0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Six Essential Skills of a Project Manager in 2018
By: michaelwarne
March 24, 2018

Project Management is a tough nut to crack. If you are a Project Manager that means you should be quick like a bunny, clever like a fox and gentle like a dove. Other than that, you should have a certain set of skills and expertise to manage your team. In the void of these skills either you ...

DroopyOS
By: aisherwood
March 24, 2018

DroopyOS Overview Objective :  Get Flag OVA Link :  https://www.vulnhub.com/entry/droopy-v02,143/ Tools used : netdiscover, nmap, nikto, metasploit, truecrack, veracrypt To start, I just ran a quick netdiscover to get the DroopyOS ...

Dark Caracal and the "Bulkanization" of Malicious Tools
By: wfarighi
March 23, 2018

2018 introduced more than just another calendar year because of the identification of an Advanced Persistent Threat (APT) campaign known as Dark Caracal... A cyber espionage campaign was discovered by the Electronic Frontier Foundation and the mobile security company Lookout. Dark Caracal targeted Android mobile devices from users in 20+ countries beginning in 2012. The ...

Unraveling the Cyber Skills Gap & Talent Shortage
By: Olivia
March 22, 2018

With high profile security breaches like Equifax, the publicity over data security, as well as the cost, has only continued to grow. According to The 2017 Cost of Data Breach Study from the Ponemon Institute, the global average cost of a data breach is $3.6 million, or $141 per data record.Businesses large and small have faced financial ruin and severe ...

Bot Vs Bot (Attack Vs Defend)
By: Bharathram
March 22, 2018

  What is Automation in CyberSecurity? CyberSecurity measures are protecting your digital assets. These days, nearly all data is stored digitally; data as small as your schedule to information, to your banking details are all found digitally. As the technical means of digital penatration are ever increaing, mere protection is not sufficient. It has ...

Netcat Tool: 5 Most Common Usage with Examples
By: Jithin Aby Alex
March 22, 2018

Netcat is one of the most powerful and useful tool for testing and debugging the network and protocol connectivity.Though administrators use this tool for troubleshooting purposes, the attackers may use this for malicious intentions such as establishing a connectivity, transferring files, scanning ports etc.Netcat can act as in client-server mode as well. This tool is available for ...

How to Convert MSG to EML Format without Losing Information
By: angeljonson
March 22, 2018

In this post, we are going to explain how to convert MSG to EML format along with the respective attachments. So, if you want to export MSG files to EML format and finding a way then this article will help you a lot. Keep reading the article and get ...

Top security and privacy tool for internet security and privacy protection
By: Shaquib Izhar
March 21, 2018

 We all use internet in our day to day life for communication, file sharing,social networking and for lot of other reasons. But we are also aware of how privacy invasion is increasing day by day with increasing of Black Hats, even some sites also stores Cookies to track your online activity about ...

More Vendors, Greater Complexity
By: Olivia
March 21, 2018

We’re pleased to be partnering with Cisco for this blog. Scroll down to download the Cisco 2018 Annual Cybersecurity Report Professionals at organizations both large and small are facing many challenges each day as attackers adapt their techniques at a continuously faster pace. Often, what increases the risk of these external threats ...

Why is Ethical Hacking Necessary?
By: Olivia
March 20, 2018

For those outside of the cyber security community or those who are just entering it, there is often much debate about ethical hacking. Is it actually ethical? What exactly does ethical hacking entail? And, why is ethical hacking necessary?In this blog, I plan to answer those questions and shed light on why ethical hacking is needed now ...