Categories
Uncategorized

Hijack Chromecasts on the Same Network with CATT to Display Images, Videos & More [CWL-075]



How to Control Chromecasts with CATT (Cast All The Things)
Full Tutorial: https://nulb.app/x4hej
Subscribe to Null Byte: https://vimeo.com/channels/nullbyte
Subscribe to WonderHowTo: https://vimeo.com/wonderhowto
Kody’s Twitter: https://twitter.com/KodyKinzie

Cyber Weapons Lab, Episode 075

Chromecast is a handy IoT device for broadcasting content to a nearby monitor or TV. Unfortunately, like most IoT devices, it’s also vulnerable to hijacking. On this episode of Cyber Weapons Lab, we’ll show you how hackers can use the Python script “Cast All the Things” to commandeer Chromecasts. By doing so, they can display images, videos, websites, messages, and more on whatever screen the Chromecast is connected to.

Chromecast Ultra: https://amzn.to/2SNLdLz
Chromecast 3rd Gen: https://amzn.to/2VcFSPi

To learn more, check out the article and more in-depth video on our website: https://nulb.app/x4hej

Follow Null Byte on:
Twitter: https://twitter.com/nullbyte
Flipboard: https://flip.it/3.Gf_0
YouTube: https://bit.ly/NullByteYT
Website: https://null-byte.com
Weekly newsletter: https://eepurl.com/dE3Ovb

Likes: 1

Viewed:

source

Categories
Uncategorized

Hacking QR Codes with QRGen to Attack Scanning Devices [CWL-114]



How to Use QR Codes to Hack Mobile Phones & Scanners
Full Tutorial: https://nulb.app/x4l5g
Subscribe to Null Byte: https://vimeo.com/channels/nullbyte
Subscribe to WonderHowTo: https://vimeo.com/wonderhowto
Kody’s Twitter: twitter.com/KodyKinzie

Cyber Weapons Lab, Episode 114

QR Codes are a fun way of scanning information with your mobile device on the go. However, this popular technique can be taken advantage of and used to inject malicious code and commands by a knowledgeable hacker. On this episode of Cyber Weapons Lab, we’ll introduce you to a malicious QR code generator called QRGen.

Do not attempt to scan any malicious QR codes with a scanner you don’t own. Only use for testing on your own devices and networks.

To learn more, check out the article: https://nulb.app/x4l5g

Follow Null Byte on:
Twitter: https://twitter.com/nullbytewht
Flipboard: https://flip.it/3.Gf_0
YouTube: https://bit.ly/NullByteYT
Website: https://null-byte.com

Likes: 4

Viewed:

source

Categories
Uncategorized

Use USB Rubber Ducky Scripts & Payloads on an Inexpensive Digispark Board [CWL-127]



How to Run Ducky Scripts on a Cheap Digispark Board
Full Tutorial: https://nulb.app/x4m0y
Subscribe to Null Byte: https://vimeo.com/channels/nullbyte
Subscribe to WonderHowTo: https://vimeo.com/wonderhowto
Kody’s Twitter: https://twitter.com/KodyKinzie

Cyber Weapons Lab, Episode 127

A USB Rubber Ducky is a handy device for hackers who have physical access to a target’s machine. A Digispark is an inexpensive microcontroller board alternative with a smaller but conspicuous form that’s just as effective. Today, we’ll show you how to use Ducky Scripts on a Digispark, on this episode of Cyber Weapons Lab.

Digisparks on Amazon:
– https://amzn.to/337Uyj3
– https://amzn.to/2OzIli5
– https://amzn.to/34jeZeA

Digisparks at Walmart:
– http://bit.ly/2qtdPhX
– http://bit.ly/37vhH2n
– http://bit.ly/2QGJEyb
– http://bit.ly/33dYnTS

To learn more, check out the article: https://nulb.app/x4m0y

Follow Null Byte on:
Twitter: https://twitter.com/nullbyte
Flipboard: https://flip.it/3.Gf_0
YouTube: https://bit.ly/NullByteYT
Website: https://null-byte.com
Weekly newsletter: https://eepurl.com/dE3Ovb

Likes: 0

Viewed:

source

Categories
Uncategorized

Use MITMf to Man-in-the-Middle Passwords Over Wi-Fi on Kali Linux [CWL-006]



How to Use MITM Framework to Capture Passwords Over Local Network
Full Tutorial: https://nulb.app/z476i
Subscribe to Null Byte: https://vimeo.com/channels/nullbyte
Subscribe to WonderHowTo: https://vimeo.com/wonderhowto
Kody’s Twitter: twitter.com/KodyKinzie

Cyber Weapons Lab, Episode 006

Networking is built largely on trust. Most devices do not verify that another device is what it identifies itself to be, so long as it functions as expected. In the case of a man-in-the-middle attack, we can abuse this trust by impersonating a wireless access point, allowing us to intercept and modify network data. This can be dangerous for private data, but also be fun for pranking your friends.

In this case, we’ll be intercepting and manipulating traffic from within a local area network, often times a Wi-Fi network connected to a wireless router. Keep in mind that a man-in-the-middle (MitM) attack still involves intercepting and modifying traffic, and without permission, this could be illegal depending on your jurisdiction.

MITMf (tool used) – https://github.com/byt3bl33d3r/MITMf

To learn more, check out the article: https://nulb.app/z476i

Follow Null Byte on:
Twitter: https://twitter.com/nullbytewht
Flipboard: https://flip.it/3.Gf_0
YouTube: https://bit.ly/NullByteYT
Website: https://null-byte.com

Likes: 1

Viewed:

source