Code a Dead Man’s Switch in Python 3 to Encrypt & Delete Files Whenever You Don’t Check In

Null Byte « WonderHowTo-- A dead man's switch is a fairly simple concept. If you don't perform a specific task before a set amount of time, it'll perform a specific action you set. They can be handy not just for hackers but for everyone who wants to protect themselves, someone else, or something tangible or … Continue reading Code a Dead Man’s Switch in Python 3 to Encrypt & Delete Files Whenever You Don’t Check In

Use Banner Grabbing to Aid in Reconnaissance & See What Services Are Running on the System

Null Byte « WonderHowTo-- As we've seen with other tools and utilities, administrators typically use certain things to do their job more efficiently, and those things are often abused by attackers for exploitation. After all, hacking is just the process of getting a computer to do things in unexpected ways. Today, we will be covering … Continue reading Use Banner Grabbing to Aid in Reconnaissance & See What Services Are Running on the System

How to Upgrade a Dumb Shell to a Fully Interactive Shell for More Flexibility

Null Byte « WonderHowTo-- One of the most exciting things as an ethical hacker, in my opinion, is catching a reverse shell. But often, these shells are limited, lacking the full power and functionality of a proper terminal. Certain things don't work in these environments, and they can be troublesome to work with. Luckily, with … Continue reading How to Upgrade a Dumb Shell to a Fully Interactive Shell for More Flexibility

Harness the Power of Big Data with This eBook & Video Course Bundle

Null Byte « WonderHowTo-- We're living in the age of Big Data. As the primary force behind everything from targeted marketing campaigns and online search algorithms to self-driving cars and even space exploration, massive sets of complex data stand at the heart of today's most exciting and important innovations. The Complete Big Data eBook & … Continue reading Harness the Power of Big Data with This eBook & Video Course Bundle

Protect Yourself Online While Upping Your Internet Productivity with This VPN

Null Byte « WonderHowTo-- We've all relied on the internet more than ever during this pandemic. But while you're staying safe at home, are you being safe and productive while surfing the web? That's where a trusty VPN comes in handy! With dozens of VPNs on the market, it can be hard to discern which … Continue reading Protect Yourself Online While Upping Your Internet Productivity with This VPN

How to Discover Hidden Subdomains on Any Website with Subfinder

Null Byte « WonderHowTo-- When approaching a target, having a precise and detailed plan of attack is absolutely necessary. One of the main goals is to increase the attack surface since the more opportunities there are for exploitation, the greater the chances of success. Subdomain enumeration is one method used to increase the attack surface, … Continue reading How to Discover Hidden Subdomains on Any Website with Subfinder

How to Brute-Force FTP Credentials & Get Server Access

Null Byte « WonderHowTo-- Hackers often find fascinating files in the most ordinary of places, one of those being FTP servers. Sometimes, luck will prevail, and anonymous logins will be enabled, meaning anyone can just log in. But more often than not, a valid username and password will be required. But there are several methods … Continue reading How to Brute-Force FTP Credentials & Get Server Access

How to Use Gtfo to Search for Abusable Binaries During Post-Exploitation

Null Byte « WonderHowTo-- GTFOBins and LOLBAS are projects with the goal of documenting native binaries that can be abused and exploited by attackers on Unix and Windows systems, respectfully. These binaries are often used for "living off the land" techniques during post-exploitation. In this tutorial, we will be exploring gtfo, a tool used to … Continue reading How to Use Gtfo to Search for Abusable Binaries During Post-Exploitation

How to Use Gtfo to Search for Abusable Binaries During Post-Exploitation

Null Byte « WonderHowTo-- GTFOBins and LOLBAS are projects with the goal of documenting native binaries that can be abused and exploited by attackers on Unix and Windows systems, respectfully. These binaries are often used for "living off the land" techniques during post-exploitation. In this tutorial, we will be exploring gtfo, a tool used to … Continue reading How to Use Gtfo to Search for Abusable Binaries During Post-Exploitation