At this point in our series on creating a customized hacking container, you should be able to use Docker to save and retrieve customized instances of Ubuntu from your own machine. Make sure to revisit part one and part two if you need a refresher.
It's been little over a month since the official release of LG's latest flagship phone, the LG V20. Despite a few minor hiccups, the V20 has been attracting attention from all over for being an amazing phone. But like with most Android phones, there's no better feeling than rooting and taking complete ownership of it.
With the holidays over, a lot of people with shiny new Google Homes are getting their first chance to explore the new Google Assistant. Before the Google Home's release, the Assistant was only available for the Google Pixel and Pixel XL, or in a text-based form with Google Allo—but now it's gone mainstream.
With some of the groundwork out of the way in getting a Mac set up for hacking, it's time to start looking at toolboxes. Our first toolbox is Git, which will be used throughout future tutorials.
With the release of the Mirai source code, botnets are back in a big way. In the early days of botnets, zombies (infected hosts) would report to IRC (Internet Relay Chat) channels for CNC (command and control) instructions. Modern botnets have evolved, but they continue to use the same concepts as their predecessors.
This tutorial follows the same idea as my original tutorial for windows, but I've redone it to work with Mac OS X. Here's how to get a meterpreter session from your victim opening a malicious word document:
In this series you will learn how to use PHP to perform attacks, gather information, and setup backdoors. Along with performing attacks you will learn how to protect yourself from them. In this part you will learn about PHP as well as install Apache and PHP. What you'll need for this series
How's it goin'? In this tutorial, we will learn about the security issues of the popen and system functions. I've seen a few people attempting to run command line utilities or whatever it is they require with calls to these two functions but may not know the security implications which come along with it. I will show you using an example from the wargame IO Smash The Stack.
After seeing the title of this post from me, you might be thinking, "Why did The Joker made another post on a topic on which we already have a nice sticky post?"
I recently posted a Tutorial about setting up Dendroid: http://null-byte.wonderhowto.com/how-to/setup-dendroid-android-rat-0167299/. I have worked the last 5 days on getting the Dendroid Binder, given with the Dendroid Source, working. This solution only works on Windows systems!
Hello friends. This is actually my first how to.
Do you have a file (or many files) that, in the wrong hands, may cause you trouble? Don't worry about it, because I'll show you how to wipe it (or them) from your computer in order to leave no trace behind.
Hello Null-Byte community. First off: this my first post here on Null-Byte. Some of you may have already seen me in the comment section, to all others: Hi, I'm the new guy.
In this tutorial I will be explaining the purpose of unique encryption/decryption scripts ( I will be referring to these at "UEDS" for this tutorial). Then, I will show you how to make one. Finally I will talk about the downsides to the method I use. I will also provide links explaining the concepts and algorithms used in encryption to anyone who wants to see what is going on under the hood.
Cortana, Microsoft's voice-activated personal assistant, originally launch on Windows Phone, but is now built directly into Windows 10 complete with "Hey Cortana" voice search (take that, Apple). It can help you locate files, set up reminders, control music.
What Is IPython? IPython is a richly featured replacement for the standard python interpreter. It offers a wider range of functionality, that the standard
Welcome back my fellow hackers. Today I'm going to teach you how to preform an Idle Scan. You may be asking what is an Idle Scan. Its a very stealthy scan because you don't use your own ip you use a zombie (in computer terms).
Welcome back, my tenderfoot hackers! Those of you who have been reading my posts here for awhile know how much I emphasize good reconnaissance. Novice hackers often jump into a hack/exploit without doing proper recon and either fail or get caught. Experienced and expert hackers know that 70-80 percent of a good and successful hack is dependent upon successful and accurate reconnaissance.
Welcome to the first chapter of Excel is Simple, a place where we will burst all myths around excel and try to make it simpler and fun to use.
One feature of Samsung devices that's less useful than I had expected is S Voice, the voice assistant that ships with all new Galaxy devices. The voice is annoying, the features are lacking, and it's an all around subpar product. With Google Now, Siri, and now Microsoft's Cortana, Samsung needs to really step up their game—even on the new Galaxy S5.
For over 20 years, a tiny but mighty tool has been used by hackers for a wide range of activities. Although well known in hacking circles, Netcat is virtually unknown outside. It's so simple, powerful, and useful that many people within the IT community refer to it as the "Swiss Army knife of hacking tools." We'll look at the capabilities of Netcat and how the aspiring hacker can use it.
As you may have noticed, many of our tutorials cover topics that require you to have root access. When your phone is rooted, backing up apps doesn't require you to connect to your computer, and installing custom ROMs lets you get more useful settings. Rooting also lets you get rid of the Sense-style menus and status bar, and even upgrade to a newer version of Android.
Welcome back, my fellow hackerians! Today we'll be hacking Facebook profiles on your local network. You may think, "How is this useful, nobody but me is using my network." Well, you can use this on other Wi-Fi networks that are available for free (like at Starbucks) and crack their precious Facebook profile!
Being politically correct on social media sites is super boring. I've had my fair share of rage tweets and angry Facebook posts with some colorful wording, but sometimes using and F-bomb just gets the point across better. Now that Facebook is pushing out their new Graph Search, it might be time to clean up your profile. FaceWash is a web app that searches your Facebook profile for common bad words. You will need to give the app permission to access all of your wall posts (or course). Once acc...
When I left off on our last hack, we had hacked into the ubiquitous Windows Server 2003 server by adding ourselves as a user to that system so that we can return undetected at any time. The problem with this approach is that a sysadmin who is on their toes will note that a new user has been added and will begin to take preventative action.
This is a video tutorial describing how to build an outdoor couch for your porch. First measure out where you want to put your outdoor couch onto your porch. Then start building the first post. You should use concrete block to build this post. Then build out from the post the back wall of the couch with more concrete blocks. Then build the other post. Then stack the second course onto the first course. Then add the third course to the top of the second course. If you want then you can add a f...
If you pay attention to the top left corner of this video, you'll get to look at the commands for each of Freddy Krueger's fatalities in the new DLC available for Mortal Kombat 9. The last fatality the Achievement Hunters demonstrate is the horrifying 'Babyality.'
The newest Mortal Kombat 9 introduced Rain into the tournament and he has several gruesome fataliites. Take a look at the top left corner for the commands as the Achievement Hunter team gives us a look at each of them.
A recent addition to Mortal Kombat 9 in the form of DLC has reintroduced several classical features of Scorpion, Sub-Zero, and Reptile including some of the more traditional fatalities. Take a look at this video from the Achievement Hunter team and watch for the commands necessary to perform each of these violent attacks.
Watch this video to learn how to update your LG GT540 to Android 2.3.2 using this folder, these fastboot drivers, LG drivers, fastboot and kdz updater. Learn all of the commands for installing Android 2.3.2 on an LG GT540.
Use Iron Trapdoors and redstone to make a moving bridge in Minecraft. This video has specific, easy to follow instructions for building a moving bridge. Watch and learn how to replicate this clever bit of Minecraft engineering with single player commands.
What's your Minecraft world's landscape missing? An enormous creeper maybe? Check out this video to learn how to build a huge creeper in Minecraft. This technique suggests installing the Single Player Commands mod and Too Many items mod for Minecraft beta 1.6
There's safety in numbers. Protect yourself as you explore the unpredictable world of Minecraft with a pack of wolves. You can use bones to tame wolves and keep them as your pets. Minecraft is a lot safer when you have a pack of wolves who do whatever you command.
Are you playing Minecraft on a Mac? Would you like more functions and better performance from chat? Check out this video, you'll need to download Modloader and improved chat. You'll be able to bind keys, so that your most used commands are only a single keystroke away!
Hiding icons from the system tray is easy, but what if you want to get rid of the program entirely? This tutorial shows you how to use the command prompt in Windows to create a service that will allow to delete all extraneous programs.
If you've learned other programming languages, you're likely already familiar with the break and pass flow control commands when programming loops. This video shows you how to use them when writing code in Python, and also how to use the continue trick in your program.
Destroy everything on the map! This tutorial shows you how to defeat the army of crabs, without ever being able to summon the Mama Crab. The solution, of course, is as many explosives and bombs as you can fit onto a rocket.
The less time you spending futzing with your mouse, the more time you can spend making music. Learn how to save time in Reason 5 with a number of useful keyboard shorcuts. Whether you're new to Propellerhead's virtual music studio application, Reason, or their newer DAW app, Record, you're sure to find much to take away from this brief, official video software tutorial.
You will need to be playing Fallout: New Vegas on the PC, and make sure that you have enabled the console. This is not a mod, but you will need to enter a few console commands in order to get the enclave power armor.