Categories
Uncategorized

Intro to Programming with MicroPython for ESP8266 Boards [CWL-134]



How to Program Using MicroPython
Full Tutorial: https://nulb.app/x4vnm
Subscribe to Null Byte: https://vimeo.com/channels/nullbyte
Subscribe to WonderHowTo: https://vimeo.com/wonderhowto
Kody’s Twitter: https://twitter.com/KodyKinzie

Cyber Weapons Lab, Episode 134

Arduino is typically the way to go when first getting started programming microcontrollers. However, it’s not very beginner-friendly. Today, on this episode of Cyber Weapons Lab, we introduce you to MicroPython and teach you how to use it to program an ESP8266 such as a NodeMCU or D1 Mini.

To learn more, check out the article: https://nulb.app/x4vnm

D1 Mini Boards:
– Amazon: https://amzn.to/3bUYhWk
– AliExpress: https://s.click.aliexpress.com/e/DbUH1Fm0

NodeMCU Boards:
– Amazon: https://amzn.to/2PFNsyW
– AliExpress: https://s.click.aliexpress.com/e/K8rNxQ7Q

Micro-USB cables:
– Amazon: https://amzn.to/34M2mIa
– AliExpress: https://s.click.aliexpress.com/e/CEPitKaM

Breadboards:
– Amazon: https://amzn.to/2VLRoRX
– AliExpress: https://s.click.aliexpress.com/e/sZ1FWaiG

RGB LEDs:
– Amazon: https://amzn.to/2SYmS5q
– AliExpress: https://s.click.aliexpress.com/e/eUecjdzI

Follow Null Byte on:
Twitter: https://twitter.com/nullbyte
Flipboard: https://flip.it/3.Gf_0
YouTube: https://bit.ly/NullByteYT
Website: https://null-byte.com
Weekly newsletter: https://eepurl.com/dE3Ovb

Likes: 0

Viewed:

source

Categories
Uncategorized

Hacking QR Codes with QRGen to Attack Scanning Devices [CWL-114]



How to Use QR Codes to Hack Mobile Phones & Scanners
Full Tutorial: https://nulb.app/x4l5g
Subscribe to Null Byte: https://vimeo.com/channels/nullbyte
Subscribe to WonderHowTo: https://vimeo.com/wonderhowto
Kody’s Twitter: twitter.com/KodyKinzie

Cyber Weapons Lab, Episode 114

QR Codes are a fun way of scanning information with your mobile device on the go. However, this popular technique can be taken advantage of and used to inject malicious code and commands by a knowledgeable hacker. On this episode of Cyber Weapons Lab, we’ll introduce you to a malicious QR code generator called QRGen.

Do not attempt to scan any malicious QR codes with a scanner you don’t own. Only use for testing on your own devices and networks.

To learn more, check out the article: https://nulb.app/x4l5g

Follow Null Byte on:
Twitter: https://twitter.com/nullbytewht
Flipboard: https://flip.it/3.Gf_0
YouTube: https://bit.ly/NullByteYT
Website: https://null-byte.com

Likes: 4

Viewed:

source

Categories
Uncategorized

Use USB Rubber Ducky Scripts & Payloads on an Inexpensive Digispark Board [CWL-127]



How to Run Ducky Scripts on a Cheap Digispark Board
Full Tutorial: https://nulb.app/x4m0y
Subscribe to Null Byte: https://vimeo.com/channels/nullbyte
Subscribe to WonderHowTo: https://vimeo.com/wonderhowto
Kody’s Twitter: https://twitter.com/KodyKinzie

Cyber Weapons Lab, Episode 127

A USB Rubber Ducky is a handy device for hackers who have physical access to a target’s machine. A Digispark is an inexpensive microcontroller board alternative with a smaller but conspicuous form that’s just as effective. Today, we’ll show you how to use Ducky Scripts on a Digispark, on this episode of Cyber Weapons Lab.

Digisparks on Amazon:
– https://amzn.to/337Uyj3
– https://amzn.to/2OzIli5
– https://amzn.to/34jeZeA

Digisparks at Walmart:
– http://bit.ly/2qtdPhX
– http://bit.ly/37vhH2n
– http://bit.ly/2QGJEyb
– http://bit.ly/33dYnTS

To learn more, check out the article: https://nulb.app/x4m0y

Follow Null Byte on:
Twitter: https://twitter.com/nullbyte
Flipboard: https://flip.it/3.Gf_0
YouTube: https://bit.ly/NullByteYT
Website: https://null-byte.com
Weekly newsletter: https://eepurl.com/dE3Ovb

Likes: 0

Viewed:

source

Categories
Uncategorized

Use MITMf to Man-in-the-Middle Passwords Over Wi-Fi on Kali Linux [CWL-006]



How to Use MITM Framework to Capture Passwords Over Local Network
Full Tutorial: https://nulb.app/z476i
Subscribe to Null Byte: https://vimeo.com/channels/nullbyte
Subscribe to WonderHowTo: https://vimeo.com/wonderhowto
Kody’s Twitter: twitter.com/KodyKinzie

Cyber Weapons Lab, Episode 006

Networking is built largely on trust. Most devices do not verify that another device is what it identifies itself to be, so long as it functions as expected. In the case of a man-in-the-middle attack, we can abuse this trust by impersonating a wireless access point, allowing us to intercept and modify network data. This can be dangerous for private data, but also be fun for pranking your friends.

In this case, we’ll be intercepting and manipulating traffic from within a local area network, often times a Wi-Fi network connected to a wireless router. Keep in mind that a man-in-the-middle (MitM) attack still involves intercepting and modifying traffic, and without permission, this could be illegal depending on your jurisdiction.

MITMf (tool used) – https://github.com/byt3bl33d3r/MITMf

To learn more, check out the article: https://nulb.app/z476i

Follow Null Byte on:
Twitter: https://twitter.com/nullbytewht
Flipboard: https://flip.it/3.Gf_0
YouTube: https://bit.ly/NullByteYT
Website: https://null-byte.com

Likes: 1

Viewed:

source

Categories
Uncategorized

Use One-Lin3r to Quickly Generate Reverse Shells, Run Commands & More [CWL-167]



Get Our Premium Ethical Hacking Bundle (96% Off): https://nulb.app/cwlshop

How to Automate the Generation of Common One-Liners
Full Tutorial: https://nulb.app/x4oke
Subscribe to Null Byte: https://vimeo.com/channels/nullbyte
Subscribe to WonderHowTo: https://vimeo.com/wonderhowto
Nick’s Twitter: https://twitter.com/nickgodshall

Cyber Weapons Lab, Episode 167

One-liners are the result of taking multiple lines of code and combining and condensing them into a single executable line that a computer will use as instructions. They can be used for mundane tasks or they can be used by pen-testers, white-hat hackers, cybersecurity specialists, and the like to perform automated hacks, commands, and more. One-Lin3r is a Python tool that acts like a repository for commonly used one-liners, and it currently has almost 200 available to use. We’ll dig into this tool on this episode of Cyber Weapons Lab using the written Null Byte guide by drd_.

To learn more, check out the article: https://nulb.app/x4oke

Follow Null Byte on:
Twitter: https://twitter.com/nullbyte
Flipboard: https://flip.it/3.Gf_0
YouTube: https://bit.ly/NullByteYT
Website: https://null-byte.com
Weekly newsletter: https://eepurl.com/dE3Ovb

Likes: 0

Viewed:

source

Categories
Uncategorized

Use ARP-Spoofing to Intercept Passwords Over Wi-Fi Using Ettercap [CWL-061]



How to Attack Network Hosts & Intercept Passwords Over WiFi
Full Tutorial: https://nulb.app/z4g2l
Subscribe to Null Byte: https://vimeo.com/channels/nullbyte
Subscribe to WonderHowTo: https://vimeo.com/wonderhowto
Kody’s Twitter: https://twitter.com/KodyKinzie

Cyber Weapons Lab, Episode 061

Kali Linux comes with a lot of useful hacking tools by default. Today, on this episode of Cyber Weapons Lab, we’ll show you Ettercap, which allows a hacker to attack a network from within.

To be more specific, we’ll be using Ettercap to perform an ARP-spoofing attack. When successful, we can get traffic redirected to us instead of to the target user. With this, we can spy on their traffic, intercept and modify data with a man-in-the-middle attack, or create a denial-of-service attack to keep anything from reaching them.

To learn more, check out the article: https://nulb.app/z4g2l

Follow Null Byte on:
Twitter: https://twitter.com/nullbyte
Flipboard: https://flip.it/3.Gf_0
YouTube: https://bit.ly/NullByteYT
Website: https://null-byte.com
Weekly newsletter: https://eepurl.com/dE3Ovb

Likes: 1

Viewed:

source

Categories
Uncategorized

Use Kismet to Find & Monitor Nearby Wi-Fi Devices [CWL-002]



How to Watch Wi-Fi User Activity Through Walls
Full Tutorial: https://nulb.app/x48q4
Subscribe to Null Byte: https://vimeo.com/channels/nullbyte
Subscribe to WonderHowTo: https://vimeo.com/wonderhowto
Kody’s Twitter: twitter.com/KodyKinzie

Cyber Weapons Lab, Episode 002

Kismet can detect any nearby devices that use Wi-Fi, whether they are connected or not. This ability lets us scan the nearby area for both APs and client devices, and even watch small details about when a device or connection is in use. With this data, we can tell when people are home, what devices they own, and when they are using them.

You can grab a Panda PAU05 like we use in the video here: https://www.amazon.com/dp/B00EQT0YK2/?tag=whtnb-20

For dual-band monitoring (meaning 2.5 and 5 GHz), you can check out the PAU09 here: https://www.amazon.com/dp/B01LY35HGO/?tag=whtnb-20

To learn more, check out the article at: https://nulb.app/x48q4

Follow Null Byte on:
Twitter: https://twitter.com/nullbytewht
Flipboard: https://flip.it/3.Gf_0
YouTube: https://bit.ly/NullByteYT
Website: https://null-byte.com

Likes: 3

Viewed:

source