White Hat

How To: Configure Port Forwarding to Create Internet-Connected Services

Ports allow network and internet-connected devices to interact using specified channels. While servers with dedicated IP addresses can connect …

Linux

How To: Use the Koadic Command & Control Remote Access Toolkit for Windows Post-Exploitation

Koadic allows hackers to monitor and control exploited Windows systems remotely. The tool facilitates remote access to Windows devices via the …

Linux

How To: Exploring Kali Linux Alternatives: Set Up the Ultimate Beginner Arch Linux Hacking Distro with Manjaro & BlackArch

There's no doubt Kali has established itself as the most popular penetration distribution available. However, just because it's the fan favorite of …

Linux

How to Get More Blog Subscribers: 5 Techniques That Never Fail

0 Shares<p><b>5 Techniques That Never Fail to Bring Blog Subscribers</b><p>by Youness Bermime<p>The real currency in the blogging world isn’t the number of visitors …

Digital Marketing

How To: How Hackers Use Hidden Data on Airline Boarding Passes to Hack Flights

Millions of travelers pass through airports each day without understanding how powerful and insecure a boarding pass can be. Anyone can scan the …

Airlines

How To: Use the Cowrie SSH Honeypot to Catch Attackers on Your Network

The internet is constantly under siege by bots searching for vulnerabilities to attack and exploit. While conventional wisdom is to prevent these …

Linux

How To: Use the Chrome Browser Secure Shell App to SSH into Remote Devices

Many guides on Null Byte require using the Secure Shell (SSH) to connect to a remote server. Unfortunately for beginners, learning to use SSH can …

Linux

How To: Enable the New Native SSH Client on Windows 10

For years, PuTTy has reigned supreme as the way to establish a Secure Shell (SSH) connection. However, those days are numbered with the addition of …

Computer Hacking

Exploit Development: How to Read & Write to a Program's Memory Using a Format String Vulnerability

Format strings are a handy way for programmers to whip up a string from several variables. They are designed to save the programmer time and allow …

Programming

New Google Update Targets Link Spam & Other Unnatural Links?

For the past few days, I have been tracking webmaster forum chatter around another update that may have started around December 26th or so. The dates …

SEO

Israeli cybersecurity whiz takes aim against hackers

While it may sound cocky, the company has a track record that’s hard to beat.<p>Cyber hackers [illustrative]. (photo credit: REUTERS)<p>You wake up, go …

World News

How To: Linux Basics for the Aspiring Hacker: Using Ship for Quick & Handy IP Address Information

Whether you're white hat, black hat, or some shade in-between, navigating through a network is a core part of hacking. To do that, we need to be able …

Linux

Exploit Development: How to Manipulate Code Execution with the Instruction Pointer

The one thing that separates a script kiddy from a legitimate hacker or security professional is the ability to program. Script kiddies use other …

Linux

How To: Detect Misconfigurations in 'Anonymous' Dark Web Sites with OnionScan

Configuring onion services for the first time can be tricky. A surprising number of system administrators make seemingly trivial mistakes that …

Linux

WhiteHat Sentinel Source for Microservices, Google Assistant SDK updates, and Magic Leap One Creator Edition

WhiteHat Security has announced the addition of Sentinel Source for Microservices to its portfolio of static application security testing services. …

Augmented Reality

Your Network's Biggest Cyber Security Threat Isn't What You Think

The biggest threats are not from the outside - they are insider threats, both innocent and malicious.<p><i>What is the future of IT, and which technology is going to the rule the IT industry? originally appeared on Quora: the place to gain and share knowledge, empowering people to learn from others and</i> …

Cybersecurity

What Is The Future Of Information Technology?

<i>What is the future of IT, and which technology is going to the rule the IT industry? originally appeared on Quora:</i> <i>the place to gain and share knowledge, empowering people to learn from others and better understand the world</i>.<p><b>Answer by Jay Bazzinotti, studied at Framingham State University, on …

Quora

This is what it takes to be an ethical hacker

The perceived vision of a hacker – anti-social and geeky – is becoming increasingly inaccurate.<p>Modern hackers are social, curious, adaptable and …

Cybersecurity

Why Hackers Are in Such High Demand, and How They're Affecting Business Culture

White hat hackers bring value to organizations and help them defend against today's advanced threats.<p>News headlines often focus on the hackers who …

Cybersecurity

How To: Use SSH Local Port Forwarding to Pivot into Restricted Networks

SSH is a powerful tool with more uses than simply logging into a server. This protocol, which stands for Secure Shell, provides X11 forwarding, port …

Linux

How To: Exploit PHP File Inclusion in Web Apps

File inclusion can allow an attacker to view files on a remote host they shouldn't be able to see, and it can even allow the attacker to run code on …

Linux

Pay what you want for 65+ hours of in-depth ethical hacking training

Cybercriminals are getting smarter, and companies and individuals alike stand to lose in the event of a cyberattack. That's why demand for ethical, or white hat, hackers is skyrocketing. Skilled in the ways of breaching networks and stealing information, these experts use their knowledge for …

Ethical Hacking

How To: Log into Your Raspberry Pi Using a USB-to-TTL Serial Cable

Connecting to your headless Raspberry Pi on the go typically requires a network connection or carrying around bulky peripheral hardware like a screen …

Raspberry Pi

Woman arrested after yelling she'd kill everyone on Southwest flight

Officials say a woman has been arrested after trying to smoke on a Southwest flight from Portland to Sacramento, then shouting she was going to kill everyone on the plane.<p>In video obtained by CBS13 in Sacramento, the woman — identified as 24-year-old Valerie Curbelo of Sandy, Ore. — is shown …

Crime

The New FBI Agency Everyone Forgot – Did Adam Schiff Just Get Caught in an Elaborate Counterintelligence Sting?…

By now everyone is likely aware of the Fake News story run by CNN on Friday surrounding an email received by Donald Trump Jr. The email was part of …

Adam Schiff

How To: Use VNC to Remotely Access Your Raspberry Pi from Other Devices

With Virtual Network Computing, you don't need to carry a spare keyboard, mouse, or monitor to use your headless computer's full graphical user …

Raspberry Pi

This Is How Our Product Team Created a 90-Day Rolling Roadmap

I was looking for some inspiration. This was back in October 2016 and we were in planning mode. Our product teams at WhiteHat Security had spent most …

Product Management

How To: Install & Use the Ultra-Secure Operating System OpenBSD in VirtualBox

OpenBSD implements security in its development in a way that no other operating system on the planet does. Learning to use the Unix-like operating …

Linux

How to Use PowerShell Empire: Generating Stagers for Post Exploitation of Windows Hosts

PowerShell Empire is an amazing framework that is widely used by penetration testers for exploiting Microsoft Windows hosts. In our previous guide, …

Linux

How To: Use an SHA-256 Hash to Verify Your Downloads Haven't Been Modified

Any internet user will need to download files eventually, and most simply have faith that what they are downloading is trustworthy. This doesn't give …

Linux