Someone Attack From Behind

How To : Inject Coinhive Miners into Public Wi-Fi Hotspots

Coinhive, a JavaScript cryptocurrency miner, was reportedly discovered on the BlackBerry Mobile website. It was placed there by hackers who exploited a vulnerability in the site's e-commerce software that allowed them to anonymously mine cryptocurrency every time the website w ...more

How To : Conduct a Pentest Like a Pro in 6 Phases

Penetration testing, or pentesting, is the process of probing a network or system by simulating an attack, which is used to find vulnerabilities that could be exploited by a malicious actor. The main goal of a pentest is to identify security holes and weaknesses so that the or ...more

Weekend Homework : How to Become a Null Byte Contributor

We're officially seeking Null Byters on a weekly basis who would enjoy taking their time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job ...more

Red Dead Redemption : Lessons in Failure

So far in this game, my score card: 0-1 from saving a guy from coyotes.  My first ever fail in the game. 0-7 from saving a woman being attacked by coyotes. I don't even try anymore. 0-2 from saving someone hanged by bandits. 1-3 from saving a person being tied and dragged out ...more

Exploiting XSS with BeEF : Part 2

Now that we have our vulnerable server, it's time to start up BeEF. Getting Started Step 1: Running BeEF If you have Kali, BeEf comes pre-installed. You can find it in /usr/share/beef-xss/. Once you're there, type ./beef to execute the program. You will need to know both of ...more

News : What to Expect from Null Byte in 2015

Welcome back, my greenhorn hackers, and happy New Year! Now that your heads have recovered from your New Year's Eve regaling, I'd like to grab your attention for just a moment to preview 2015 here at Null Byte. I hope you will add your comments as to what you would like to se ...more

TypoGuy Explaining Anonymity : Who Is Anonymous?

Continuing this series, I am now moving on to the section, 'Anonymous'. Hope you are looking forward to read this. Anonymous - What/Who Are They? A Quick introduction in case someone doesn't know what they are and who they are. Anonymous is an idea. An idea of anybody who w ...more

How To : Introduction to Modern Cryptography

Cryptography is the science of keeping secrets, or more specifically, the science of disguising them. As a point of fact, cryptography has progressed quite a bit farther and now encompasses file and message integrity, sender authentication, and pseudo-random number generators. ...more

How To : Create an Evil Access Point with MitmAP

The threat of an evil access point has been around for a long time, and with the rise of open public Wi-Fi, that threat is often overshadowed by how comfortable we are using third-party Wi-Fi hotspots at coffee shops and public spaces. While we've shown an evil twin attack usi ...more

News : 10 Accounts That Will Make You Sign Up for TikTok

Does TikTok scare you? Trust me, I get it. It's a strange, unfamiliar place to those of us not accustomed to its ways, populated by teenagers and college students with their own subcultures, memes, and humor. But here's the thing: TikTok has something for everyone, you include ...more

How To : Pick an Antenna for Wi-Fi Hacking

When learning Wi-Fi hacking, picking a compatible Wi-Fi network adapter is the first step to learning to crack Wi-Fi passwords. Many compatible adapters have swappable antennas, and there are several different kinds of specialized antennas you can add to a network adapter to ...more

How To : Seize Control of a Router with RouterSploit

A router is the core of anyone's internet experience, but most people don't spend much time setting up this critical piece of hardware. Old firmware, default passwords, and other configuration issues continue to haunt many organizations. Exploiting the poor, neglected computer ...more

How To : Protect Your PHP Website from SQL Injection Hacks

As a web developer, I often read articles about hackers (from the lowly to the knowledgeable) infiltrating websites via the dreaded 'SQL Injection' method and completely taking control, changing, gaining access, or destroying the owner's data. As a fellow web developer, I'm su ...more

How To : Reverse Check a Phone Number

Prank Calls, Masked NumbersWho is calling your phone or your child's? Pranksters use a lot of tricks to make sure they can get on your nerves. Being able to trace prank calls is important because you're not going to learn much from your Caller ID, since most prank callers use ...more

How To : Setup an Asterisk Server

Over the years, I have enjoyed playing with Asterisk. I have found Asterisk to be extremely powerful and fun to play with. There are several books and many scattered how to articles out there, but most are outdated and the information required to build Asterisk from beginning ...more

How To : Defeat the Corrupted in Prince of Persia (2008)

If you're having difficulty dispatching any of the Corrupted from 2008's Prince of Persia, this helpful battle guide from IGN might be just what you need. If forewarned is forearmed, this video tutorial will arm you to the teeth with the necessary knowledge to beat each of Ahr ...more

How To : Use red stone to create logic gates in Minecraft

Everyone talks about Minecraft and Logic Gates all the time and the various uses for red stone, heck, someone even made a fully useable calculator! But using Red Stone takes a special kind of math and logic that some may be confused about. In this video you will learn the basi ...more

How To : Do the straight jacket technique

This is the set up I use for the straight jacket submission when someone defends the gogoplata. This submission attacks the shoulders depending on how flexible you are. There are a couple of ways to set this up.

How To : Scorpion kick someone in the face with Chloe Bruce

You may have come across Chloe Bruce in the past, but we're betting it was on the web, because if it were in person, you probably wouldn't be reading this right now. Because in a blink of an eye, she'd have her foot smashed against your face using her world famous Scorpion Kic ...more

News : W.M.D (Wedgie of Mass Destruction)

The receiver of the wedgie, would by laying on he ground, preferably face down, with they're underpants securely fastened to some strong cord, at each hip. The cord, would be then tied to the pegs of a BMX bicycle ( if you wished to extreme it up a little you could use a motor ...more

  • Hot
  • Latest