Null Byte

@NullByte

Hacking, hardware, programming and getting root. Follow us on Flipboard: or sign up for our weekly newsletter: .

Vrijeme pridruživanja: rujan 2011.

Tweetovi

Blokirali ste korisnika/cu @NullByte

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @NullByte

  1. 3. velj

    How to crack WPA2 passwords using the PMKID Hashcat attack.

    Poništi
  2. 2. velj

    Using ultra-low-cost hardware, we prove that it's easy to create a stealthy backdoor on a Mac to exfiltrate data.

    Poništi
  3. 2. velj

    The latest Cyber Weapons Lab is out. Learn about using the PMKID Hashcat attack on Wi-Fi networks.

    Poništi
  4. 1. velj

    Torrent web apps can be brute-forced and used to download a PowerShell script into the Windows 10 Startup directory, which embeds a persistent backdoor and immediately deletes itself when completed.

    Poništi
  5. 1. velj

    The old way has two big downsides, which are essential for Wi-Fi hackers to understand.

    Poništi
  6. 1. velj

    How to hack with Arduino: building macOS payloads for inserting a Wi-Fi backdoor.

    Poništi
  7. 31. sij

    Hacking Windows 10: How to hack uTorrent clients and backdoor the operating systems.

    Poništi
  8. 30. sij

    The latest Cyper Weapons Lab starts our small Arduino-based series on hacking Macs.

    Poništi
  9. 29. sij

    With a successful attack, our payload would be removed from the Startup directory, and a new TCP connection will be made to the attacker's system every time the Windows computer becomes idle.

    Poništi
  10. 29. sij

    By exploiting the trust a Mac gives its "preferred" Wi-Fi networks, a backdoor can be created with a Digispark USB payload, and the target's data can be sent to an ESP8266 webserver.

    Poništi
  11. 28. sij

    Bettercap has modules for sniffing networks after you connect to them.

    Poništi
  12. 27. sij

    How to hack Wi-Fi networks with Bettercap.

    Poništi
  13. 26. sij
    Poništi
  14. 26. sij

    The latest Cyber Weapons Lab shows how to use Bettercap to find weak Wi-Fi passwords for cracking.

    Poništi
  15. 25. sij

    To keep things simple, we're not installing anything extra, and we can just work with the Bluetooth tools that Kali Linux has by default.

    Poništi
  16. 24. sij

    To capture handshakes from both attended and unattended Wi-Fi networks, we'll use two of Bettercap's modules to help find weak Wi-Fi passwords.

    Poništi
  17. 24. sij

    Gathering information about the database can sometimes be just as important as an SQL injection.

    Poništi
  18. 24. sij

    BT recon: How to snoop on Bluetooth devices using tools in Kali Linux.

    Poništi
  19. 23. sij

    How to enumerate MySQL databases with Metasploit.

    Poništi
  20. 22. sij

    Our latest Cyber Weapons Lab is all about Bluetooth hacking:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·