GTFOBins and LOLBAS are projects with the goal of documenting native binaries that can be abused and exploited by attackers on Unix and Windows systems, respectfully. These binaries are often used for "living off the land" techniques during post-exploitation. In this tutorial, ...more
You're in a Zoom meeting, and you're click-clacking away at your keyboard, typing important notes from the call. More realistically, you're doing something unrelated to the meeting, such as browsing the web, playing a game, or messaging friends. Whatever it is you're typing, i ...more
There's a new macOS vulnerability that hackers within physical reach of your computer can use to gain root access to your system and accounts. Just by using "root" as the username and a blank password on a privilege escalation prompt, someone can install malware on your comput ...more
I think it was about Day 3 of working on our massive, all-encompassing Pixel 4a root guide for beginners when I realized something: Not everyone needs their hands held through each tiny step. If you just need a quick refresher, some links, and maybe a fastboot command to copy, ...more
Hacker's are always looking for new ways to exploit systems and exfiltrate passwords, even in hashed form. Sophisticated brute-force attacks powered by high-end GPUs can perform millions of password attempts per second. But Ubuntu and Debian users aren't completely helpless. T ...more
A fully functional steampunk computer workstation. With attention to detail this unique computer was manufactured from old materials. The ensemble consists of iron, steel, wood, brass, glass and leather. Perfect for timetravelers office or as ether terminal. Consists of a 150 ...more
A long time ago, we recommended the Hover Zoom extension for Chrome as an easy way to blow up small image thumbnails without actually have to "click" on the images themselves. Over the past year, there have been reports that Hover Zoom now collects and sells your browsing data ...more
Using Netcat to backdoor a macOS device has its short-comings. If the compromised Mac goes to sleep, the Netcat background process will occasionally fail to terminate correctly; This leaves Netcat running infinitely in the background and the attacker with no new way into the d ...more
The Nokia N900 smartphone suffers from a lack of quality games due to Nokia's restrictive OS, but fortunately you can get WebOS games from the Palm Pre loaded onto it pretty easily by following the steps outlined in this video tutorial. From the Creator: You will need to ins ...more
This video shows us the method to make a universal motion alarm to protect your home. You will need a reed switch with an alternating contact, a 9V battery with a battery clip, a switch, a buzzer, a small plastic box and a magnet. When a magnet is brought near the reed switch, ...more
So, a lot of people seem to be having trouble rooting their Motorola Droid X smartphone from Verizon Wireless using ADB (Android Debug Bridge). Well, there is an alternative for those having problems with the ADB version. You will need to have a Wi-Fi or Bluetooth widget handy ...more
Welcome back my networking geeks. In this part we are going to keep discussing about IP Addressing and I hope after you finish reading it you will become an IP wizzard. So in the last tutorial we did what we did without the use of our default gateway. To be honest, in really ...more
This article describes the very basics of compiling a program on Linux. It is targeted at the absolute beginner. Sometimes beginners search for programs on the web for their Linux systems, and is faced with the reality that they have to compile the program themselves, either b ...more
Accidentally leave your Gmail open on a public computer terminal? Don't fret. You can have Gmail sign out any unwanted sessions with a click of the mouse. This free video tutorial from the folks at CNET TV will show exactly what to do. Protect your Gmail email account and log ...more
When OS X Lion (10.7) debuted last year, a lot of Apple users were dismayed that the "Save As" option had disappeared, replaced by the "Duplicate" function. Most felt that it just wasn't the same, so when Mountain Lion was released, the "Save As" option was brought back… sort ...more
Post-exploitation is often not quite as exciting as popping the initial shell, but it's a crucial phase for gathering data and further privilege escalation. Once a target is compromised, there's a lot of information to find and sift through. Luckily, there are tools available ...more
Greetings to all geeks, hackers, nerds, and explorers of Null Byte. Welcome to my brand new tutorial, "Using BASH for Computer Forensics". This tutorial will give you a look at how the computer programming language, Bash, can be used to find out details on apple devices for la ...more
Welcome back! Sorry for the dry spell, but I've been rather busy setting up some side projects! If you remember back to a few training sessions ago, we covered basic file I/O. This is a very important step in making our scripts applicable in a real life scenario, and today we' ...more
Ubuntu and Windows may have trouble syncing time because when they are dual booted, they both assume that your hardware clock is set to a different time setting. Ubuntu assumes that your clock is set to UTC and Windows assumes that your clock is set to local time. Answers Laun ...more
I have gotten comments from my last tutorial on not being able to do anything because of a lack of a monitor. In order to address this problem I'm gonna show you how to connect and control the Rasberry Pi through a SSH client on Linux, Mac, Windows, and Chromebook computers. T ...more
In this video tutorial, viewers learn how to jump start a car. When purchasing a jumper cable, don't purchase the cheapest set. It is also not necessary to purchase the most expensive. Begin by connecting the black cable on the negative terminal of the healthy car. Then connec ...more
Google just released the first version of the next major Android update. Early Android 11 builds will only available as developer previews, so you can't just sign up for the beta program and install the update as an OTA for the first couple months. That said, it's still pretty ...more
Hello all! In this tutorial, I'd like to show you one way of getting root on OS X. Check out this GitHub page for a recent privilege escalation exploit that was recently discovered. I've tested it and it works on both OS X 10.9 Mavericks and OS X 10.10 Yosemite, but appears to ...more
In this Computers & Programming video tutorial you will learn how to change the default Windows Remote Desktop port. It is actually a registry hack. You can check the IP address of our machine by typing ipconfig into the cmd prompt. For hacking into a machine, you should have ...more
Hello, Null Byters. I'm Barrow, and I'm excited to introduce myself as the new admin here on Null Byte. Just like previous admins have done before me, I will be writing new guides, updating older guides if they need it, and responding to some of your issues in the forum. Befor ...more
Do you ever thought that you can't control an Internet disconnected system? I saw a funny video in Chema Alonso's youtube channel (A well-known hacker of my country and creator of Fingerprinting Organizations with Collected Archives among other security tools), and decided to ...more
This video tutorial demonstrates an easy way to activate MMS on iPhone 3G or 3Gs Firmware 3.1 o. First download the File here. Now Make Sure itunes is closed and not running. On Mac: 1. Close iTunes if it is open 2. Start Terminal (Applications - Utilities) 3. Run the foll ...more
Here is an alternative method to run Ubuntu 10.04 on a Mac without actually installing it on your internal hard disk. The idea is to install Ubuntu on your USB flash disk, instead of installing it on your internal hard drive. I'm talking about a full disk installation. It won ...more
Gmail conversations, Facebook private messages, and personal photos can all be viewed by a hacker who has backdoor access to a target's Mac. By livestreaming the desktop or exfiltrating screenshots, this information can be used for blackmail and targeted social engineering att ...more
Yosemite brought a new, Alfred-like Spotlight search to our Macs, but at times I still find myself wanting more out of it. However, after stumbling upon Flashlight by developer Nate Parrot, I am now able to perform Google searches, look up weather, and even enter Terminal comm ...more
Identifying security software installed on a MacBook or other Apple computer is important to hackers and penetration testers needing to compromise a device on the network. With man-in-the-middle attacks, packets leaving the Mac will tell us a lot about what kind of antivirus a ...more
Hello there Nullbyte users! This will be my first article here. Feel free to give feedback in the comments! Today I'll be introducing the UNIX text editor VIM. VIM is a text editor that is completely controlled from the keyboard. An experienced VIM user is A LOT faster than ...more
New to Ubuntu Linux? This computer operating system could be a bit tricky for beginners, but fret not, help is here. Check out this video tutorial on how to enable font anti-aliasing on Wine Ubuntu Linux. Type this in the terminal window Step 1. wget http://files.polosatus.r ...more
Change your Snow Leopard dock on Mac OS X with this video tutorial. Go to Leopard Hard drive -> System folder -> Library folder -> CoreServices folder -> Dock App (right click) -> Show package contents -> Contents folder -> Resources folder -> Scroll down until you get to Scur ...more
New to Ubuntu Linux? This computer operating system could be a bit tricky for beginners, but fret not, help is here. Check out this video tutorial on how to enable USB support in VirtualBox on Ubuntu Linux. By default, USB support was disabled in VirtualBox, so you'll probabl ...more
While holographic Whitney Houston is hitting the road, a new mobile app is bringing volumetric captures of up and coming performers directly to the iPhones and iPads of fans. On Wednesday, AR studio 1RIC launched Jadu, a video app that delivers virtual performances by music a ...more
Greetings fellow hackers. This tutorial is about creating "safe" passwords. This is different from strong passwords. Safe passwords is just creating a password that is not used by someone else or colleague, my definition. But how do you prevent something like this from happeni ...more
An attacker can create three, five, or even ten new Netcat connections to a compromised MacBook with one command. Performing complex post-exploitation attacks might otherwise be difficult from a single shell without this essential trick. Why Create Multiple Netcat Threads? W ...more
This tutorial is for Ubuntu 10.04 users who want to tether their iPhone 4 (software version 4.2.1). No jailbreak needed! You have two options - you can tether through USB, or tether through Bluetooth. Tethering through USB Add PPA repository to your synaptic repositories. T ...more
Hello NullByte, it's mkilic! This time I'm here with the C.H.I.P from NTC. Although it is not too popular, the C.H.I.P is a brand new micro computer. It is very similar to the Raspberry Pi or Beaglebone Black. The key difference with this particular board is its cost and size. ...more
New to Ubuntu Linux? This computer operating system could be a bit tricky for beginners, but fret not, help is here. Check out this video tutorial on how to install and enable Flash for Chromium on Ubuntu Linux. To install the latest Chromium on Ubuntu, open a terminal and: ...more
Enabling SSH On Your Mac Server How To Use Your Mac As A Server. In this video tutorial, I was you thru how to enable and use ssh on your colocated mac server. It’s an easy process, and this is a short tutorial, but it really opens the door for controlling your Mac in a very ...more
Asphalt5 is a racing game for the WebOS phone operating system, originally developed by Palm. If you want to play it (and you should) on your Nokia N900 handset there are some complications you're going to have to get through, and this video will show you how step-by-step. Fr ...more
If you're having some microphone troubles on your Ubuntu Linux system, this video might help you troubleshoot and solve the broken mic problem. This is about fixing the microphone input specifically. This tweak should fix it. step 1. Launch terminal and type " sudo gedit /etc ...more
Cityslipper shows you how he uses the cleft grafting method to make a less appealing green apple tree produce better tasting red apples. 10-12 inches long scion wood is collected from the good apple tree while it is dormant. Care is taken not to let the twigs dry out. Selected ...more
In part one of this tutorial we found out that your English teacher is a paedophile, by using a Man in the Middle attack to intercept his internet traffic. Now you're faced with the dilemma of how to alert other staff at the school to how creepy he is without letting on that ...more
If you have a Mac running Mountain Lion, I'm sorry to tell you that all it takes to crash almost any app on it is eight little characters. This strange bug seems to only affect Mountain Lion and doesn't cause your computer any harm. Apparently, it even crashes the error report ...more
During the Google I/O 2019 keynote, the latest Android Q Beta was released to the public for Pixel smartphones along with 15 other non-Pixel devices. It's the third Developer Preview for Android 10, but it's the first official public beta outside of Google's Pixel smartphones. ...more
If your car has a dead battery, jumper cables can be used to connect to a car with a good battery to start your engine. Begin by positioning the two cars side-by-side, turn off the engines, and lift the hoods to access the batteries. First, attach the red cables to the positiv ...more
Check out this fishing tutorial video that demonstrates how to tie a Fishing Blood knot. This knot is used to tie line to terminal tackle. Just follow the simple steps as diagrammed in this animated fishing video and learn how to tie a blood knot. Start reeling in the big fish!
Your English teacher is a creep. The way he looks at your girlfriend, the way he always spends ages with the girls in the class going over their work but not the boys, just the way he is. You want to get rid of him, but you need some proof first. Step 1: Fire Up Kali If yo ...more
An attacker can repurpose public MyBB forums to act as command-and-control servers. It only takes a few lines of code to configure a MacBook to fetch commands and send responses to any website the attacker desires. Before you keep reading, know that this project is not geared ...more
What Is IPython? IPython is a richly featured replacement for the standard python interpreter. It offers a wider range of functionality, that the standard interpreter, which generally ships with python, sorely lacks. It's a great tool for learning Python faster than you would ...more
In this video the tutor shows how to make an ISO image file on a Mac. He shows what the requirements are to get started. He points to the disk utility program from where he points to the option where we can open a disk image from a folder. Now he selects the folder to which he ...more
I assume you are on the same network with your router 1 - open a terminal window 2 - type telnet 192.168.1.1 (your routers ip) 3 - admin: admin 4 - password: CalVxePV1! (case sensitive) 5 - type reboot (hit enter) Done!.. your router will reboot instantly now... for spanish ...more
Google released the first build of Android 12 almost exactly one year after dropping Android 11, which is remarkable in the midst of a global pandemic. But you can tell the Android engineers have been hard at work while quarantining, because the latest OS version is absolutely ...more
Legendary drum-and-bass artist Squarepusher, the Warp records labelmate of fellow electronic music legend Aphex Twin, is back with his fifteenth album called Be Up a Hello, which is set to drop on Feb. 1. To kick off the launch, the artist has just released an amazing new mus ...more
Welcome back! In the last training session we covered how to write and execute scripts. But today we'll be getting back to the code! Today we'll be covering something that is extremely important for building real-life applicable scripts, file input and output. When I say "... ...more
Ever hear of SmillaEnlarger? It's a small graphical tool (based on QT) to resize, especially magnify bitmaps in high quality. Check out this video tutorial on how to back up and restore data easily on Ubuntu Linux. Hundreds of different solutions exist to reduce the resolutio ...more
This video tutorial will show you the process of drawing blood from rats through the saphenous vein and by cardiac puncture. Drawing blood from rodents is necessary for a large number of both in vitro and in vivo studies. Sites of blood draws are numerous in rodents: retro-or ...more