Welcome back, my hacker novitiates! Often, to hack a website, we need to connect to and exploit a particular object within said website. It might be an admin panel or a subdirectory that is vulnerable to attack. The key, of course, is to find these objects, as they may be hid ...more
Inspired by the French artist who was the first to "hack" the new Facebook profile page, tons of creative copycat versions have begun to surface (scroll all the way down). But the sickest version by far is this video + image mashup/remix created by Stinson Design: Below, learn ...more
Oh how we love open source software. If it wasn't for Open Office, we never would have been able to write that seven-page English paper while on our friend's Microsoft Office-lacking laptop during an impromptu road trip to Mexico. And Ubuntu, an open source secure operating sy ...more
Welcome back, my aspiring hackers! As mentioned several times in previous Linux tutorials, nearly everything in Linux is a file, and very often they are text files. For instance, all of the configuration files in Linux are text files. To reconfigure an application in Linux, w ...more
It looks like there is a fatal flaw in the current macOS High Sierra 10.13.1, even straight from the login menu when you first start up the computer. This severe vulnerability lets hackers — or anyone with malicious intentions — do anything they want as root users as long as t ...more
Welcome back, my novice hackers! As most of you know by now, a notorious commercial, legal hacking group named "Hacking Team" was recently hacked. As part of the hack, thousands of emails and other material on their servers was divulged. Among the material released were three ...more
WikiLeaks. In recent weeks, it's been the hottest topic on the web. It's been attacked on a multinational level by political influence peddling. First, U.S. Senator Joe Lieberman swayed Amazon's decision to stop hosting WikiLeaks. Then, Tableau Software removed graphs from th ...more
The pictures we upload online are something we tend to think of as self-expression, but these very images can carry code to steal our passwords and data. Profile pictures, avatars, and image galleries are used all over the internet. While all images carry digital picture data ...more
Hack the PSP or Playstation portable handheld game console. You need a Pandora battery, a 2 GB memory stick and a PSP. You are hacking the firmware of the PSP. You will turn the official firmware from the 3.80 into M335. You can downgrade if you have v 4.0 or higher firmware. ...more
Yes, this cheat will also work with Minecraft Beta! Hack all the items in your inventory. Get unlimited supplies of diamond or redstone, or make your items impervious to damage. All you need is the most current version of the hacking program Cheat Engine.
Sugru is some pretty versatile stuff. The company's slogan is "Hack things better," and for good reason. It sticks to aluminum, steel, ceramics, glass and plastics, it's waterproof and heat-resistant, and it can be molded into any shape you can imagine. Anything from your kitc ...more
Farkle hacks, cheats, glitches. How to hack Farkle. Watch this video tutorial to learn how to hack Farkle with Cheat Engine (09/12/09). You need Cheat Engine 5.5 for this hack. 1. Enter 0, then scan, then simply multiply by 8 2. Whatever number you want your score to be, jus ...more
At last, what you all finally waited for! Hi! Fire Crackers, Welcome to my 7th post (Part-3), this tutorial will explain about some situations and how to make the Victim's Life like Hell! And fill his system with Malware. #1 Situation: After Exploiting... Go ahead and explo ...more
Welcome back, my fledgling hackers! One of the first issues any hacker has to address is reconnaissance. Before we even begin to hack, we need to know quite a bit about the target systems. We should know their IP address, what ports are open, what services are running, and wh ...more
New to hacking? Hacking time in Bejeweled Blitz isn't all that complicated. You just need to be familiar with what you are doing, and the only way to do that is to watch this video tutorial to learn how to hack the Facebook game Bejeweled Blitz (10/27/09). This video is a bas ...more
Here's another Null Byte on hacking our Skyrim game saves. Some of the rarer items in Skyrim are really fun to play with. However, seeing as they are rare, you will probably not see all of the best weapons in the game. Null Byte doesn't take too kindly to games that don't give ...more
Welcome back, my fledgling hackers! Nearly every commercial enterprise worth hacking has an intrusion detection system (IDS). These network intrusion detection systems are designed to detect any malicious activity on the network. That means you! As the name implies, a networ ...more
Want to watch Netflix Watch Instantly on your Android device? Watch this video and follow these instructions to learn how to hack any rooted Android device with an APK to work with Netflix. Watch thousands of streaming movies and TV shows with your hacked Android tablet or sma ...more
Make a bionic hearing spy device by hacking a megaphone! Kipkay brings you this hack video on how to use a megaphone to spy on people. You can pull in conversations up to 100 feet away! Check out Kipkay hiding in a tree, spying on people. It also works through walls. That's ho ...more
Cleanliness is next to godliness. My interpretation of that age-old adage means that keeping your house clean is just as un-fun and boring as being a goody two shoes. That's why they call things like laundry and doing dishes "chores," I assume. Yuck. Lucky for you, though, we ...more
Welcome back, my newbie hackers! Recently, I "upgraded" to Kali as my hacking platform, despite my preference for BackTrack. I did this reluctantly, primarily because new readers here could no longer download BackTrack from their site. I want to point out here that we all mus ...more
The PSP has never had the software support that it needed to be a really commercially successful system. Since Sony blew it already, you may as well go the extra mile to make this expensive little thing you bought more useful right? This video will teach you how to hack a PSP ...more
Welcome back, my tenderfoot hackers! Hacker newbies have an inordinate fixation on password cracking. They believe that cracking the password is the only way to gain access to the target account and its privileges. If what we really want is access to a system or other resourc ...more
Take a look at this video and learn how to hack into a wireless Linksys router. This hack isn't applicable for all security enabled networks, only ones that use generic passwords.
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills. Submit your best shot to our weekly competition for a chance to win an awes ...more
With some of the groundwork out of the way in getting a Mac set up for hacking, it's time to start looking at toolboxes. Our first toolbox is Git, which will be used throughout future tutorials. Git is currently the most widely used version control system (VCS) in the world, ...more
A lot of people think that TOR services are unhackable because they are on a "secure environment", but the truth is that those services are exactly the same that run on any normal server, and can be hacked with the same tools (metasploit,hydra,sqlmap...), the only thing you ha ...more
Nearly everyone has the capacity to be a cheater. Sometime or another, all Xbox users have yearned to get their gamerscore to unimaginable thresholds—for bragging and egotistical purposes. I can relate to this desire. However, I also don't want to mod my gamerscore, because it ...more
Welcome back, my novice hackers! New hackers often ask me the same question: "What is the easiest platform to hack?" My response is always the same—it is not a platform, but rather a particular piece of software that is easiest to hack, which is on nearly every client-side sy ...more
The latest Star Wars movie, Solo: A Star Wars Story, has grossed almost $350 million worldwide during its first month in theaters. This is a good opportunity to discuss how hackers can use media hype (in this case, Hollywood movie hype) to disarm an unsuspecting Windows user i ...more
Brainwashing is something that happens to us every day, whether you believe it or not. It doesn't take fancy tools or space-age technology. Even if our country didn't intentionally brainwash people (believe me, they do), our country's media is brainwashing people nonstop. Just ...more
See how to hack a two "D" cell Maglite to make it much brighter. This is a cheap but very power light of 700-800+ lumens, brighter than other hacks.
Usually when a hacker takes control of a system, they use it for a good purpose (on their end, anyway). But some hackers have made jokes or pranks with their hacks. Here is a list of the top of them... AC/DC at the Power Plant When some hackers took control of a power plant, ...more
Welcome back, my budding hackers! In this series, I have been trying to familiarize you with the many features of the world's best framework for exploitation, hacking, and pentesting, Metasploit. There are so many features, and techniques for using those features, that few pe ...more
This is a Computers & Programming video tutorial where you will learn how to hack Google to find anything. There are no audio instructions; only a demonstration of the steps to follow. Go to Google and type into the search box: intitle:”index.of” (type anything here) and searc ...more
There are countless ways in which you can turn your love of tech and coding into a full-fledged career — from developing apps and websites as a freelancer to working in the IT departments of small startups or major tech companies. But one of the best ways that you can put your ...more
USB devices are ubiquitous and cheap nowadays, which means they make great raw materials for hacking and electronics projects. This video will show you how you use a USB host shield to hack USB devices and use them with MIDI controllers, game controllers, and other devices.
A great Halloween party depends on the right spooky ambience. Having some shrunken heads in strategic locations is an easy, fun way to get your guests in the right (frightened) frame of mind, and they require items you can easily find in your kitchen or at the local grocery st ...more
This tutorial shows you several different hex codes you can enter so you can hack your game of Minecraft using the game hacking program Cheat Engine. This uses the most current version of Cheat Engine, so make sure you have 6.0 or better.
I remember a time when I had to rent a VHS from the local video rental store. It wasn't all that bad, with the only real annoyances being the trip to and fro, having to rewind the movie and the possible malfunction of my VHS player, which liked to eat tape from time to time. ...more
Welcome back, my rookie hackers! "How can I travel and communicate over the Internet without being tracked or spied on by anyone?" It's a question many Null Byteans have asked me, so I have decided to write a comprehensive article addressing this issue. There are a multitude ...more
Welcome back, my neophyte hackers! In previous tutorials, we learned how to steal system tokens that we could use to access resources, how to use hashdump to pull password hashes from a local system, and how to grab password hashes from a local system and crack them. In each ...more
DF hacks, cheats, glitches. How to play and hack the flash game DragonFable. Watch this video tutorial to learn how to hack DragonFable with Cheat Engine 5.5 (09/30/09). Description of the app on DragonFable: DragonFable is an animated fantasy RPG (It has Dragons!) that you ...more
Right now is that magical time of year when the general public decides to embrace their inner fattie and get baking in the kitchen. Hello, pies and cakes and cookies and everything carbs. Goodbye, diets—see you in the next year, when you cripple us with unbridled guilt and lon ...more
Stick Wars hacks, cheats, glitches. How to hack the flash game Stick Wars from Addicting Games. Watch this video tutorial to learn how to hack Stick Wars with Cheat Engine (09/27/09). Description of the app on AddictingGames: You lead the last clan of free-thinking stick peo ...more
Are you a messy burger eater? Ants and fruit flies invading your home? Hate drinking warm drinks? Find out the quick and easy DIY solutions to these problems with these 10 amazing tips and tricks for the summer. Video: . I had seen pictures of some of these useful ideas on the ...more
Welcome back, my tenderfoot hackers! I recently began a new series on digital forensics to help tenderfoot hackers from being detected and ultimately, incarcerated. In this installment of that series, we will look at recovering deleted files. This is important to hackers beca ...more
Creating a haunted house for Halloween was a big deal when I was growing up, and the neighborhood kids were always coming up with ways to try and out-do each other when it came to this frightful night. One beloved game was to blindfold the participants and play the Withered Co ...more
Dropbox announced Tuesday that a recent security breach compromised a list that included the email addresses of certain Dropbox users. To avoid future complications, the service announced that it would be implementing two-factor authentication, and even more useful, a security ...more
Farm Town hacks, cheats, glitches. How to hack Farm Town. Description of the app on Facebook: In the world of Farm Town you and your friends can have a great time! You can play games, design, grow and maintain your own farm and even send gifts to your friends. Play now and sh ...more
Welcome back, my novice hackers! We've done a number of tutorials using one of my favorite hacking tools, Metasploit. In each of them, we've used the msfconsole, which can be reached through either the menu system or through simply typing "msfconsole" from the terminal. This ...more
Formerly ipchains, iptables is a script-based firewall that's included with both Mac and Linux operating systems. In my opinion, it's the best firewall in existence. The only downfall is that it's complicated for some people to use due to its script-based nature. But this shou ...more
Restaurant City is a Facebook game that allows you to create your own restaurant. Watch this video tutorial to learn how to hack Restaurant City money overnight (08/01/09). You will need to download Ghost Mouse 2 for this overnight money hack. Description of the app on Facebo ...more
This is a Restaurant City 3 in 1 Hack (Working From 12th May 2009). Tools Needed: Cheat Engine 5.5 RC Tools V3 Flash Player 9 1st: Wait For One Customer To Eat The Food And Thumbs Up! 2nd: Open Cheatengine 5.5 3rd: Press The Process List (The Computer Logo) 4th: Click on ...more
Play Acruz online and hack it, too! With this handy hack, you can cheat your stat points, levels, and money. You just need Cheat Engine. Play Arcuz online with this video tutorial. See how to hack stats, levels & money on Arcuz online (12/19/09). Download Cheat Engine 5.5. A ...more
SQL injection is a type of code injection that takes advantage of security vulnerability at the database level. It's certainly not the easiest form of hacking, but if you're serious about turning a website upside down then this is the way to do it. Take a gander at this video ...more
This video tutorial talks about browser exploitation. Particularly, it talks about tools, like BeEF, that can be used to hack known vulnerabilities within browsers and some cool frameworks that you can use to check the security of your own browser. To get started hacking your ...more
Hash browns are a breakfast staple and for good reason: they're simple, salty, and crispy, and so delicious that you can easily down several servings of them in one sitting. Basically, they're the French fries of breakfast. Despite their simplicity, hash browns can be difficu ...more
As Android bug bounty hunters and penetration testers, we need a properly configured environment to work in when testing exploits and looking for vulnerabilities. This could mean a virtual Android operating system or a dedicated network for capturing requests and performing ma ...more
Increase your damage output in World of Warcraft! This tutorial won't work on all servers, and is better on private servers than public. All you need is Cheat Engine - buy some mundane items, and then use the program to turn them into rarer, better items.