Menu
background

Protecting. Defending. Responding to Incidents.

NeosLab Experts Help You Stay Protected since 2005

Popular Categories

Getting Started with Bettercap 2 on Ubuntu and Other Derived Distros
Getting Started with Bettercap 2 on Ubuntu and Other Derived Distros

In this new article we will see together how to get started with the Bettercap 2, the Swiss Army knife for WiFi, Bluetooth Low Energy devices, Wireless HID and Ethernet [...]

Sniffing/SpoofingARPBettercapDNSNetworkPoisoningProxySpoofing
Microsoft Customer Support Exposed 250 Million User Records
Microsoft Customer Support Exposed 250 Million User Records

Conversations between company employees and customers around the world, which took place between 2005 and 2019, were exposed without the need of a password or any [...]

Latest NewsDataleakMicrosoftBreachesCyber-SecurityFlaw
Snatch Restarts PCs in Safe Mode to Bypass Antivirus Detection
Snatch Restarts PCs in Safe Mode to Bypass Antivirus Detection

Unlike most ransomware, Snatch also steals files on infected networks. The authors of Snatch ransomware use a novel trick to evade antivirus software and encrypt the victims' [...]

Latest NewsRansomwareSnatchSafe ModeRDPVNCWebShell
752.000 US Birth Certificate Applications Exposed Online
752.000 US Birth Certificate Applications Exposed Online

Detected by the British company Fidus Information Security and revealed by TechCrunch, more than 752,000 copies of US birth certificates have been exposed on the Internet.

Latest NewsDataleakAWSFidusTechCrunchCivil Acts
Exploit Shellshock Vulnerability CVE 2014-6271 using Metasploit
Exploit Shellshock Vulnerability CVE 2014-6271 using Metasploit

A recent study from November 2019 shows that the security vulnerability called ShellShock CVE-2014-6271 discovered in 2014 would still be present on a large number of servers.

MetasploitBashMetasploitOpenSSHShellshockVulnerability
YouTube Channel
Click me to go to channel!

Watch us on YouTube

Learn Ethical Hacking and Cyber-Security from Information Gathering, Exploitation, Forensics, Network Scanning, Sniffing, Spoofing, Cracking and much more.