There are many password-cracking tools out there, but one of the mainstays has always been John the Ripper. It's a powerful piece of software that can be configured and used in many different ways. Metasploit actually contains a little-known module version of JTR that can be u ...more
Binding off on a circular needle is as easy as binding off on a straight needle. Follow the steps below to learn how to bind off on a circular needle: Knit the first 2 stitches on the needle. Insert left needle into the front of the stitch you knitted first, and pull it over ...more
Samsung's One UI has slowly become the model for Android skins. The old iOS-like TouchWiz already feels like a relic, thanks in part to the newer user interface's exceptional design and fast but meaningful updates. One UI is so good, other OEM skins have copied elements of it. ...more
Have you ever used an open wifi, which after you connect displays a website to enter your credentials to get internet? That website is called captive portal and widely used in airports, hotels, universities etc. Have you ever wondered what would happen if someone would set up ...more
Your iPhone's clipboard can only save one item at a time, so it may seem impossible to retrieve your entire history of copied text, images, and other content. Luckily, there is a workaround you can use to find and copy your past clipboard contents, but you have to implement it ...more
Switching phones has never been easier. Google backs up most of your app data on the cloud, which can then be restored onto your new phone. Sadly, Signal doesn't use this feature since it could compromise your security. Instead, Signal stores encrypted backups locally, requiri ...more
With an inconspicuous Android phone and USB flash drive, an attacker can compromise a Windows 10 computer in less than 15 seconds. Once a root shell has been established, long-term persistence to the backdoor can be configured with just two simple commands — all while bypassin ...more
If you ever find yourself in a car that's submerged under water, your first instinct should be to try and open either the window or the door in the first few seconds of touching water. Unfortunately, if you wait any longer than that, the lopsided ambient water pressure subject ...more
In my last article, I explained why text adventure games are some of the most Steampunk computer games out there. I even shared a free Steampunk text adventure game that I'd made myself! Now, I grew up playing text-based games (which are now known as interactive fiction) such ...more
Texting has become the king of communication—gone are the days where everyone called each other. These days, it's down-right weird when someone calls first. Whether it be on a phone or on a computer, SMS and MMS messages are the most common way people keep in contact, so why n ...more
Welcome back, my hacker apprentices! To enter the upper echelons of hackerdom, you MUST develop scripting skills. It's all great and well to use other hacker's tools, but to get and maintain the upper hand, you must develop your own unique tools, and you can only do that by d ...more
Sense 6 is great, don't get me wrong, but sometimes I start to miss the vanilla Android experience that comes with Nexus devices. You can always convert your M8 to the Google Play Edition, but then you'd have to ditch all the Sense exclusive features, and we wouldn't want that ...more
This week, I will be covering one of my favorite styles of roofing in Minecraft—the arched roof. This is basically just a roof that starts out steep and slowly slopes down until it meets in the center. I think this type of roof looks great in Elvish-styled buildings and can ma ...more
Math Craft admin Cory Poole provided quite a few recipes for sonobe models in his blog, and I followed one to make the pentakis dodecahedron here. I wasn't that happy with my first result because the colours kept on coming out wrong—i.e. two of the same colour next to each ot ...more
Bid Whist can be a fun game for family or friends. It's challenging enough for adults, but enjoyable for kids too. Bidding and predicting wins are what make playing Bid Whist fun and exciting, whether you win or lose. You Will Need *Two teams of two players *A deck of cards ...more
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server! The workshop last Saturday revolved around creating a working movie screen in Minecraft, and everyone joined in to see how it works. But this tutorial is fo ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. You may know that Minecraft is an excellent creative tool, but perhaps less well known are the fascinating array of redstone powered games that have been made by players like you. ...more
Gary Rosenzweig from MacMost looks at how you can sync your iPod or iPhone to multiple computers using manual settings.
If you've ever seen one of those Samsung commercials from about a year back, you know that the Galaxy S series of phones come with a feature that allows you to do certain things by making gestures in front of your screen. They call this feature Air Gesture, and it enables you ...more
Video: . You don't have to know how to read piano chords and piano sheet music in order to use this tutorial. Plug your piano keyboard into a computer or start playing right away on your computer keyboard using Easy Mode. How to Play Little Things by One Direction - Interactiv ...more
9GAG's infographic teaches us all sorts of conveniences and short cuts to daily life, urawaza style. Some aren't complete revelations (the first hanger trick below), but others are pretty cool (if they work!). A few I wouldn't mind trying: free wifi at the airport ice cold dr ...more
The new Google Assistant is only officially available on three platforms—newer Android phones (Pixels and those running Marshmallow and Nougat), the Google Allo app, and Google Home. However, most of the Assistant's basic functionality is also bundled into the Google app for A ...more
If you loved The Da Vinci Code by Dan Brown, then listen up— there's been a new discovery found hidden within Leonardo da Vinci's most famous painting— the Mona Lisa. An Italian researcher named Silvano Vinceti sparked a new controversy over the world's most famous painting w ...more
The internet is constantly under siege by bots searching for vulnerabilities to attack and exploit. While conventional wisdom is to prevent these attacks, there are ways to deliberately lure hackers into a trap in order to spy on them, study their behavior, and capture samples ...more
Due to weaknesses in the way Wi-Fi works, it's extremely easy to disrupt most Wi-Fi networks using tools that forge deauthentication packets. The ease with which these common tools can jam networks is only matched by how simple they are to detect for anyone listening for them. ...more
Open-source intelligence researchers and hackers alike love social media for reconnaissance. Websites like Twitter offer vast, searchable databases updated in real time by millions of users, but it can be incredibly time-consuming to sift through manually. Thankfully, tools li ...more
Playing any multiplayer game without chatting is like watching Avatar on your iPhone—just downright sad. So, in order to get the shit-talking going between your friends and party members, you will need get your headset working properly and use Party Chat, which can get a littl ...more
This video tutorial belongs to the Electronics category which is going to show you how to reset the Blackberry Bold 9000 / 9700 with three methods. In the first method you hold down the Alt key, the Caps lock key and hit Delete. Your Blackberry will start resetting. This proce ...more
This is a short explanation and tutorial on how to grab saved passwords from Google Chrome, ideally from a meterpreter session. The idea behind this is to understand how saved passwords work and how to keep them safe. Let's have some fun :D Understanding Google Chrome Saved Pa ...more
The next time you're out camping, whether it's outdoors in the wilderness or right outside in your own backyard, try this hack out for an effortless campfire all night long. While there is definitely some prep work involved, it's well worth it if you don't need a huge bonfire, ...more
| Updated Aug. 22, 2019 with new phones. When will my phone get Android Pie? For the first time since Android's inception, this question shouldn't have an answer that lets you down. That's because Android Oreo introduced Project Treble, a new low-level arrangement that makes ...more
Many people drink green tea for health reasons, and it's no wonder. This beverage is a superstar when it comes to antioxidant levels, and is being studied for its potentially curative properties on multiple health concerns, whether it's staving off the aging process or fightin ...more
Throughout the day, I receive countless emails from various e-commerce sites who are trying to get me to spend money I don't have. Normally, I dismiss the notification on my smartphone, but when I open the Gmail app, I find all those unread messages waiting to be dealt with. F ...more
I mentioned in one of my earlier articles something about ghost hackers, and very shortly stated a thing or two of what they do. Sit back because this is a very long article Now I want to tell you how to become one. What Is a Ghost Hacker? First you need to understand who t ...more
In this article, we will explore the basics of radare2, a powerful package that comes with Kali. We are going to write a simple program, and then disassemble it, to see what is really doing in the processor. I will use Kali version 1 and x86 (64 bits) instructions. Not all ar ...more
If you're like seventy percent of America and find it hard to focus on just one thing at a time, the Xbox One had you in mind. If you ever thought that being able to watch The Walking Dead while playing The Walking Dead video game would be awesome, you're in luck. How about lo ...more
For this tutorial we are picking three Aces because they are the easiest to remember. Make 4 piles of cards. First pile is ten cards. Second pile is 15 cards. Third pile is 15 cards. The last pile will be 9. Take the Ace of Spades (the example card),put it on one pile and put ...more
Dutch filmmaker Anthony Van der Meer published his 2015 thesis short from Willem de Kooning Academy in South Holland online in December 2016. It's a brilliant piece of work that managed to be touching, alarming, and informative at the same time. His documentary, which already ...more
"Miki Falls" manga creator Mark Crilley presents a tutorial on how to draw manga or anime hair. The first character's hair is drawn entirely in real time, with continuous spoken explanation. Drawing hair is one of the most important components of anime and manga figure drawing ...more
The Windows 10 desktop and microphone can be livestreamed without using Remote Desktop Protocol (RDP) software and without opening any ports on the target computer. A hacker with low user privileges can monitor and exfiltrate a target's every move and private conversation in r ...more
For anyone who's ever wondered why people are swatting an odd-looking object back and forth across a net, here's the lowdown. Watch this video to learn how to play badminton. You Will Need * Two or four players * A badminton court * A net * A shuttlecock * Badminton rackets ...more
Due to its enormously awesome size, the Samsung Galaxy Note 2 usually takes two hands to maneuver through photos and texts, write emails, and get directions on the map. Even simple tasks like zooming in and out require a couple hands; one to hold the device and one to do the ...more
Passwords on Windows are stored as hashes, and sometimes they can be tough to crack. In certain situations, though, we can get around that by using the hash as is, with no need to know the plaintext password. It's especially interesting if we can manage to get the hash of an a ...more
One of the more low-key functions to arrive with the Note 10 was the ability to easily record your screen system-wide. Thankfully, this long-awaited feature will finally make its way to popular Galaxy devices like the S10 and Note 9 thanks to One UI 2. In the past, screen rec ...more
Hello readers, and welcome to Null Byte. Before we start, for those of you who may not know me, my name is ghost_; I'm a relatively active member of our community and have been around for a while. During my time here, I've seen our community cultivate into the brilliant one ...more
One of the first steps when pentesting a website should be scanning for hidden directories. It is essential for finding valuable information or potential attack vectors that might otherwise be unseen on the public-facing site. There are many tools out there that will perform t ...more
So, you've installed a shiny new launcher but find that it doesn't quite meet your needs? Unfortunately, Sense doesn't come with a setting to choose the default launcher. No worries, though, because in this short guide, I'll show you how to revert back to any launcher, includi ...more
New technologies in current-generations smartphones allow for much faster charging—Qualcomm Quick Charge 3.0, VOOC Flash Charge, and USB Type-C, for instance, can charge a phone up to 4 times faster than traditional methods. However, the majority of phones on the market still ...more
ADB and Fastboot are powerful tools that have always required a computer. But with the right setup, you can now send commands to a phone using another phone. The ADB and Fastboot Magisk module, by osm0sis and Surge1223, will turn your phone into an ADB terminal using root acc ...more
Web application vulnerabilities are one of the most crucial points of consideration in any penetration test or security evaluation. While some security areas require a home network or computer for testing, creating a test website to learn web app security requires a slightly d ...more
Most smartphone manufacturers focus on megapixels when it comes to cameras, but HTC took a different direction with the HTC One. Instead of trying to compete with the 13MP camera on the Samsung Galaxy S4, or the 20MP camera on the Sony Xperia Z1, or even the newer iPhone's 8MP ...more
Despite the recent problems with the 1.04 update for PlayStation 3 gamers, Call of Duty: Black Ops remains a juggernaut for Activision in the gaming community, and its sales alone prove it. Black Ops was released on November 9th, 2010, and in its first five days on the market ...more
There are a lot of music apps on my iPhone's home screen, and the reason I have so many is because I can't get all of the songs I want from just one service. I use Spotify to listen to new releases, SoundCloud for remixes and unreleased tracks, and YouTube for just about anyth ...more
In this video from moneymakingfocus we learn how to unhook a bra with one hand. First you need to figure out if it is a front closure or a back closure on the bra. Use the thumb to hold one end of the hook gently applying pressure. Now place index finger near the hook. With yo ...more
Boxing a table doesn't mean getting into the ring, but it does require a certain degree of skill to successfully complete. Boxing the tablecloth is a great technique for any occasion or party, and every caterer should know these moves. First, drape the cloth over the table. N ...more
This method is quick, easy, looks beautiful and does not require any equipment beyond a plastic bag and a pair of scissors. Step 1: Cut the Corner of Your Bag Choose the style of flower that you want to pipe and cut you plastic bag according to the instructions shown in the ...more
Defcon is the largest hacker conference with something for everyone, whether it be the talks, parties, villages, or any of the hundreds of events. In this guide, we'll take a holistic view at everything that goes into attending the con for the first time, from securing your el ...more
Welcome back, my greenhorn hackers! This tutorial will be the fourtenth in the Linux for hackers series and will focus on the MySQL database. Although this is not strictly a Linux tutorial, MySQL is the database of choice on most Linux distributions. In addition, it is the mo ...more
Game streaming has never been better. Not only can you watch your favorite Twitch streamer play, but with the new tools being added to YouTube, you can even play along with them. And now, with a solid internet connection, you can stream your Xbox One games to your phone to enj ...more
On the whole, Windows 10 is vastly different than its predecessors, but there's not any one big change that distinguishes it from Windows 7 or 8. On the contrary, it's a series of small tweaks and optimizations that makes this version such a departure from previous iterations. ...more