The team behind the Pwn Plug, a little white box that can plug into any network and access it remotely, is at it again. This time, Pwnie Express is working for DARPA to create a hacking machine that looks like a power strip, cleverly called the Power Pwn. The device has wireless, ethernet and Bluetooth capabilities and can do a full-scale penetration test as well as bypass NAC and other security measures automatically. It has three modes: Evil AP, stealth mode and passive recon. In stealth mo...
Welcome back, my greenhorn hackers! Lately, much of the discussion here on Null Byte has revolved around evading detection and not getting caught hacking. Several of you have written me asking for a series on evading detection and forensics, and while I began a series 5 months ago on just that, we have changed hacking platforms from BackTrack to Kali, which has a much more highly developed forensic toolset.
Welcome back, my newbie hackers! Recently, I "upgraded" to Kali as my hacking platform, despite my preference for BackTrack. I did this reluctantly, primarily because new readers here could no longer download BackTrack from their site. I want to point out here that we all must keep in mind that with any software—or for that matter, any product—that is newer is not necessarily better.
Welcome back, my tenderfoot hackers! So many readers in the Null Byte community have been asking me questions about evading detection and hacking undetected that I decided to start a new series on digital forensics.
For over 20 years, a tiny but mighty tool has been used by hackers for a wide range of activities. Although well known in hacking circles, Netcat is virtually unknown outside. It's so simple, powerful, and useful that many people within the IT community refer to it as the "Swiss Army knife of hacking tools." We'll look at the capabilities of Netcat and how the aspiring hacker can use it.
There are a ton of cool features available on your Samsung Galaxy Note 2, but if you're a softModder, you can make your phone do just about anything.
Welcome back, my fledgling hackers! Over the years, we have examined multiple ways to own, exploit, or compromise a system. On the other hand, we have not spent a lot of time on denial-of-service (DoS) attacks.
With some of the groundwork out of the way in getting a Mac set up for hacking, it's time to start looking at toolboxes. Our first toolbox is Git, which will be used throughout future tutorials.
Welcome back, my fledgling hackers! In the first part of my series on Wi-Fi hacking, we discussed the basic terms and technologies associated with Wi-Fi. Now that you have a firm grip on what Wi-Fi is exactly and how it works, we can start diving into more advance topics on how to hack Wi-Fi.
Welcome back, my hacker apprentices! In recent weeks, the revelation that the NSA has been spying on all of us has many people up in arms. I guess I take it all in stride as I just assume that the NSA is spying on all of us—all of the time. Don't get me wrong, I don't condone it, but I know the NSA.
Never have another pick or hammer break on you again! This tutorial shows you how to use the most current version of the program Cheat Engine to hack all the items in your inventory to make them absolutely impervious to destruction.
After enabling disk encryption, creating encrypted disk images, installing KeePassX and iTerm2, and using Git with local repositories, the next step to getting your Mac computer ready for hacking is setting up a package manager that can install and update open-source hacking tools. There are multiple options to choose from, but Homebrew has a slight advantage.
With all of the bare-bones setup out of the way in our Mac for Hackers series, your Apple machine should be ready to run a significant amount of pentesting tools. We can pull tools from GitHub and compile them, we can pull dependencies or tools from Homebrew, we have both Python and Ruby. Everything is ready to go and now it's time to start building a toolbox on our local host.
Welcome back, my rookie hackers! Many newbie hackers focus upon the technical aspects of hacking and fail to give enough attention to social engineering. In fact, I would say that technical hacks should ONLY be attempted if social engineering attacks fail. Why bother spending hours or days trying to hack a password if someone will simply give it to you?
Here's something fun for the Null Byte community to do—a coding competition! This week, I wanted to get everyone involved by offering you all a nice library of possible program types to choose from and try to code. At the end of this competition, all of the submitted programs will be reviewed by the community and myself. The coder that receives the most votes will be dubbed THE BEST.
Michael-David BenDor demonstrates how an optical scanner voting machine can be hacked in under five minutes using everyday tools. So, if you want to rig the next election in Michigan, this is the video tutorial for you. Don't agree with the next popular president or governor? Then see how to hack and get around the presidential seal in the voting machine.
Is your laptop not holding a charge anymore? Don't buy a new one, hack the old one! Laptop batteries can cost upwards of a hundred dollars, but with new lithium batteries and some soldering tools, the new one works just as well. Watch this video computer circuitry tutorial and learn how to hack a dead laptop battery.
This video tutorial talks about browser exploitation. Particularly, it talks about tools, like BeEF, that can be used to hack known vulnerabilities within browsers and some cool frameworks that you can use to check the security of your own browser. To get started hacking your own browser, watch this how-to.
Use erasers to make a crafty casing that'll hide and protect your thumb drive. You will need two beveled pink erasers, a cutting board, a large chef's knife, a 1 gig USB flash drive, a pencil, a rotary tool, and a utility knife. This pink eraser USB drive is cute & useful.
Though the Google home page may appear simple, its search tool is anything but. This quick clip from the folks at CNET TV demonstrates a number of the search engine's most obscure and most useful features, all certain to help you to find your desired information more quickly. For specifics, and to get started using these great search hacks yourself, give this guide a look.
If you're new to the Bluetooth hacking world, here's a little background on using Linux BackTrack to hack a Bluetooh device: Linux Backtrack is a Live DVD device that offers security tools - like password crackers - that allow you penetrate networks.
Hacking the PSP requires some unique tools and procedures, including the infamous Pandora Batteries and Magic Memory Sticks. This video will show you how to hack both the fat and slim versions of the PSP with firmware version 5.03 and below. This will allow you to play all sorts of homebrew games, ROM's and other fun stuff on your PSP, expanding the uses of this tragically undersupported portable console. Now hack that baby! This should let you unbrick your psp 3000.
Welcome back, my novice hackers! As we saw in my first tutorial on Facebook hacking, it is not a simple task. However, with the right skills and tools, as well as persistence and ingenuity, nothing is beyond our capabilities.
This is a Piaip's and Cheat Engine hack for RC. Restaurant City is a Facebook game that allows you to create and manage your own virtual restaurant. Watch this video tutorial to learn how to hack Restaurant City: Garbage Guru trophy (11/15/09).
Welcome back, my budding hackers! With this article, I am initiating a new series that so many of you have been asking for: Hacking Web Applications.
In this clip, learn how to access the cool menu screens on your iPod that you never knew existed. This video will walk you through how to get to your 3rd generation iPod's cool colored LCD screen database. This hack is easy, doesn't require codes or tools and won't harm your device, so give it a try!
Restaurant City is a Facebook game that allows you to create your own restaurant. Watch this video to learn how to hack Restaurant City - rubbish hack (06/29/09).
Household Hacker brings you fun hack how to projects in a variety of areas: electronic hacks, computer hacks, pranks, etc. Search Household Hacker on WonderHowTo for more videos by this creator. In this video, learn how to mod a USB flash drive.
Welcome back, my fledgling hackers! In one of my recent articles, I showed you how to install BackTrack as a dual boot system on a Windows computer. In this tutorial, I will walk you through BackTrack, giving you a tour of the most salient features for the hacker-to-be.
Quartz Composer is a Mac program that helps you manipulated motion capture video, and you can hack your Xbox Kinect to send motion captured data to your Mac OSX. This tutorial shows you precisely how you can use the Kinect tools to pull this off!
Sometimes, in the course of playing virtual aquarium games, it becomes necessary to break the rules. Learn how with this cheater's guide, which demonstrates how to hack Happy Aquarium with the Charles Web Debugging Proxy tool.
Netstat (network statistics) is a command-line tool that displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics. It is available on Unix, Unix-like, and Windows NT-based operating systems. This video tutorial presents a basic introduction to working with the netstat tool. Determine whether you've been hacked with this how-to.
Netcat is a featured networking utility which reads and writes data across network connections, using the TCP/IP protocol.
NetBus—Swedish for NetPrank—is a Trojan horse application that will allow you to remotely control any Windows system that runs it (provided that system is not running anti-virus software). For more information, and to get started using the NetBus hacking tool for yourself, watch this video guide.
Foundstone Hacme Shipping is a web-based shipping application developed by Foundstone to demonstrate common web application hacking techniques such as SQL Injection, Cross Site Scripting and Escalation of Privileges as well as Authentication and Authorization flaws and how they are manifested in the code. Written in ColdFusion MX 7 using the Model-Glue framework and a MySQL database, the application emulates the on-line services provided by major shipping companies. This video will get you st...
Want to back up your stock HTC Evo 4G phone? Whether you're the owner of an HTC Evo 4G Android smartphone or just covet one, you're sure to enjoy this Evo owner's guide from HTC Evo Hacks, which presents a complete, step-by-step walkthrough of how to use the Nandroid backup & restore tool. For complete details, take a look!
When it comes to hacking guides, most are written from the perspective of a Linux user. There are a few outliers, but it's mainly Linux, which leads to the idea that Linux is the only OS that's viable for hacking. This couldn't be further from the truth. A properly set up Apple machine can do quite a bit of heavy lifting.
Looking to do a little Friendster account hacking? Well, this video will show you how to hack into anyone's Friendster account after getting their password. Friendster was Facebook before Facebook was around, and beleive it or not, people still use it! You'll need a little tool to do the work, which you can find here. After that, follow the steps and get into any Friendster account. Remember, hacking is illegal, so be responsible out there.
The Drug Enforcement Agency (DEA) has been purchasing spyware from the Milan-based Hacking Team and its US subsidiary Cicom USA since 2012. Public records reveal invoices between Cicom USA and the DEA that have ranged between $22,000 to $575,000 from 2012 to 2015.
Welcome back, my novice hackers! This new series on Bluetooth hacking was inspired by a recent episode of Mr. Robot (my favorite TV show). In episode 6, Eliot hacked the bluetooth keyboard of the police office in order to hack the prison and release his nemesis, Vera. This is just one of the many hacks we will explore in the series.