We'd like this to be one of the last HTS mission announcements, at least for now. As soon as Null Byte finds a server to play with (anyone want to donate one?), we are going to start doing root the box competitions, which is like king of the hill, except you have to hack a ser ...more
We're aiming for this to be one of the last HTS mission announcements, at least for now. As soon as Null Byte finds a server to play with, we are going to start doing root the box competitions, which is like king of the hill, except you have to hack a server and maintain acces ...more
The community tore up the first realistic mission last week. You've applied the techniques learned in the basic missions to a real scenario, so I'm pretty content. The realistic missions are where the learning gets intense and where we can apply real knowledge to extremely rea ...more
Community byters, it's time to get serious. We are finally moving on to the realistic missions in HackThisSite. This is where the learning gets intense and where we can apply real knowledge to extremely realistic situations. We will also be continuing the normal Python coding ...more
Since its inception in 2007, the Pwn2Own computer hacking contest has been challenging the vulnerability of mobile phones and web-related software. In 2010, the fruit of two full days of hacking came down to the exploitation of the following web browsers: Safari 4 on Mac OS X, ...more
Want to be able to hack into a computer remotely? This method takes a little extra time and cunning to set up, since you will need to first install the ShowMyPc program on your target computer. Once you have installed this program, however, you will be able to go to the websit ...more
In this video, we learn how to hack your iPhone 3G. To do this, you will need: iPhone 3G, Firmware 3.0 or 3.1 file, charger cable, and the Redsn0w program. First, connect your phone to the computer and then start up the Redsn0w program on your computer. Turn the phone off, the ...more
http://www.texturemind.com/post463/ TypingRobot is an artificial intelligence studied to increase your points record with the Typing Maniac game on Facebook. It can recognize several labels because it uses a powerfull OCR system (tesseract) and some principle of word correcti ...more
Hacking can't be that hard, can it? At least, that's what it seems like thanks to movies like Hackers, The Net and that last Die Hard flick. Even the Jurassic Park girl's got some game. They all look like they're typing 20wpm, yet can generate a screen full of code in the blin ...more
Iowa firefighter Pete Lilja has modded the software of a Canon powershot to record images of Earth, from as high as 85,000 feet! Lilja's hack requires the following: 1 basic point-and-shoot consumer camera attach camera to a GPS transmitter (+ a phone number just in case the ...more
We're officially seeking Null Byters on a weekly basis who are willing to take the time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (IF up to par, of course). There is no ne ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
Today's post is a small go-to guide for beginner programmers in Null Byte. With many of our community members picking up programming from our Community Bytes, it only makes sense to lay out a one-stop guide for your reference. Hopefully this guide will help you make an educate ...more
i am stone taker and currently pursing b.sc computer science. i am from Africa.i want to to master become know programming very well especially c++; i hope you can help me with hacking too, for educational purpose only.
Can't get enough Pokemon action? Check out this helpful video to learn how to download any Pokemon hack. You'll be catching Pokemon for the rest of your life if you follow the instruction in this video and download the suggested programs.
Pandemic 2 is a fun little game published by Addicting Games, and this tutorial shows you how you can hack the game using the Cheat Engine program. Give yourself more points, more resources or increase any stat you want by following this tutorial.
The world has been overflowing with Microsoft Kinect hacks, each more amazing than the last. The latest innovation, created by a group of engineers at USC, promises an exciting future in gaming (and gets gamers off their asses). The program is called FAAST, and allows for full ...more
This hack is currently undetected on the Blizzard servers! You can get a program called XYZ that will let you hack the game to let your avatar fly - though be careful, if you cast a spell, you'll disconnect from the servers.
Quartz Composer is a Mac program that helps you manipulated motion capture video, and you can hack your Xbox Kinect to send motion captured data to your Mac OSX. This tutorial shows you precisely how you can use the Kinect tools to pull this off!
Yes, you can use Cheat Engine to even hack programs that aren't games, like Microsoft Paint! This tutorial shows you first how to download the most recent version of Cheat Engine, and then use it to hack the attributes in MS Paint!
Cheat Engine is a pervasive program that will attach to your browser when you play web games, and let you hack into the games and cheat. This tutorial focuses on the free web game Dragon Fable, and shows you how to use Cheat Engine to hack the game.
In this clip, you'll learn how to set up PV3D for hacking the Number3D class. Whether you're new to Adobe's popular Eclipse-based integrated development environment (formerly known as Flex Builder) or are a seasoned developer merely looking to improve you're chops, you're sure ...more
Cheat Engine is a powerful utility that makes hex-editing (and thus hacking) many webgames a breeze. This video will teach you how to use this program to cheat at Runescape, the popular free web RPG. The text in the video is small, so make sure you watch it in fullscreen mode!
Arceus is the 493rd pokemon added to the National Dex. It can be encountered at level 80 which is the highest level wild pokemon in the game. This video will show you exactly how to find and catch the legendary god pokemon Arceus. This is a video of me catching the legendary ...more
Believe it or not, people are still using Friendster. Which is great news for all you hackers because that means there are accounts to hack! With this video you'll find out how to exploit a programming loop hole in order to hack into someone's Friendster account. We can't prom ...more
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to program a ...more
When performing this iPod hack, make sure to turn off your iTunes and keep it from popping up after you've plugged in your iPod via USB. Take a look at this tutorial and learn how to hack into you iPod on your Mac with the program Alterpod. With luck, no error log will pop up ...more
This episode of Full Disclosure demonstrates how to hack/crack MD5 password hashes. MD5 (Message-Digest algorithm 5) is a hash function commonly used by websites to encrypt passwords. MD5 is a one-way hash; therefore, to crack the password you most try every possible dictionar ...more
Social engineering is described as the clever manipulation of the natural tendency of human trust. All of the passwords, locks, and encryption in the entire world are useless against a good social engineer who can charm or trick you into giving it up. But what once started as ...more
We're officially seeking Null Byters on a weekly basis who would enjoy taking their time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job ...more
We're officially seeking Null Byters interested in teaching others! Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job meant for anyone with the will to share knowle ...more
Welcome to another Community Byte announcement! In the past two sessions, we have coded an IRC bot in Python capable of issuing commands. Since it can issue commands and most of you are new to programming, that project will stay idle for a while. Other commands such as voice a ...more
This only works on single player games. You can use the free program Cheat Engine to hack into Minecraft and use it to duplicate items in your inventory. Get as many diamonds, obsidian blocks or gold ingots as you want!
This is a quick and easy tutorial that shows you how to find out your character coordinates in a 2D game using the free game hack program Cheat Engine. It's not very difficult, just follow along with the steps in the video!
Most Flash games have holes in their programming that can be exploited if you have the right program - the right program in this case being Cheat Engine. Learn how to use it to cheat or hack nearly any Internet game.
You'll first need to get the free program. Once you have downloaded it, open both your game and the program, and you can hack WebKinz for as much kinzcash and free items as you want! This cheat may take a few hours to appear.
You can use the free software program Cheat Engine to hack nearly any game, whether online or off, to alter your scores, inventory and experience points. Always make sure you are using the most current and up to date version of Cheat Engine! Part 1 of 2 - How to Change your sc ...more
Cheat Engine is a free program you can download that will allow you to hack into any web or Flash game and alter the code so you can cheat. While many tutorials show you how to do one or two things with Cheat Engine, this tutorial focuses on how to use it in general.
This shows a step by step method for using the Wii controller to output MIDI control to Apple Logic Pro and "conduct" MIDI with the Wii stick! This is a way cool Wii hack that makes the bluetooth controller work with Logic. You need to install another program to receive and co ...more
HighQuality Tutorials demonstrates how to change your iPod Touch alpine default password. Changing the default password is useful when using your iPod Touch in a public setting to make it less vulnerable to hacking. To change the default password, first open up your internet c ...more
There are so many hackers around these days, and they are becoming very smart. So smart that they have successfully taken down many government websites. The most recent attack was on the Department of Justice (DOJ). To read about the history of these hackers, check out Wikiped ...more
We're officially seeking Null Byters on a weekly basis who are willing to take the time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (IF up to par, of course). There is no ne ...more
Since the early genesis of the brilliant Microsoft Kinect hack, inventive applications have been popping up nonstop. One of the most fascinating projects to surface recently falls within the realm of 3D printing. "Fabricate Yourself"—a hack presented at the Tangible, Embedded ...more
Perfect World International, also called PWI, is a hit new MMORPG in the vein of World of Warcraft or Silk Road. It's also currently able to be exploited using the free game hacking tool, Cheat Engine. This tutorial shows you how to use Cheat Engine to hack your copy of Perfec ...more
This video tutorial is in the Computers & Programming category which will show you how to hack a wireless network with WEP encryption. This video is intended only as a means of testing the security of your own network. Go to Backtrack Linux, download the backtrack4 and burn it ...more
This video tutorial belongs to the Electronics category which is going to show you how to make a hack pack. This is basically turning a notebook in to something that you can take literally anywhere. Here you will learn how to create a video streaming hack pack to carry around ...more
In this Computers & Programming video tutorial you will learn how to hack into a compuuter, the easiest way. Go to start > run, type in ‘cmd’ > OK. To find the IP address of a website, type in ‘tracert myspace.com’. This example is to find IP address of myspace.com. Th ...more
TooSmartGuys teach viewers how to hack their iPhone using Black Ra1n and Sn0w. First, if you have a jail broken iPhone you should back up your apps by downloading a program called App Back Up. Now, plug your iPhone in and let iTunes load. Allow it to update and you should see ...more
In this Computers & Programming video tutorial you will learn how to change the default Windows Remote Desktop port. It is actually a registry hack. You can check the IP address of our machine by typing ipconfig into the cmd prompt. For hacking into a machine, you should have ...more
In that video you learn how to hack ikariam. First Step you go to Google and type "grease monkey," second step: add Greasemonkey to Firefox add-ons, third step: type everything you want such ass "ikariam gold script" and do the following. After you do that you have to restart ...more
Feeling ambitious in the hack department? Try taking on the DIY Pong Clock. Via Core77, "Hardware hacker Ladyada has released an open source retro arcade style table tennis for two clock called the MONOCHRON. According to MONCHRON project page they 'wanted to make a clock th ...more
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to break dow ...more
Hack a PlayStation monitor into a digital television! Get that old PS1 out of the closet and dust it off, because the switch to digital television is coming soon, and you need a DTV, so why not put that PlayStation One to use? You can build a digital television from a new set ...more
VNC stands for Virtual Network Computing. It is remote control software which allows you to view and fully interact with one computer desktop (the "VNC server") using a simple program (the "VNC viewer") on another computer desktop anywhere on the Internet. The two computers do ...more
Netcat is a featured networking utility which reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a featur ...more
If you've ever heard software piracy terminology being discussed, I'm sure the term KeyGens came up. KeyGens is short for key generator, which is a program that exploits algorithmic faults in software by generating software license keys that appear to be genuine. Normally used ...more
If you've ever wondered how software pirates can take software and crack it time and time again, even with security in place, this small series is for you. Even with today's most advanced methods of defeating piracy in place, it is still relatively easy to crack almost any pro ...more
A flaw in WPS, or WiFi Protected Setup, known about for over a year by TNS, was finally exploited with proof of concept code. Both TNS, the discoverers of the exploit and Stefan at .braindump have created their respective "reaver" and "wpscrack" programs to exploit the WPS vul ...more
Null Byte is looking for forum moderators! Welcome to the ninth Community Byte for coding in Python and completing the challenges presented to us by HackThisSite. These sessions are created to bring our community together, to learn from each other, and grow together. Everyone ...more
Friday's Community Byte was weird. The intent was to do a HackThisSite mission, but upon time to begin, everyone in there was programming without my assistance, with the help of Sol Gates. This is great! It's really awesome that everyone enjoys programming that much and will m ...more