NETLAS BLOG
Blog Posts
Guides, in-depth features overview & case studies.
Types of Cyber Crime: A Guide to Prevention & Impact
Ever spotted an email that just didn’t feel right? Or heard of someone’s personal details being stolen online? These are the realities of cybercrime, lurking in every corner of our connected world. This guide dives into the various types of cybercrime, their consequences, and practical prevention strategies to help you stay protected in the digital age.
- Maria Nezhivova
January 29, 2025 |
16 min read
Best Honeypots for Detecting Network Threats
Typically, this blog focuses on red-team tools designed for penetration testing. Today, however, we’re shifting gears to explore the defensive side of cybersecurity: the fascinating world of honeypots.
- Maria Nezhivova
January 28, 2025 |
18 min read
Using Maltego with Netlas Module
Maltego is the best-in-class software for OSINT, reconnaissance, and investigation visualization. Combining data from many sources and visualizing the data obtained, greatly simplifies the process of exploration during the penetration test or incident investigation. One of its very important advantages is the ability to integrate any tool into Maltego and use it along with many others.
- Vyacheslav Makhrov
January 20, 2025 |
5 min read
Using theHarvester with Netlas
theHarvester is a free, open-source tool designed for gathering open-source intelligence (OSINT) from various online sources. Its functionality has been significantly enhanced with the integration of the Netlas API. This combination allows users to collect not only general information about a company but also detailed data about its network infrastructure.
- Vyacheslav Makhrov
December 27, 2024 |
5 min read
Using TLDFinder with Netlas
Developed by Project Discovery, TLDFinder is a potent tool that lets users find top-level domains (TLDs) and related subdomains. This guide provides a step-by-step tutorial on setting up TLDFinder on Ubuntu, configuring it with Netlas, and effectively using it for domain discovery and attack surface analysis.
- Vyacheslav Makhrov
December 23, 2024 |
7 min read
Netlas vs Fofa: Platforms Comparison
Below is a detailed technical comparison of two popular IoT search engine platforms: Netlas and Fofa. We evaluate their performance across three critical parameters: capabilities, data volume and relevance, and enterprise features. Which platform excels where, and how can you choose the one that best suits your needs?
- Vyacheslav Makhrov
December 18, 2024 |
20 min read
Netlas vs Shodan: Platforms Comparison
IoT search engines are essential tools for any red team specialist. With several solutions available on the market, each offering its own set of pros and cons. This article will review and compare two of them: Netlas and Shodan.
- Vyacheslav Makhrov
November 21, 2024 |
20 min read
Google Dorking in Cybersecurity: Techniques for OSINT & Pentesting
Google dorking is a must-know technique for uncovering hidden resources on the internet. In this article, we’ll explore how Google dorking can be leveraged in information security, examine practical examples, and introduce alternative techniques to enhance your cybersecurity toolkit.
- Vyacheslav Makhrov
October 8, 2024 |
14 min read
7 Tools for Web Penetration Testing
Web applications are now deeply embedded in our daily lives, often housing significant amounts of sensitive data, including personal information, financial details, and trade secrets. Therefore, securing these applications against cyberattacks is of paramount importance.
- Vyacheslav Makhrov
September 13, 2024 |
15 min read
Using DNS History in Cybersecurity
One of the most valuable data sources for an information security professional is DNS history. It plays a crucial role in building an attack surface, investigating phishing sites, conducting OSINT, and various other processes. In this article, we will explain how to easily retrieve DNS history for any domain and demonstrate straightforward methods for using this information to counter specific types of attackers.
- Vyacheslav Makhrov
August 30, 2024 |
14 min read