Hack Like a Pro: How to Get Facebook Credentials Without Hacking Facebook
Welcome back my, tenderfoot hackers! Many people come to Null Byte looking to hack Facebook without the requisite skills to do...
Hack Like a Pro: Snort IDS for the Aspiring Hacker, Part 3 (Sending Intrusion Alerts to MySQL)
Welcome back, my hacker novitiates! If you have been following this new Snort series, you know that Snort is the world's most ...
The Panama Papers Hack: Further Proof That Hacking Is Changing the World
Welcome back, my novice hackers! You have probably heard of the Panama Papers hack by now. This was a hack of the servers at M...
Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 16 (Extracting EXIF Data from Image Files)
Welcome back, my greenhorn hackers! In many cases when a computer, phone, or mobile device is seized for evidence, the system ...
Even Microsoft Acknowledges the Superiority of the Bash Shell Now
As most of you know, I am a strong advocate for using Linux for hacking. In fact, I would go so far as to say that you cannot b...
Capture the Flag, Round 1
As many of you know, Standard User proposed that we start a Capture the Flag (CTF) competition. I think this is a great idea! S...
Hack Like a Pro: How to Scan for Vulnerabilities with Nessus
Welcome back, my tenderfoot hackers! Generally, you will want to perform a vulnerability scan before doing a penetration test....
Hack Like a Pro: Metasploit for the Aspiring Hacker, Part 14 (Creating Resource Script Files)
Welcome back, my budding hackers! In this series, I have been trying to familiarize you with the many features of the world's ...
U.S. Justice Department Indicts Iranian Hackers
Last week, the U.S. Justice Department issued criminal indictments against seven Iranian hackers. These hackers, working for pr...
Hack Like a Pro: Reconnaissance with Recon-Ng, Part 1 (Getting Started)
Welcome back, my novice hackers! As many of you know, recon is crucial to a successful hack/pentest. In most cases, hackers sp...
Hack Like a Pro: How to Use PowerSploit, Part 1 (Evading Antivirus Software)
Welcome back, my greenhorn hackers! A few years back, Microsoft implicitly recognized the superiority of the Linux terminal ov...
Hack Like a Pro: Snort IDS for the Aspiring Hacker, Part 2 (Setting Up the Basic Configuration)
Welcome back, my tenderfoot hackers! As you should know from before, Snort is the most widely deployed intrusion detection sys...
A Brief History of Hacking
Welcome back, my fledgling hackers! Hacking has a long and storied history in the U.S. and around the world. It did not begin ...
Hack Like a Pro: Snort IDS for the Aspiring Hacker, Part 1 (Installing Snort)
Welcome back, my neophyte hackers! In the world of information security, the most common intrusion detection system (IDS) you ...
Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 15 (Parsing Out Key Info from Memory)
Welcome back, my budding hackers! Digital forensics is one of IT's most rapid-growing disciplines. All hackers should be famil...
Hack Like a Pro: Metasploit for the Aspiring Hacker, Part 13 (Web Delivery for Windows)
Welcome back, my hacker novitiates! In the previous part of this series, we looked at how to use Metasploit's web delivery exp...
White Hat Hacking: Hack the Pentagon?
The Null Byte community is all about learning white hat hacking skills. In part, this is because I believe that hacking skills ...
Hack Like a Pro: Capturing Zero-Day Exploits in the Wild with a Dionaea Honeypot, Part 2 (Configuration)
Welcome back, my rookie hackers! The Golden Fleece of hackers is to develop a zero-day exploit, an exploit that has not been s...
And the Winner of the White Hat Award for Technical Excellence Is...
It seemed appropriate that we announce the winner of the first White Hat Award for Technical Excellence on the Academy Awards w...
Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 29 (Start-Up Scripts)
Welcome back, my neophyte hackers! Very often we have processes in Linux that we want to always run in the background at start...