Open in app

Sign In

Write

Sign In

Null Byte
Null Byte

3.1K Followers

Home

About

Aug 7, 2019

How to Find Vulnerable Webcams Across the Globe Using Shodan

Search engines index websites on the web so you can find them more efficiently, and the same is true for internet-connected devices. Shodan indexes devices like webcams, printers, and even industrial controls into one easy-to-search database, giving hackers access to vulnerable devices online across the globe. …

Shodan

14 min read

How to Find Vulnerable Webcams Across the Globe Using Shodan
How to Find Vulnerable Webcams Across the Globe Using Shodan
Shodan

14 min read


Jul 31, 2019

How to Load Kali Linux on the Raspberry Pi 4 for the Ultimate Miniature Hacking Station

In 2019, the Raspberry Pi 4 was released with specs including either 1 GB, 2 GB, or 4 GB of memory, a Broadcom BCM2711B0 quad-core A72 SoC, a USB Type-C power supply, and dual Micro-HDMI outputs. Performance and hardware changes aside, the Pi 4 Model B runs Kali Linux just…

Raspberry Pi

8 min read

How to Load Kali Linux on the Raspberry Pi 4 for the Ultimate Miniature Hacking Station
How to Load Kali Linux on the Raspberry Pi 4 for the Ultimate Miniature Hacking Station
Raspberry Pi

8 min read


Jul 18, 2019

How to Set Up Network Implants with a Cheap SBC (Single-Board Computer)

With a cheap computer, smaller than the Raspberry Pi, an attacker can create a remote hacking device. The device can be attached to a target router without anyone’s knowledge and enable the hacker to perform a variety of network-based attacks from anywhere in the world. As the name infers, network…

Raspberry Pi

21 min read

How to Set Up Network Implants with a Cheap SBC (Single-Board Computer)
How to Set Up Network Implants with a Cheap SBC (Single-Board Computer)
Raspberry Pi

21 min read


Jul 12, 2019

Raspberry Pi Alternatives: 10 Single-Board Computers Worthy of Hacking Projects Big & Small

The $35 Raspberry Pi is an amazingly useful single-board computer (SBC) with a good balance of price, performance, and connectivity options. But for some projects, it just isn’t enough. Whether you need more computing power, a smaller size, or better machine-learning capabilities, there are other options available. For those unfamiliar…

Raspberry Pi

16 min read

Raspberry Pi Alternatives: 10 Single-Board Computers Worthy of Hacking Projects Big & Small
Raspberry Pi Alternatives: 10 Single-Board Computers Worthy of Hacking Projects Big & Small
Raspberry Pi

16 min read


Jul 9, 2019

How to Hunt Down Social Media Accounts by Usernames with Sherlock

When researching a person using open source intelligence, the goal is to find clues that tie information about a target into a bigger picture. Screen names are perfect for this because they are unique and link data together, as people often reuse them in accounts across the internet. With Sherlock…

Python

7 min read

How to Hunt Down Social Media Accounts by Usernames with Sherlock
How to Hunt Down Social Media Accounts by Usernames with Sherlock
Python

7 min read


Jun 28, 2019

Top 10 Browser Extensions for Hackers & OSINT Researchers

While modern browsers are robust and provide a lot of functionality, they can be unlocked to do some pretty spectacular things with browser extensions. For hackers and OSINT researchers, these tools can be used to defeat online tracking, log in to SSH devices, and search the internet for clues during…

Chrome

9 min read

Top 10 Browser Extensions for Hackers & OSINT Researchers
Top 10 Browser Extensions for Hackers & OSINT Researchers
Chrome

9 min read


Jun 18, 2019

How to Obtain Valuable Data from Images Using Exif Extractors

Metadata contained in images and other files can give away a lot more information than the average user might think. …

Programming

8 min read

How to Obtain Valuable Data from Images Using Exif Extractors
How to Obtain Valuable Data from Images Using Exif Extractors
Programming

8 min read


Jun 12, 2019

How to Discover & Attack Services on Web Apps or Networks with Sparta

Automating port scanners, directory crawlers, and reconnaissance tools can be complicated for beginners just getting started with Kali Linux. Sparta solves this problem with an easy-to-use graphical interface designed to simplify a penetration tester’s tasks. Sparta, authored by Antonio Quina and Leonidas Stavliotis, is a Python-based GUI application that automates…

Hacking

11 min read

How to Discover & Attack Services on Web Apps or Networks with Sparta
How to Discover & Attack Services on Web Apps or Networks with Sparta
Hacking

11 min read


Jun 10, 2019

Hacking macOS: How to Dump 1Password, KeePassX & LastPass Passwords in Plaintext

KeePassX, 1Password, and LastPass are effective against keyloggers, phishing, and database breaches, but passwords managers rely on the operating system’s clipboard to securely move credentials from the password vault to the web browser. It’s within these few seconds that an attacker can dump the clipboard contents and exfiltrate passwords. Two…

Security

7 min read

Hacking macOS: How to Dump 1Password, KeePassX & LastPass Passwords in Plaintext
Hacking macOS: How to Dump 1Password, KeePassX & LastPass Passwords in Plaintext
Security

7 min read


May 24, 2019

How to Control Network Traffic with Evil Limiter to Throttle or Kick Off Devices

If you find yourself with a roommate hogging limited data bandwidth with video games or discover a neighbor has invited themselves into your Wi-Fi network, you can easily take back control of your internet access. …

Networking

7 min read

How to Control Network Traffic with Evil Limiter to Throttle or Kick Off Devices
How to Control Network Traffic with Evil Limiter to Throttle or Kick Off Devices
Networking

7 min read

Null Byte

Null Byte

3.1K Followers

The aspiring white-hat hacker/security awareness playground

Following
  • Quinn Norton

    Quinn Norton

  • Amnesty International USA

    Amnesty International USA

  • Jonathan Singer

    Jonathan Singer

  • Asher Wolf

    Asher Wolf

  • Basil Enan

    Basil Enan

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech