Cybrary Pro Day is here!

0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

HoneyBOT
By: rowabi
April 21, 2018

HoneyBOT is a medium interaction honeypot for windows. It is a fake device occurrence on our local network. The device works as a target for hackers and to get what they want from fake data on the device. This is great to learn how the hacker thinks and what his intent is with our device and data. Also, we can learn how ...

Protect Your PC from Attack in 4 Steps
By: iven
April 21, 2018

STEPS TO PROTECT WINDOWS COMPUTER FROM CYBER ATTACK I waked this morning and decided to write an article about most common issues that daily faced by IT employee and the average folk in there home, shop, etc. let's have a look about below chart I found it while I google ...

Advanced PDS: OST to PST Converter Solution
By: elinalima
April 21, 2018

Advanced PDS OST to PST Converter Software 10.5 full version for 2016/ 2013/ 2010/ 2007 Corruption issues of Outlook OST File are: Internal error of OST file (error code=0000000E) Error 8004011D-526-80040115-0 Service-specific error 0 (0×0) Error code 0x8004103b OST Internal error ...

XFS File System - RHEL7
By: saurabh1809
April 20, 2018

Linux works with a very secure file system which is known as ext, but in spite of that, it provides another file system like XFS. Today will explain how it works, and what unique features it has. One of the many questions people often ask is, if Linux has many file systems, then why would we use XFS? Let's take ...

Cyber Security Utilities: SysInternals
By: kunalgupta007
April 20, 2018

I would not be surprised if you didn't have any idea about Microsoft "Sysinternals." But it is not something that you should miss if you're working in Security/Networking/Linux as an Administrator.Why Sysinternals?I know, it is good to know all CMD Commands, but sometimes you may get confused between commands. If you're a beginner, then you have yo learn them, right?So here SysInternal comes ...

Read Yahoo Mail in Outlook – Migration Tips
By: techalphy
April 20, 2018

Are you looking for a solution to access Yahoo mail in Outlook 2016 in an efficient way? If yes, you are at the right place as we come up with different ways to configure Ymail in MS Outlook 2007/ 2010/ 2013/ 2016. Here, we will discuss all reasons to sync Yahoo email with Outlook ...

The Ultimate Breakup Guide: Bye-Bye Outlook
By: justin hansen
April 19, 2018

How to Break Up Outlook PST Files Easily: Complete Guide In today’s arena, digital communication has become more popular across the globe. Every individual or enterprises is using e-communication to share crucial information with the peoples or employees. Nowadays, email becomes an official way of communication between the peoples. The Microsoft Outlook is one of the most popular ...

Arpag - Python Automatic Exploit Tool
By: anilbaranyelken
April 19, 2018

Arpag - Automatic Exploit Tool arpag : In Turkish mythology magical word means. The tool name arpag has been selected because it has made the exploit process automatic. The Project has used Metasploit rc code and python requests module and python socket module.  Installation: git clone https://github.com/anilbaranyelken/arpag.git cd arpagpip install -r requests  Usage: arpag.py ...

Cybrary's TLDR on GDPR
By: Tatianna
April 18, 2018

GDPR - Let's do this... On May 25th, 2018 a new privacy law goes into effect across the European Union (EU). It is called GDPR or General Data Protection Regulation. Any company that does business in the EU is required to adhere to GDPR. As a cyber security company that has users all over the world, ...

Capture the Flag - Start Tr0lling
By: aisherwood
April 18, 2018

Overview Objective : Get Flag Tools used : netdiscover, nmap, nikto, wireshark, hydra, scp, a brain OVA Link - Original Post To start, we'll get the IP of the tr0ll VM. I usually just use netdiscover as follows:  Next, we can do a ...