Hack a Coke Can Machine

Hack Like a Pro : How to Evade Detection Using Proxychains

Welcome back, my novice hackers! The worst thing that can happen to any hacker is being detected by a security admin, the security technologies (IDS, firewall, etc.), or a forensic investigator. Every time we send a packet to our intended target, that packet contains our IP ...more

How To : Hack TOR Hidden Services

A lot of people think that TOR services are unhackable because they are on a "secure environment", but the truth is that those services are exactly the same that run on any normal server, and can be hacked with the same tools (metasploit,hydra,sqlmap...), the only thing you ha ...more

How To : Setup Practice Ctf's from Vulnhub on Kali Linux

Since Ive started to learn about nmap and metasploit and other tools I was learning well but I had one problem, I had nothing to practice it on. As a result I asked someone about my problem and they told me about Vulnhub. It's a great way to practice. Its good beginners and pe ...more

How To : Hack Metasploitable 2 Part 1

This tutorial is for people who want to try different types of hacks in an environment that is the same for everyone so it will help people to ask questions and learn. This series assumes you know how to run a VM and network them together. This series also assumes that the ser ...more

How To : Exploit PHP File Inclusion in Web Apps

File inclusion can allow an attacker to view files on a remote host they shouldn't be able to see, and it can even allow the attacker to run code on a target. To demonstrate these vulnerabilities, we'll be practicing PHP file inclusion using the Damn Vulnerable Web App. We'll ...more

How to Hack Wi-Fi : Selecting a Good Wi-Fi Hacking Strategy

Welcome back, my rookie hackers! So many readers come to Null Byte to learn how to hack Wi-Fi networks (this is the most popular hacking area on Null Byte) that I thought I should write a "how-to" on selecting a good Wi-Fi hacking strategy. Many beginners come here looking t ...more

How To : Hack Metasploitable 2 Part 2

In this tutorial I am going to look at what services are running on our Metasploitable machine and setup firewalls. This is more basic scanning of our machine to get an idea of how to get in. Obviously in a real engagement you would want to do research on Google and whatnot to ...more

The Sony Hack : Thoughts & Observations from a Real Hacker

By now, nearly everyone with any type of media access is aware that Sony Pictures Entertainment was hacked on November 24th. Although there can be many interpretations and lessons drawn from this audacious act, there is one indisputable conclusion: it and its ripples across th ...more

News : What to Expect from Null Byte in 2015

Welcome back, my greenhorn hackers, and happy New Year! Now that your heads have recovered from your New Year's Eve regaling, I'd like to grab your attention for just a moment to preview 2015 here at Null Byte. I hope you will add your comments as to what you would like to se ...more

News : Debunk the fake candy machine hacks

Candy machine hacks are so popular now, one might think it's easier to get candy from a vending machine than from a ... baby. Debunker Mike from Mississippi has taken the craze head on, debunking many inaccurate methods of stealing candy. He dissects the coin collecting mecha ...more

How To : Reseal an opened soda can

A cool prank to play on a friend lies in your fridge... a soda can. Get out your Coke or Pepsi can, or any other soda can, and open it up. Now, wouldn't it be cool if you could close it again, without raising suspicion? This con video will teach you how you can reseal an open ...more

How To : Make an iPhone stand, fart gadget & mini BB gun

It's amazing what you can create with a few, everyday household and office supplies. Most of these items are already sitting in your junk drawers, so there's no need to spend money! Kipkay shows you 4 awesome hacks you can make in this "household hack pack" video. 1. iPod/iPh ...more

How To : Create light with Mentos and Mountain Dew

Systm is the Do-It-Yourself show designed for the common geek who wants to quickly and easily learn how to dive into the latest and hottest tech projects. They will help you avoid pitfalls and get your project up and running fast. In this DIY episode, see how to create light w ...more

HowTo : Make the Laziest Dress Ever

There are lots of simple "hack-like" fashion projects on the web, but kudos to the Glamourai for bringing Style into the equation. Her "Scarf-tan-ette" is surprisingly chic considering it's simplicity. Relatively uncomplicated to make, all you need is a couple vintage scarves, ...more

News : Become Your Own Souvenir

As a kid, my favorite thing to do at the Natural History museum was a midday stop, when my family strolled past an antiquated looking vending machine in the museum's musty basement. The Mold-A-Rama machine was oddly shaped, George Jetson-esque, and spewed out made-to-order, br ...more

How To : Debunk the free candy cheat myth

This video clip shows you how you cannot fool any candy machine and debunks the mythical paper hacks in detail. Some say it works, some say it doesn't. Well, check out this video tutorial and decide for yourself what believe. It might just be easier to steal candy from a baby.

How To : Use the Hacker Defender rootkit or HackDef

Hacker Defender is one of the most widely deployed rootkits in the world. It is a user-mode rootkit that modifies several Windows and Native API functions, which allows it to hide information (files, processes, etc.) from other applications. In addition, Hacker Defender implem ...more

How To : Make a sexy baby doll shirt with Gianny L

Transform an old baggy t-shirt into a sexy baby doll shirt with Gianny L. Wear this spicy piece of apparel out to a club or save it for sexy night wear. The sexy GiannyL demonstrates this DIY closet hack that's simple and cheap. Using a pair of scissors, cut the t-shirt along ...more

How To : Get a Free Soft Drink from a Vending Machine

In this tutorial, we learn how to get a free soft drink from a vending machine. First, you will need to find one of those old vending machines, not one of the new and high tech ones. From here, you will need to sit down and lift the hatch up from the machine. Then, reach up in ...more

How To : Bypass a Local Network Proxy for Free Internet

Have you ever been away from home or on holiday and noticed an open network connection? FREE INTERNET! But then you find out that every search or page redirects you to an "enter password" or "signup here" page. Well, there are ways around this. In this article, I'll show you ...more

HowTo : Make Perfect Bacon

Here's another home hack for you (1, 2, 3). The perfect way to make bacon? Ditch the frying pan. Instead, try Apartment Therapy's recipe for perfectly cooked, oven-baked bacon. You Will Need: High quality bacon (such as Niman Ranch) Baking sheet with a 1/2"-3/4" lip (to cat ...more

How To : Make Robinson Couplings for water rockets

Learn to make Robinson Couplings for water rockets with this video tutorial. For this project you need aluminum and a plastic bar. You need to make the inner coupling on the lathe. Machine the aluminum bar to the right size and then cut the thread. Then drill the coupling hole ...more

News : Military Technology Used to Create Video Game Drone

An iPhone-controlled drone unveiled at the recently held CES is expected to revolutionize the world of video gaming. Called the AR.Drone (AR stands for augmented reality), this new product will literally bring video games to the streets. Via Daily Mail, "The flying saucer-li ...more

How To : Make a Superman costume with Gianny L

Superman is one of the greatest and most known superheroes out there. Developed by DC Comics, Superman has seen the world… as in comics, television, newspaper strips, video games, movies, radio serials, etc. See how to make a Superman costume in this video from GiannyL. This ...more

How To : Edit Super Mario World levels with Lunar Magic

Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to edit Supe ...more

  • Hot
  • Latest