How to Use SUDO_KILLER to Identify & Abuse Sudo Misconfigurations

Null Byte « WonderHowTo-- Sudo is a necessity on most Linux systems, most of which are probably being used as web servers. While the principle of least privilege is typically applied, sudo misconfigurations can easily lead to privilege escalation if not properly mediated. Which brings us to SUDO_KILLER, a tool used to identify sudo misconfigurations … Continue reading How to Use SUDO_KILLER to Identify & Abuse Sudo Misconfigurations

Become an In-Demand Cybersecurity Pro with This $30 Training

Null Byte « WonderHowTo-- If you're an avid programmer or developer, your time is likely spent creating apps and perhaps the occasional website. And while these go-to coding endeavors are exciting and occasionally lucrative, more and more coding pros are turning to careers in cybersecurity and ethical hacking — thanks to the high pay, flexibility, … Continue reading Become an In-Demand Cybersecurity Pro with This $30 Training

Become a Data-Driven Leader with This Certification Bundle

Null Byte « WonderHowTo-- If you're interested in becoming an in-demand project manager or leader in today's data-driven world, you need to know more than just a few generic management strategies to lead teams and companies successfully. To land the best and most respected positions in the field, you're going to have to have an … Continue reading Become a Data-Driven Leader with This Certification Bundle

How to Configure Port Forwarding to Create Internet-Connected Services

Null Byte « WonderHowTo-- Ports allow network and internet-connected devices to interact using specified channels. While servers with dedicated IP addresses can connect directly to the internet and make ports publicly available, a system behind a router on a local network may not be open to the rest of the web. To overcome the issue, … Continue reading How to Configure Port Forwarding to Create Internet-Connected Services

This Extensive Adobe Design Training Is on Sale for Just $50

Null Byte « WonderHowTo-- If you want to be truly competitive and successful in the world of web and app development, it's not enough to simply know a handful of programming languages and coding platforms. Today's best sites and apps require pro-level graphics and user interfaces, and knowing how to work with a wide range … Continue reading This Extensive Adobe Design Training Is on Sale for Just $50

Become an In-Demand Salesforce Pro with This $25 Bundle

Null Byte « WonderHowTo-- As one of the world's largest and most powerful cloud computing platforms, Salesforce is used by countless companies to manage customer relations, deliver services, and innovate solutions to complex problems. So it should go without saying that if you want to be truly successful and competitive in virtually any business or … Continue reading Become an In-Demand Salesforce Pro with This $25 Bundle

Use Mitaka to Perform In-Browser OSINT to Identify Malware, Sketchy Sites, Shady Emails & More

Null Byte « WonderHowTo-- Web browser extensions are one of the simplest ways to get starting using open-source intelligence tools because they're cross-platform. So anyone using Chrome on Linux, macOS, and Windows can use them all the same. The same goes for Firefox. One desktop browser add-on, in particular, makes OSINT as easy as right-clicking … Continue reading Use Mitaka to Perform In-Browser OSINT to Identify Malware, Sketchy Sites, Shady Emails & More

How to Use Linux Smart Enumeration to Discover Paths to Privesc

Null Byte « WonderHowTo-- Privilege escalation is the technique used to exploit certain flaws to obtain elevated permissions relative to the current user. There are a vast number of methods out there to go from user to root on Linux, and keeping track of them all can be difficult. This is where automation comes into … Continue reading How to Use Linux Smart Enumeration to Discover Paths to Privesc

Master AWS with This Extensive $30 Training Bundle

Null Byte « WonderHowTo-- Cloud computing has come a long way since the days of simple online storage and server networking. Virtually every major company in the world now relies on complex cloud computing infrastructures to reach customers, innovate products, and streamline communications. Their reliance on advanced cloud computing platforms is only going to grow … Continue reading Master AWS with This Extensive $30 Training Bundle

How to Hack Wi-Fi: Automating Wi-Fi Hacking with Besside-ng

Null Byte « WonderHowTo-- Besside-ng is the hidden gem of the Aircrack-ng suite of Wi-Fi hacking tools. When run with a wireless network adapter capable of packet injection, Besside-ng can harvest WPA handshakes from any network with an active user — and crack WEP passwords outright. Unlike many tools, it requires no special dependencies and … Continue reading How to Hack Wi-Fi: Automating Wi-Fi Hacking with Besside-ng