Evidently Listed Search Results

Community Byte: HackThisSite, Realistic 4 - Real Hacking Simulations

We'd like this to be one of the last HTS mission announcements, at least for now. As soon as Null Byte finds a server to play with (anyone want to donate one?), we are going to start doing root the box competitions, which is like king of the hill, except you have to hack a server and maintain access. Each server will have numerous known security holes. But for now, back to the normal flow of things...

How To: Conceal a USB Flash Drive in Everyday Items

Technology in computers these days are very favorable to the semi-knowledgeable hacker. We have TOR for anonymity online, we have SSDs to protect and securely delete our data—we can even boot an OS from a thumb drive or SD card. With a little tunneling and MAC spoofing, a decent hacker can easily go undetected and even make it look like someone else did the hack job.

News: Advanced Cracking Techniques, Part 2: Intelligent Bruteforcing

Following the first part in this series on advanced cracking techniques, we are going to go over how we can intelligently crack passwords using the old-fashioned bruteforce method. These unique cracking techniques aren't widely used, because most crackers are Script Kiddies who have no idea what the concepts are behind cracking passwords, thus, word won't get around too quickly.

News: 2012 Film Festival Submission Deadlines

It's that time of year again, filmmakers... time to make your new year's resolutions. And no, I don't mean quit smoking or stop drinking - smoke and drink all you want SO LONG AS YOU FINALLY GET THAT FILM FINISHED AND SUBMIT IT TO A FESTIVAL OR TEN. Rajo has signed up for a withoutabox.com account and scoured the internet for the latest film festival submission deadlines just so he can clue you in to which ones are coming up soon - whatta guy. And just for fun (a.k.a. future reference), here'...

Weekend Homework: How to Become a Null Byte Contributor

We're officially seeking Null Byters on a weekly basis who would enjoy taking their time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job meant for anyone with the will to share knowledge. There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials...

Google Dorking: AmIDoinItRite?

What is Google Dorking? Well, simply put, "Google Dorking" is just an efficient way to utilise keywords in order to perform very specific searches on a given subject. In this case, one would look for websites/servers that are vulnerable to attacks or are configured improperly by using specific search criteria that should yeild results, should it find matches to known mistakes/errors in a website or webserver.

How To: Remotely Control Computers Over VNC Securely with SSH

VNC is a great protocol that you can use on Windows and Linux machines to remotely control computers. This is useful if you need to control your computer when away from home, help your grandma check her email, or help a client with a disk cleanup. VNC is secure in the sense that it requires authentication in order to make the connection, but after that, the data is sent over the internet unencrypted. This means that an attacker could sniff your traffic and snoop everything that's going on. Th...

UDP Flooding: How to Kick a Local User Off the Network

Only so much data can be passed through the network and to your computer's networking interfaces. This is limited by the amount of bandwidth you have. The more bandwidth you have, the faster your network connections will be. Not only this, but your transfers will be more parallel and distributed so that all of your speed isn't taken up by one transfer. When all of your bandwidth is sapped and unable to be used, this is called a denial of service, or a DOS.

News: Null Byte Is Calling for Contributors!

We're officially seeking Null Byters interested in teaching others! Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job meant for anyone with the will to share knowledge. There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials of any skill level, and anything you feel like...

Scrabble Challenge #18: Can You Win at Scrabble Rack Attack?

As touched upon in the past, knowing all of the possible words you can play is key to being a better Scrabble player. If you don't have the vocabulary, then you can't compete against the best of the best, and you'll never even get the chance to spar against professionals such as Nigel Richards, Joe Edley, Andrew Fisher, and Wayne Kelly.

News: 12 Easy Exploits to Raise Thief Skills in Skyrim

Here is the final part in Null Byte's series on mastering the skills in The Elder Scrolls V: Skyrim. We have already covered the slick and brutal methods to raise our Spellcasting and Combative skills. Skyrim's intelligent new leveling system has trumped the former methods of spamming repeated moves to raise levels quickly. Rather than casting a spell, or jumping up and down constantly, the new system requires that we use our skills in practice to get experience for them. This causes leveling...

News: 18 Easy Exploits to Raise Spellcasting Skills in Skyrim

The Elder Scrolls V: Skyrim set off a bang in the video game world this month. It will likely be video game of the year a few times over. Skyrim is another part to a series set in the fantasy world of Tamriel, a world filled with mystical creatures, folklore, and even its own history. It's quite the beatuiful and immersive experience. If you have not picked up the game yet, please do (my fiancée even plays!). Also, make sure to buy it new, so the hard working coders at Bethesda get the money ...

How To: Create a Custom Arch Linux Distro

Having a custom Linux distro can be the coolest thing ever. Most of you will probably be satisfied with any particular Linux distribution, but I know I'm not the only one out there who wants it to have custom configurations and programs preloaded while leaving the bloatware behind.

News: Google+ Pro Tips Weekly Round Up: Google+ Breaks News

Increasingly, I'm turning to Google+ as a source of news, and it looks like I'm not the only one. On Thursday, news of a small earthquake broke on both Twitter and Google+. One curious user, +Keith Barrett, decided to try and find out which social network was faster with the news. Turns out it was a tie. As Google integrates Google+ more closely with the rest of its services, and more users post relevant stories, I think we'll start to see Google+ as a place that can create and break stories,...

How To: Use the Enchantment Table in Minecraft

Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. For about the past month, the folks at Mojang have been leaking pre-releases of Minecraft 1.9 and they've added many exciting things. Additions to the game include: potions, new mobs, a new biome, new realms, and something called an enchanting table. I went over how potions work in one of my previous articles and, while they are fun to play with, boy are they confusing!

How To: How Cross-Site Scripting (XSS) Attacks Sneak into Unprotected Websites (Plus: How to Block Them)

XSS stands for cross-site scripting, which is a form of web-based exploitation that uses client-side vulnerabilities in a web page to execute malicious JavaScript codes. JavaScript is referred to as "cross-site" because it usually involves an external website containing the malicious code. That code is most commonly used to steal cookies with a website that the attacker created and hosted on another server. The cookies can then be used to escalate privileges and gain root access to someone's ...

News: The 7 Best Secret Features of iOS 5

Just installed the new iOS 5 on your iPad, iPhone or iPod touch? There's a lot of great features to check out and play around with. After messing around with it on my iPhone 4 for a few minutes, these seven additions caught my attention. Check them out below—and tell us what your favorite new features are in the comments below.

Scrabble Challenge #9: Can You Win the Losing Game on the Last Move?

The end game is a very important aspect of playing Scrabble. If you have just a few letters left on your rack and there are none left in the draw bag, but you're currently losing the game, you still might have a chance to win if you play your cards (er… tiles) right. No matter if you're playing a casual game at home with a friend or competing against diehards in club or tournament games, the scoring process at the end provides the same results.

News: Iconic Indie Game Publisher Interplay Struggles to Make a Comeback

For more than a decade, Interplay was arguably the best video game publisher in America. Their list of games is a who's-who of the most creative and forward thinking games of the '90s, including everything fromOut of This World to Alone in the Dark to Earthworm Jim to Descent. They've been around since 1983, but have fallen on hard times since 1997, when they became a public company. They were acquired by a French publisher who then went bankrupt. They were forced to close their internal deve...

How To: Use Cygwin to Run Linux Apps on Windows

You'll see a lot of Linux action going down here at Null Byte. We use Linux for hacking-related stuff because it provides a more relaxed programming environment, making it easy to write exploits and tools. Linux has many features Windows is lacking, such as full control over the OS right down to the Kernel and massive availability of mature, open source (read: free & tweakable) tools & projects.

How To: Manage Your Time Planning a Scavenger Hunt

When you're aiming to set up a scavenger hunt, you might be pondering how much time frame you are committing oneself to. It's a great thought, and one which does not have a single size that matches everyone's resolution. But this unique guideline will furnish the facts you need so that you can figure out just how long implementing a scavenger hunt or clue hunt will take. You might want to be aware of a small amount with regards to which variety of quest you are preparing. Is it a common scave...

News: Do Cats & Boobs Belong on Google+?

While using Google+, it's been apparent that there are two types of posters. There are the people who post thoughtful, serious posts about everything from tech to dealing with cancer. And then there are the meme propagators, the people who decide to rick roll others (ahem, +Bryan Crow), and constantly put up animated gifs. Sometimes they are the same people, and this is where it gets a little controversial.