexpensive SFX machine not only cheap, but an effective Special FX blood cannon for any zombie movie or gunshot wound or blood splatter effect! The blood cannon shooter parts: 22mm PVC pipe ...more
A couple of months ago at the Black Hat security conference, hacker Cody Brocious gave the hotel industry a nasty surprise when he figured out how to hack the locks made by Onity that are used in millions of hotels worldwide. The reason his hack is so impressive is because it ...more
The last two US Presidential elections were marred by reports of voter fraud. So Princeton University took it upon themselves to investigate how easy it could be to hack the election.Answer: easy. They bought a Diebold voting machine, the system used across the country and in ...more
I was just 16 when I poured my first beer. It was my first restaurant job and a customer ordered a pint while the bartender was busy. I'd seen her do it hundreds of times, and she made it look so easy. Besides, it couldn't be that different from filling a cup from the soda mac ...more
In a 10 button Nesquik vending machine or other 10 button vending machines, you can hack to get credited for free drinks. Don't Miss: 9 Vending Machine Hacks for Free Drinks, Snacks, & More Step 1: Press the following sequence on the buttons: 44455544455, you will be able t ...more
Welcome back, my novice hackers! As we saw in my first tutorial on Facebook hacking, it is not a simple task. However, with the right skills and tools, as well as persistence and ingenuity, nothing is beyond our capabilities. One of the cardinal rules of hacking is: "If I ca ...more
Pachinko originated in Japan as large casino machines that were similar to video slot machines. Players gambled on them for prizes. They were then adapted and became popular in the US as handheld kids' toys made of cardboard, a couple of BBs, some plastic and a rubber band. N ...more
Ramen has always been a go-to meal for frugal foodies, college students, and anyone else who loves a soothing, cheap, and easy meal. And while instant ramen is delicious (and can easily be improved), making a simple homemade ramen is even better, and nearly as easy. Most peop ...more
Welcome back, my neophyte hackers! In today's hack, we're going to have a bit of Halloween fun. Have you ever had a boss who made you miserable with his micro-management and nagging? Maybe you thought he unfairly fired your friend/colleague? Well, now here's your chance to ge ...more
Need to add more space in your small closet? For a simple organizational hack, simply connect two clothes hangers with a metal soda tab so that you can hang two articles of clothing on a closet rod slot instead of just one. On the flip side of the coin, if you don't have spac ...more
Are you a messy burger eater? Ants and fruit flies invading your home? Hate drinking warm drinks? Find out the quick and easy DIY solutions to these problems with these 10 amazing tips and tricks for the summer. Video: . I had seen pictures of some of these useful ideas on the ...more
Want an electric car without the price tag? You could always build your own, or maybe just hack your old gas guzzler into an eco-friendly electric machine... This weekend at Defcon, security consultant David Brown showed off his "Voltswagon" project, a 1974 Beetle named Shocky ...more
Hacking from a host machine without any form of proxying is reckless for a hacker, and in a penetration test, could lead to an important IP address becoming quickly blacklisted by the target. By routing all traffic over Tor and reducing the threat of malicious entrance and exi ...more
In this project, I'll show you how to make an itty-bitty outdoor BBQ from leftover beer or soda cans. It's the perfect summertime hack if you don't have a grill and are cooking for a small group of people—one bratwurst at a time. You can grab the wire grill template here. Vide ...more
Tender is the name of the game when it comes to cooking damn delicious meat, but achieving that succulent texture isn't always easy. Thanks to the folks over at Cook's Illustrated, though, we now know there's a simple, foolproof trick to take when tackling meat tenderness... ...more
When Yosemite was released, a more detailed boot screen came to your Mac. So now, just like on Apple's mobile devices, you will see a loading bar telling you how far into the startup process you are. Apple also decided to add a black version of this boot screen to newer Macs, ...more
Whites are the hardest color to keep looking bright and new after just a few months' time. Your sweat and oils quickly become stains, and colors from other clothes will eventually bleed into the fabric, discoloring your bright whites into something merely whitish. But before y ...more
Welcome back, my greenhorn hackers! A few years back, Microsoft implicitly recognized the superiority of the Linux terminal over the GUI-based operating system by developing PowerShell. Since Windows 7, every Windows operating system has had PowerShell installed by default, a ...more
In my last quick clip, I demonstrated how to take a bottle of soda and freeze it on command. I received many requests for a more detailed article on this, so here we go. This "super cool" trick works with cans of soda too, not just bottles! Video: . This project was inspired b ...more
Holidays are a time for good food and good drink, but more often than not, we substitute good drink for, well, cheap drink. However, cheap wine doesn't have to be bad. As the international wine industry grows, it's becoming more common to find decent bottles on the cheap, and ...more
Welcome back, my neophyte hackers! Have you ever had a neighbor that you're certain is up to no good? Maybe you've seen him moving packages in and out at all hours of the night? Maybe you've seen people go into his home and never come out? He seems like a creep and sometimes ...more
Welcome back, hacker novitiates! In the next few hacks, we will be breaking into Windows servers. In this installment, we will learn to add ourselves as a user to a Windows 2003 server. Of course, when we have added ourselves as a user, we can come back any time and simply log ...more
A vulnerability in the design of LiDAR components in driverless cars is far worse than anything we've seen yet outside of the CAN bus sphere — with a potentially deadly consequence if exploited. The hack is also going to be hard to fix, researchers Hocheol Shin, Dohyun Kim, Y ...more
Welcome back, my novice hackers! The worst thing that can happen to any hacker is being detected by a security admin, the security technologies (IDS, firewall, etc.), or a forensic investigator. Every time we send a packet to our intended target, that packet contains our IP ...more
QR codes are everywhere, from product packaging to airline boarding passes, making the scanners that read them a juicy target for hackers. Thanks to flaws in many of these proprietary scanning devices, it's possible to exploit common vulnerabilities using exploits packed into ...more
One of the most critical bugs to come out in the last five years was Shellshock, a vulnerability which allows attackers to execute arbitrary code via the Unix Bash shell remotely. This vulnerability has been around for a while now, but due to the ubiquity of Unix machines conn ...more
Hello null_byters, after some time out here we are again with another tutorial, continuing our beautiful series, today we will write our first real world bash script. BEFORE WE START Before we start today's lesson Let's recap what we learned in the previous lesson, right now ...more
A lot of people think that TOR services are unhackable because they are on a "secure environment", but the truth is that those services are exactly the same that run on any normal server, and can be hacked with the same tools (metasploit,hydra,sqlmap...), the only thing you ha ...more
Welcome back, my novice hackers! There are SOOOO many ways to hack a system or network, which means you need to think creatively in order to be successful. Many novice hackers focus way too much energy on cracking passwords (which should be a last resort unless you have spec ...more
In my previous article, we learned how to generate a vulnerable virtual machine using SecGen to safely and legally practice hacking. In this tutorial, we will put it all together, and learn how to actually hack our practice VM. This will provide some insight into the methodolo ...more
In the previous article in this short series, we learned how to find our neighbor's name using publicly accessible information and how to monitor device activity on their home network. With this information at our disposal, it's time to get into installing and configuring the ...more
Welcome back, my novice hackers! New hackers often ask me the same question: "What is the easiest platform to hack?" My response is always the same—it is not a platform, but rather a particular piece of software that is easiest to hack, which is on nearly every client-side sy ...more
Whether you miss the good old days of Telnet or you want to know what hacking was like when security was nothing but an afterthought, Telehack is the game for you. The text-based hacking game is a simulation of a stylized combination of ARPANET and Usenet, circa 1985 to 1990, ...more
A lot of time can be wasted performing trivial tasks over and over again, and it's especially true when it comes to hacking and penetration testing. Trying different shells to own a target, and testing out privilege escalation commands afterward, can eat up a lot of time. Fort ...more
Former Google employee Tristan Harris claims there's an easy way to combat phone addiction without installing any new software. By enabling grayscale on your phone, checking your apps and notifications will be less appealing and thus stop you from obsessively checking your pho ...more
Since Ive started to learn about nmap and metasploit and other tools I was learning well but I had one problem, I had nothing to practice it on. As a result I asked someone about my problem and they told me about Vulnhub. It's a great way to practice. Its good beginners and pe ...more
This tutorial is for people who want to try different types of hacks in an environment that is the same for everyone so it will help people to ask questions and learn. This series assumes you know how to run a VM and network them together. This series also assumes that the ser ...more
WonderHowTo is a how-to website made up of niche communities called Worlds, with topics ranging from Minecraft to science experiments to Scrabble and everything in-between. Check in every Wednesday evening for a roundup of user-run activities and how-to projects from the commu ...more
Hello friends! This tutorial will teach you how to build a local pentesting lab on your Linux machine which will enable you to easily install common web applications so you can practice locating and exploiting their known vulnerabilities (or discover new ones!). In particular, ...more
File inclusion can allow an attacker to view files on a remote host they shouldn't be able to see, and it can even allow the attacker to run code on a target. To demonstrate these vulnerabilities, we'll be practicing PHP file inclusion using the Damn Vulnerable Web App. We'll ...more
Greetings. This how-to on hacking Windows 7/8/10 etc. admin account passwords using Windows Magnifier is focused on adding, changing, or deleting an admin level account on a Windows 7/8/10 etc. Maybe you forgot or lost the password to your Windows Admin account, this guide wi ...more
Welcome back, my rookie hackers! Many newbie hackers focus upon the technical aspects of hacking and fail to give enough attention to social engineering. In fact, I would say that technical hacks should ONLY be attempted if social engineering attacks fail. Why bother spending ...more
When I left off on our last hack, we had hacked into the ubiquitous Windows Server 2003 server by adding ourselves as a user to that system so that we can return undetected at any time. The problem with this approach is that a sysadmin who is on their toes will note that a new ...more
Welcome back, my rookie hackers! So many readers come to Null Byte to learn how to hack Wi-Fi networks (this is the most popular hacking area on Null Byte) that I thought I should write a "how-to" on selecting a good Wi-Fi hacking strategy. Many beginners come here looking t ...more
Ask ten different people how they feel about boxed cake mixes, and you'll likely get ten different answers. Some baking purists will berate them and throw them in the same category as garlic presses and knife sets sold on infomercials. Many people will say that they prefer not ...more
Each day, we read about another security breach somewhere in our digital world. It has become so commonplace that we hardly react anymore. Target, J.P. Morgan, iCloud, Home Depot, and the list goes on and on. Those are just the big ones that get reported in the news. Millions ...more
Keys always seem to multiply. You start out with your house keys and car keys, and the next thing you know, your keychain is full and you have no idea what half of them even unlock. If you want to make your keys lighter and less bulky, redditor mattfrancis13 has a solution. H ...more
I love cheap, nutritious food: lentils, rice, toor dal, and other beans and grains. Even popcorn. The only problem is that they usually come in floppy plastic bags that make measuring ingredients more difficult. I usually open up one corner of the bag only to have everything c ...more