Menu

Articles of @neoslab

All articles written by @neoslab
MegaCortex Ransomware is now able to change Windows Password
MegaCortex Ransomware is now able to change Windows Password

Appearing on a growing number of networks during May 2019, MegaCortex ransomware seems to have evolved. It can now change the password of the current user [...]

MegaCortexCyber-AttackRansomWareVirusNetwork
The Bluekeep Exploit is back and is used to install Cryptominer
The Bluekeep Exploit is back and is used to install Cryptominer

Recently one Cyber-Security researcher discovered that the vulnerability BlueKeep was back and was used to install cryptominer remotely on compromised machines.

BlueKeepRDPCryptominerXMRMoneroWindowsVulnerability
Nemty Ransomware Expands Its Reach and Delivering Method
Nemty Ransomware Expands Its Reach and Delivering Method

The Nemty ransomware, initially detected in August 2019, has increased its reach by partnering up with the Trik botnet, which now delivers Nemty to compromised [...]

NemtyTrikBotnetWortrikUSBSkypeSMBRansomWare
French Police Removed RETADUP Malware from 850,000 PCs
French Police Removed RETADUP Malware from 850,000 PCs

The French Center for Combating Digital Crime, with the help of Avast Researchers, was able to dismantle a vast botnet of 850,000 machines during a large-scale [...]

CryptominerMalwareMoneroRetadumpWorm
NSA Exploits used by Worm-Cryptominer to Attack Systems
NSA Exploits used by Worm-Cryptominer to Attack Systems

Cyber-security researchers have discovered and analyzed a worm-cryptominer combo that uses a series of exploits to move sideways and compromise the devices of [...]

CryptominerEternalBlueExploitNSAPowershellPythonWorm
Google also stalking you on porn sites (Even in private browsing)
Google also stalking you on porn sites (Even in private browsing)

A study shows that Google use thousands of “trackers” on pornographic sites. In theory, the information collected is anonymous, but most platforms are very [...]

ExoclickFacebookGoogleJuicyAdsOraclePornWebxRay
Top 10 World's Most Notorious and Famous Hackers
Top 10 World's Most Notorious and Famous Hackers

Not all hackers are bad. There are good hackers called "white-hat" which use them skills to improve system security or either computer antivirus software [...]

WhiteHatGreyHatBlackHatHackersInfoSecHacking
How to use WebXray to Identify Domains collecting User Data
How to use WebXray to Identify Domains collecting User Data

Do you know that while you are browsing a website, you are mostly tracked by third parties who compile detailed records of your browsing behaviors.

DataleakGDPRPrivacyPythonSelenium
Identify Sensitive Information using Network Enumeration
Identify Sensitive Information using Network Enumeration

Enumeration is a process where the attacker establishes an active connection with the victim and try to discover as much attack vectors as possible.

DNSenum4LinuxLinuxNTPSMBSNMPWindows
Top 9 Browser Extensions used by Hackers and Pentesters
Top 9 Browser Extensions used by Hackers and Pentesters

Modern web browsers offer us a wide choice of options and features. But you may not know that it is possible to install extensions that will allow to do much [...]

ChromeFirefoxHackingPentestingSpoofingTracking
How to use DNS Poisoning to redirect users to Fake Website
How to use DNS Poisoning to redirect users to Fake Website

DNS poisoning, also referred to as DNS cache spoofing, is a form of computer security hacking in which corrupt DNS data is introduced into the DNS resolver's [...]

DNSEttercapNetworkPoisoningRoutingSniffingSpoofing
Inject arbitrary code during MITM attack using MITMf
Inject arbitrary code during MITM attack using MITMf

A MITM attack is an attack where the attacker secretly relays and possibly alters the communication between two parties that are directly communicating with [...]

DNSHTTPKeyloggerMITMMITMFSMBSSLSTrip