Menu

Articles of @neoslab

All articles written by @neoslab
Conficker a Twelve Years Old Malware Attack Connected Objects
Conficker a Twelve Years Old Malware Attack Connected Objects

Twelve years after its creation Conficker malware is now attacking connected objects. The American firm Palo Alto Networks announces that it has detected [...]

ConfickerMalwareWormMicrosoftWindowsObjects
3 Million Let's Encrypt TLS Certificates Revoked Due to a Bug
3 Million Let's Encrypt TLS Certificates Revoked Due to a Bug

The Let's Encrypt certification authority was forced to revoke since March 4, 2020 more than 3 million Transport Layer Security (TLS) certificates due to a [...]

CertificateLet's EncryptServersValidationDomainTLS
500 Chrome Extensions Caught Stealing Data of Million Users
500 Chrome Extensions Caught Stealing Data of Million Users

500 Google Chrome extensions secretly uploaded private data from millions of users. The technique used by hackers, called malvertising, remains difficult to [...]

ChromeExtensionsMalvertisingVulnerabilityPhishingFraud
How to Install Arch Linux with LVM and LUKS Disk Encryption
How to Install Arch Linux with LVM and LUKS Disk Encryption

Arch Linux is an independently developed, x86-64 general-purpose GNU/Linux distribution that strives to provide the latest stable versions of most software by [...]

ArchLinuxLVMLUKSEncryptionDistro
Remote Network Penetration via NetBios using Linux and Samba
Remote Network Penetration via NetBios using Linux and Samba

A recent study carried out in December 2019 by French researchers shows that more than 60% of Windows systems using the NetBios service use a standard [...]

NetBiosLinuxWindowsSambaWorkGroupSMB
Hackers can Steal Data by Tweaking Monitors Brightness
Hackers can Steal Data by Tweaking Monitors Brightness

Israeli researchers at Ben-Gurion University detailed a method, dubbed Brightness, to steal data from computers by capturing brightness video changes of the [...]

ScreenCameraBrightnessVulnerabilityAir-GapInvisible
Discover Hidden Subdomains of a given Domain using Dnsmap
Discover Hidden Subdomains of a given Domain using Dnsmap

In this new tutorial we'll see how to find the subdomains of a given domain name using Dnsmap. Dnsmap is mainly meant to be used by pen-testers during the [...]

DnsmapScanningDNSNetworkdomainSubdomainBruteforce
Getting Started with Bettercap 2 on Ubuntu and Other Derived Distros
Getting Started with Bettercap 2 on Ubuntu and Other Derived Distros

In this new article we will see together how to get started with the Bettercap 2, the Swiss Army knife for WiFi, Bluetooth Low Energy devices, Wireless HID and [...]

ARPBettercapDNSNetworkPoisoningProxySpoofing
Microsoft Customer Support Exposed 250 Million User Records
Microsoft Customer Support Exposed 250 Million User Records

Conversations between company employees and customers around the world, which took place between 2005 and 2019, were exposed without the need of a password or [...]

DataleakMicrosoftBreachesCyber-SecurityFlaw
Snatch Restarts PCs in Safe Mode to Bypass Antivirus Detection
Snatch Restarts PCs in Safe Mode to Bypass Antivirus Detection

Unlike most ransomware, Snatch also steals files on infected networks. The authors of Snatch ransomware use a novel trick to evade antivirus software and [...]

RansomwareSnatchSafe ModeRDPVNCWebShell
752.000 US Birth Certificate Applications Exposed Online
752.000 US Birth Certificate Applications Exposed Online

Detected by the British company Fidus Information Security and revealed by TechCrunch, more than 752,000 copies of US birth certificates have been exposed on [...]

DataleakAWSFidusTechCrunchCivil Acts
Exploit Shellshock Vulnerability CVE 2014-6271 using Metasploit
Exploit Shellshock Vulnerability CVE 2014-6271 using Metasploit

A recent study from November 2019 shows that the security vulnerability called ShellShock CVE-2014-6271 discovered in 2014 would still be present on a large [...]

BashMetasploitOpenSSHShellshockVulnerability