I read this tutorial from OTW on using new modules in Metasploit: http://null-byte.wonderhowto.com/how-to/hack-like-pro-metasploit-for-aspiring-hacker-part-9-how-install-new-modules-0162503/ It was very useful, but now I'm stuck. I suppose everyone has heard of the Hacking ...more
Hey everyone, I was wondering if there are people working on Python projects that could use some help. I'm a reasonably experienced Python user and did some bigger projects for my educational program at a university. I'm always looking for fun things to work on and doing some ...more
Hello all, I am using Kali for a couple of years on a dual boot Windows pc now, but for mobility purposes I bought a Macbook Pro Retina. I ran Kali in VirtualBox, but because it has a problem with the retina resolution it looks blurry and therefor is not really pleasant to wo ...more
Hallo everyone, I was wondering: what do you guys think is the best way to encrypt your files? Personally I use VeraCrypt (with AES) which works fine, but of course I am always looking for possible improvements. Looking forward to your opinions!
The feared Stagefright exploit was released today! Find it here: https://github.com/jduck/cve-2015-1538-1 Please let everybody know if you have tested it succesfully! I'll try it tomorrow.
Just wanted to share this with you: http://venturebeat.com/2015/07/27/researchers-find-vulnerability-that-affects-95-of-android-devices/ Let's just hope they will explain us how to use this vulnerability at Black Hat!
I was wondering what your opinions are on the future of Null Byte here on WonderHowTo. Isn't it time to switch to a more code-friendly environment, or maybe even a standalone website with a structure that isn't meant for sharing Android tricks and how to make a cake etc.? It ...more
I tried out the Hacking Team Flash exploit (https://www.exploit-db.com/exploits/37523/), but I can't get it to work. When my victim pc (of which I made sure it was vulnerable to the exploit) browses to the malicious link, I get the following output in Metasploit every time: * ...more
A lot of the websites today are not hosted on someones own little server, but at huge hosting companies like One.com, Hostgator and Godaddy.com. When using, for example, Nmap to scan one of these sites for vulnerabilities, it scans the huge servers, with very little chance of ...more
Imagine you gained access to someones Google and Outlook accounts. Cool, but of course not enough for an aspiring hacker that always wants more. How would you guys use this privilege to gain access to a victims computer or maybe phone? I keep walking around with the idea that ...more