If anyone remembers the Stagefright exploit (CVE-2015-1538 I think) you would remember that it could potentially achieve root access by sending a corrupt video file to an android device running an un-patched version, with no user interaction required. My question is, has anyo ...more
White hack hackers do not infiltrate real systems unless performing penetration tests. However, since real world hacking is illegal and they don't participate in this, how do they know their skills are up to snuff if they aren't penetration testers? Have most of them even hack ...more
How can you do reconnaissance on smartphones? Can you banner grab versions by using malicious web servers to capture target info? Can you scan them like regular devices? Do they ever have ports open?
Are there any theoretical forms of encryption that cannot be cracked? With the advent of Quantum computers busting SHA-512 encryption in the blink of an eye (only partially exaggerated) are there theoretical algorithms or methods to encrypt data in a way that it cannot be crac ...more
Can you write articles for nullbyte and post them on your own personal sight, ornate articles written from your own and format them for nullbyte? Will there be site plagiarism conflicts, even if they come from the same author?
I remember reading about a penetration test where the testers went inside the HQ, plugged a device into the wall, labeled it as "IT DONT TOUCH" and then proceeded to connect to that device from a great distance to further attack the wifi network inside the building. Unfortunat ...more
Would anyone like to design an app or smartphone interface from which browsing this site from an iPhone device would be easier? I apologize for being needy, but the vast amount of free time I have I am always away from a computer, and unfortunately reading articles from an ide ...more
Are there legal methods to make money doing hacking related stuff besides penetration testing and writing software, etc?
Is there anyway you can get some practice doing an entire hack, beginning to end, as realistic as possible, simulated as realistically as possible without doing anything risky and immoral? If you set up your own Virtualbox you know the applications and services, whereas I'm lo ...more
Whenever I'm trying to work something out, the GATEWAY_PROBE_HOST not configured from the advanced options in metasploit always ruins my day. I'm assuming it's a gateway thing (obviously) so I set it from metasploit.com (why is this the default?) to my subnet 192.168.56.0. Aft ...more