Select Page

Author: Mirnes Halilovic

Hacking the Heartbleed Vulnerability

Welcome back, my greenhorn hackers!In recent weeks, the Heartbleed vulnerability of OpenSSL has been dominating the information security headlines. This vulnerability enables an attacker to extract data from the server’s memory that may contain authentication credentials, cookies, the servers private key, and personally identifiable info (PII) that could be used for identity theft. As a result, websites around the world have been scrambling to close this hole. Fortunately for us, many still have not, and many may never be closed. Basically, OpenSSL is an encryption library used in HTTPS (secure HTTP). The idea is that any data traveling over...

Read More

How to Hack Smartphones (Creating a Smartphone Pentesting Lab)

Welcome back, my novice hackers! More and more, the world is turning to and adopting the smartphone platform as the digital device of choice. People are not only using smartphones for voice communication, but also web services, email, SMS, chatting, social networking, photography, payment services, and so on. There are 2.6 billion smartphone subscriptions in the world today, and that is expected to grow to 6.1 billion by 2020 (there are 7.3 billion people on the planet, so nearly one smartphone per person). This means that the smartphone will become the target of choice for hackers, as it can...

Read More

How to Hack Windows 7 to See Whether Your Girlfriend Is Cheating or Not

Welcome back, my hacker apprentices! Several of you have written asking me how you can check on whether your boyfriend, girlfriend, or spouse is cheating on you, so I dedicate this tutorial to all of you with doubts about the fidelity of your spouse, girlfriend, or boyfriend. A Fair Warning Before I start, I want to point out that hacking into somebody’s computer is illegal in most countries. What might be the consequences for hacking into a friend’s or spouse’s computer? Kelly Terry, one of our Null Byte community members, has firsthand experience with her husband, who’s now paying...

Read More

Hack like a Pro: How to Find the Exact Location of Any IP Address

Welcome back, my tenderfoot hackers! Have you ever wondered where the physical location of an IP address is? Maybe you want to know if that proxy server you are using is actually out of your local legal jurisdiction. Or, maybe you have the IP address of someone you are corresponding with and want to make certain they are where they say they are. Or, maybe you are a forensic investigator tracking down a suspect who wrote a threatening email or hacked someone’s company. Now you can find the location of that IP address without a subpoena or search warrant....

Read More

How to Hack Windows Vista, 7, & 8 with the New Media Center Exploit

Welcome back, my tenderfoot hackers! Recently, Microsoft released a new patch (September 8, 2015) to close another vulnerability in their Windows Vista, 7, 8, and 8.1 operating systems. The vulnerability in question (MS15-100) enabled an attacker to gain remote access to any of these systems using a well-crafted Media Center link (MCL) file. As hackers, we need to take a multipronged approach to gaining access to a system. Gone are the days of MS08-067 that would basically allow you to remotely take control of any Windows XP, 2003, or 2008 system. Now we have to be more crafty to...

Read More

Sign up for premium Hacking Tutorials

ADVERTISE

Your ad can be here. Contact us: [email protected]

TNH FORUM

For more Premium Tutorials LIke