Menu

Articles of @neoslab

All articles written by @neoslab
11 Best Linux Distros for Ethical Hacking and Pentesting 2020
11 Best Linux Distros for Ethical Hacking and Pentesting 2020

Linux is an extremely popular operating system for hackers. First of all, Linux's source code is freely available because it is an open-source Operating System (OS).

ParrotKaliBlackArchKodachiBackboxCainePentooSamurai
How to Extract Data from Windows Memory Dump using Volatility
How to Extract Data from Windows Memory Dump using Volatility

In terms of Digital Forensic, there are many tools that can be used to extract valuable and sensitive information directly from the memory (RAM) of a [...]

VolatilityMemoryRAMWindowsHashBitlockerDump
How Hackers Exploit BlueKeep Vulnerability on Windows Servers
How Hackers Exploit BlueKeep Vulnerability on Windows Servers

BlueKeep is a security vulnerability that was discovered in Microsoft's Remote Desktop Protocol implementation of Windows 2008 R2 and Windows 7

MoneroBlueKeepMetasploitReverseDumpWindows
How to Create a Keylogger for Linux using Python
How to Create a Keylogger for Linux using Python

Some recent studies estimate that between 100 to 150 million computers worldwide would be directly infected by at least one malware such as Trojan or Keylogger.

KeyloggerPythonKeystrokesEventsCrontabTrojan
Top 20 Most Used Hacking and Pentesting Tools
Top 20 Most Used Hacking and Pentesting Tools

Hacking Tools are programs and scripts that help hackers and security researchers find and exploit weaknesses in computer systems, web applications, servers and [...]

NmapMetasploitBurpsuiteWiresharkAircrackTORHashcat
Top 50 Hacking Terms Used in Cyber-Security
Top 50 Hacking Terms Used in Cyber-Security

One of the difficult part of writing and reading content about hacking and Cyber-Security is that it's a world full of jargon and technical terms.

CompilerDDoSDoxingKeyloggerRootkitZeroDay
How to use Ping Sweep to scan Networks and find Live Hosts
How to use Ping Sweep to scan Networks and find Live Hosts

In networking, a ping sweep is a network scanning method that can establish a range of IPs which map to live hosts. The most used tool to run a ping sweeps is fping.

NetworkScanningPingFpingGpingReconnaissance
Top 10 World's Most Notorious and Famous Hackers
Top 10 World's Most Notorious and Famous Hackers

Not all hackers are bad. There are good hackers called "white-hat" which use them skills to improve system security or either computer antivirus software companies.

WhiteHatGreyHatBlackHatHackersInfoSecHacking
How to use WebXray to Identify Domains collecting User Data
How to use WebXray to Identify Domains collecting User Data

Do you know that while you are browsing a website, you are mostly tracked by third parties who compile detailed records of your browsing behaviors.

DataleakGDPRPrivacyPythonSelenium
Identify Sensitive Information using Network Enumeration
Identify Sensitive Information using Network Enumeration

Enumeration is a process where the attacker establishes an active connection with the victim and try to discover as much attack vectors as possible.

DNSenum4LinuxLinuxNTPSMBSNMPWindows
Top 9 Browser Extensions used by Hackers and Pentesters
Top 9 Browser Extensions used by Hackers and Pentesters

Modern web browsers offer us a wide choice of options and features. But you may not know that it is possible to install extensions that will allow to do much more.

ChromeFirefoxHackingPentestingSpoofingTracking
How to use DNS Poisoning to redirect users to Fake Website
How to use DNS Poisoning to redirect users to Fake Website

DNS poisoning, also referred to as DNS cache spoofing, is a form of computer security hacking in which corrupt DNS data is introduced into the DNS resolver's cache.

DNSEttercapNetworkPoisoningRoutingSniffingSpoofing