Hello, Null Byte! Mkilic here. I doubt anyone knows I even exist on Null Byte, so hopefully this post will allow me to become more involved in the community and also help me learn even more. This project is somewhat similar to OTW's article here, and pry0cc's here, in which b ...more
Welcome back, my novice hackers! It has become clear from some of your questions that quite a few of you are unfamiliar with the hexadecimal system, or simply, hex. The hexadecimal system is used throughout computing and if you have never studied this Base16 numering system, ...more
Welcome back, my novice hackers! Previously in my "Spy on Anyone" series, we used our hacking skills to turn a target's computer system into a bug to record conversations and found and downloaded confidential documents on someone's computer. In this tutorial, I will show you ...more
Welcome back, my hacker novitiates! Many of you have probably heard of a man-in-the-middle attack and wondered how difficult an attack like that would be. For those of you who've never heard of one, it's simply where we, the hacker, place ourselves between the victim and the ...more
Complex shell scripts can be implanted into photo metadata and later used to exploit a MacBook. In addition to obfuscating the true nature of an attack, this technique can be used to evade network firewalls as well as vigilant sysadmins. In this attack scenario, a malicious c ...more
Kali Linux, by default, probably doesn't have everything you need to get you through day-to-day penetration testing with ease. With a few tips, tricks, and applications, we can quickly get started using Kali like a professional white hat. Most Linux distributions are highly c ...more
Many of our members here at Null Byte are aspiring hackers looking to gain skills and credentials to enter the most-valued profession of the 21st century. Hackers are being hired by IT security firms, antivirus developers, national military and espionage organizations, private ...more
Wi-Fi devices are continually emitting "probe frames," calling out for nearby Wi-Fi networks to connect to. Beyond being a privacy risk, probe frames can also be used to track or take over the data connection of nearby devices. We'll explain how to see nearby devices emitting ...more
The most common Wi-Fi jamming attacks leverage deauthentication and disassociation packets to attack networks. This allows a low-cost ESP8266-based device programmed in Arduino to detect and classify Wi-Fi denial-of-service attacks by lighting a different color LED for each ty ...more
Smartphones and other Wi-Fi enabled devices send radio signals called probe frames to locate nearby wireless networks, which makes them easy to track by listening for their unique MAC address. To show how this kind of tracking works, we can program a NodeMCU in Arduino to snif ...more
It only takes a few commands to manipulate a MacBook's secure HTTPS traffic and pluck login passwords out of the encrypted data. Let's take Facebook and Gmail hacking to the next level by intercepting Safari and Google Chrome web traffic in real time. Both Facebook and Gmail ...more
Apple's macOS operating system is just as vulnerable to attacks as any Windows 10 computer or Android smartphone. Hacker's can embed backdoors, evade antivirus with simple commands, and utilize USB flash drives to completely compromise a MacBook. In this always-updated guide, ...more
If there ever was a time for Null Byte to need people to contribute, it's now. Let's make Null Byte a place where anyone, from novice to master computer user, come and learn. It has been sometime since the last "Call to Arms" for Null Byte, and even longer since the last "Week ...more
Microcontrollers like ESP8266-based boards have built-in Wi-Fi, and that's really cool, but what's even cooler is that certain pro models of the D1 Mini also have a port where you can connect a directional antenna. This can give you exceptional range, but if you were to just p ...more
Microsoft.com is one of the most extensive domains on the internet with thousands of registered subdomains. Windows 10 will ping these subdomains hundreds of times an hour, making it challenging to firewall and monitor all of the requests made by the operating system. An attac ...more
Welcome back, my tenderfoot hackers! We have looked at a number of ways that we sniff traffic on the network with such tools as Wireshark, tcpdump, dnsiff, and others, but each of these tools is only capable of pulling packets off the wire. Those packets can be examined for ...more
As we're all aware, recon is vital to a successful hack. We need to know everything we can about the target in order to perform the best possible attack. Port scanning is a basic recon concept that is introduced very early in learning proper reconnoissance. The issue with port ...more
In general, hacking and information security is not just one discipline, but a number of them, and today we will look into some of the networking concepts. In the last Hacker Fundamentals, we talked about the OSI model as well as a little on TCP/IP and the protocols that make ...more
It seems like every day now that we see a new headline on a cyber security breach. These headlines usually involve millions of records being stolen from some large financial institution or retailer. What doesn't reach the headlines are the many individual breaches that happen ...more
Hackers and makers are often grouped under the same label. While hackers draw on computer science skills to write programs and find bugs, makers use electrical engineering to create hardware prototypes from microprocessor boards like the Arduino. We'll exercise both sets of sk ...more
If you've spotted an unintended Ethernet connection and wondered what you could do with all of the information coursing through those wires, there's an easy way to hack into it and find out. Let's say there's a router that we need to know the password for, and we have physica ...more
I'm constantly searching for a homemade pizza dough that tastes good but isn't too challenging to execute. In other words, a recipe that doesn't require any arcane "dough whispering" skills. However, my hunt may be coming to an end thanks to one celebrity chef's concept. Maki ...more
I remember a time when I had to rent a VHS from the local video rental store. It wasn't all that bad, with the only real annoyances being the trip to and fro, having to rewind the movie and the possible malfunction of my VHS player, which liked to eat tape from time to time. ...more
It's easy to lose oneself when playing Minecraft and easier still to get plum lost. That's why it's always good to have a compass on hand. No compass? No problem. There are, in fact, no fewer than seven methods at your disposal for finding true north in a Minecraft world. Bett ...more
You know it's crazy out there when governments start blocking social websites like Facebook, Twitter and even YouTube. But that's what happened in Egypt, when tens of thousands of anti-government protesters took to the streets on Tuesday (January 25th) in hopes of ending Presi ...more
Whether it's the new iPad Killer or not, one thing's for sure—the Motorola XOOM is hackable. Just hours after its release last week, Verizon's new Android-based tablet (running Honeycomb) was rooted by hacker Koushik Dutta, which seems easy enough. "Since it’s another Google ...more
In this video tutorial, viewers learn how to hack the flash game, Age Of War 2. Users will need to download the Cheat Engine program for this process. Begin by starting the game. The game should start with 2500 gold. Then pause the game and open Cheat Engine. Click on the Proc ...more
This video tutorial shows how to create hay bale art in FarmVille (10/22/09). Are you a jaded FarmVille player? Do the joys of harvesting just not do it for you like they used to? Why don't you start using FarmVille as an artistic medium? This video will teach you how to use ...more
Trevor4Ever595 teaches you how to hack mini tower defense using Cheat Engine. Start the game in your internet browser and then pause it. Start Cheat Engine and go to your process list - the little computer icon in the top left corner of the window. Select your browser and then ...more
If you've forgotten the password to one or more of the Windows XP accounts on your computer, take heart: This video tutorial will show you how to bypass, and then change, a Windows XP start-up password. For a detailed run through of this simple Windows log-in hack, watch this ...more
This video tutorial shows how to hack FarmVille (07/02/10). When you FarmVille farm starts to get really vast, waiting for your avatar to walk to each plot in order to harvest it becomes a major hassle. But it need not be. This video will show you how to use a simple technique ...more
To quickly receive your blue ribbon with the fences in FarmVille, you're going to want to watch this video tip. It's a brief explanation of how you can easily get the Blue "Fenced In" ribbon in FarmVille (01/11/10). BEfore you start this, you will need 75,000 coins and 77 free ...more
The video explains how to hack the game Agony: The portal. First he clicked the start game and created new character by entering the name as test dummy and set the difficulty level as normal. The he clicked the start campaign. While entering the game he skipped the tutorial an ...more
You want to know how to get extreme scores in the flash game Pool Practice? This is how. Watch this video tutorial to learn how to cheat in the flash game Pool Practice (01/01/10). Basic instructions: 1. Load the Pool Practice game on Netlog 2. Start HxD - Freeware Hex Edito ...more
General Electric isn't known for their Christmas lights, but maybe they should be, because their GE Color Effects are pretty awesome. Especially the LED Color Effects G-35 String sets. And especially when someone named Darco hacks them. Darco, whose real name is Robert Sun Qu ...more
Start with a Sony Handi-Cam (or any other camera that allows you to film using night vision) and then add in a special infrared filter and a little extra hardware. Now you can film completely in infrared and film in X-ray vision!
In this clip, you'll learn how to hack a Flip UltraHD camera to use a wide-angle lens. For more information, including a complete demonstration and detailed, step-by-step instructions, and to get started creating your own custom wide-angle UltraHD cams, take a look.
In this clip, you'll learn how to extract serial data from the $80 Mattel Mindflex or Star Wars Force Trainer. For more information, including detailed, step-by-step instructions, and to get started creating your own working EEG/BCI, watch this very-neat hacker's how-to.
Jailbreaking iPhones, iPods, and iPads with Jailbreakme.com is one of the easiest hacks ever creataed, and is completely legal. That doesn't mean it works perfectly every time. If you're having problems using jailbreakme, don't give up! This video will show three ways to fix c ...more
Want to mod your HTC HD2 Microsoft Windows smartphone to use wireless charging—without breaking your warantee in the process? It can be done! And quite easily at that. For complete details, and to get started modding your own HD2 phone to work with wireless chargers, watch thi ...more
Though the Google home page may appear simple, its search tool is anything but. This quick clip from the folks at CNET TV demonstrates a number of the search engine's most obscure and most useful features, all certain to help you to find your desired information more quickly. ...more
Learn how to force the Windows 7 taskbar to display a preview for each and every one of your Mozilla Firefox tabs upon mouse-over. This home-computing how-to from the people at Tekzilla will show you a quick and easy about:config Firefox hack that will permit you to do just th ...more
Want to be the John (or Jane) D. Rockefeller of Restaurant City? Watch this video tutorial to learn how to hack Restaurant City with Cheat Engine 5.5 (02/04/10). Instructions: 1. Wait until your customer gives you money. 2. Open up CHEAT ENGINE. 3. Click the flashing rainbow ...more
Hack mybrute with this mybrute cheat. MyBrute hacks, cheats, tricks. Watch this video tutorial to learn how to cheat MyBrute for a bear (05/08/09). This is the easiest way to get a bear! 1. Get Mozilla Firefox 2. Install Tamper Data Add-On to Firefox 3. Go to aa130aa 4. Type ...more
This video tutorial talks about browser exploitation. Particularly, it talks about tools, like BeEF, that can be used to hack known vulnerabilities within browsers and some cool frameworks that you can use to check the security of your own browser. To get started hacking your ...more
Time flies. Particularly when it's projected. The magical box in this how-to uses light and mirrors to project the image of a working clock face on any wall. To build your own working clock projector, you'll need the following materials: a mirror, a jeweler's loupe, a clock an ...more
Scott Pilgrim vs. The World: The Game is surprisingly hard for either Xbox 360 or Playstation 3. If you have the PS3 version, this video will show you a great trick for leveling up and getting nearly infinite money quickly. From the Creator: **** Xbox 360 users **** You cann ...more
In this tutorial, we learn how to hack Mega Drill with Cheat Engine. Start off by doing the first level and when you run out of gas you should have some money in your account to go buy new gas. Before you purchase it, go to your Cheat Engine and double click the Firefox browse ...more
Looking for instructions on how to do USB tethering with a Samsung Vibrant smartphone? You're in luck. This free video tutorial will see that you need everything you need to know. (Note, however, that this hack will require you to download the free Samsung Kies application.) F ...more
It's official! You can jailbreak whatever devices you want without fearing reprisal from the federal government! WIN! If you were worried about the legal implications before, worry no longer, and start taking advantage of your devices! This video will show you how to hack an i ...more
In this video, we learn how to hack Sandcastle with Cheat Engine. First, start the game and then click the process list icon. Now, use the Firefox browser and then type in the amount of gold you have into the value section. Now, buy something and then click the frozen box and ...more
ios249 is a sweet little hack for the Wii that allows you to play backup burned copies of games on your console. Pirated games will work too, although we DO NOT condone piracy. This video will walk you through the whole rather elaborate process of installing it on a hacked Wii ...more
In this video tutorial, viewers learn 4 different hacks that will make typing easier in Windows. Begin by clicking on the Start button and select Control Panel. Then click on Ease of Access Center and select "Make keyboard easier to use". Now users are able to configure the ke ...more
In this clip, learn how to make a fast, cheap and super easy mount for your your bicycle to display safety lights. Wearing bike lights at night will help you stay safe in the dark and if you want to avoid the cost of getting lights custom fitted, this hack is perfect for you. ...more
The maximum is a 1000 gold. In order to hack and win the game, he goes through several techniques choosing a level to start out, once a level completed and he collects one gold. He then selected a cheat engine in his Firefox page. He advised in order to hack the game, multiply ...more
On Facebook, there's a game called Balloon in a Wasteland that is tons of flash game fun. But if you've never played it, you should go check it out, and if you want to learn how to hack Balloon in a Wasteland, then this two-part video should be enough for you to starting cheat ...more
Hack Click Challenge! v2. Click your way to the top. You just need your computer mouse and your hand, but watch out… this clicking flash game can cause arthritis if you're not careful! Watch this video tutorial to learn how to hack Click Challenge! v2.0 (06/06/09). You will n ...more
Learn everything you could possibly want to know about the internet, multiplayer game Evony with tutorials from EvonyTutorials. Watch this video tutorial to learn how to play Evony: Resource millionaire and beginner's protection. See exactly what the game Evony is! In this vi ...more
Learn everything you could possibly want to know about the internet, multiplayer game Evony with tutorials from EvonyTutorials. Watch this video tutorial to learn how to play the basics in Evony online. See exactly what the game Evony is! In these videos: Part 1 - Creating a ...more
Household Hacker demonstrates how to hack flash games. To get started, you need: 1. Cheat Engine: http://cheatengine.org/downloads.php 2. Your favorite flash game. We are going to show you how to hack any flash game using Cheat engine. You can hack games like bloons, deskt ...more