0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

XFS File System - RHEL7
By: saurabh1809
April 20, 2018

Linux works with a very secure file system which is known as ext, but in spite of that, it provides another file system like XFS. Today will explain how it works, and what unique features it has. One of the many questions people often ask is, if Linux has many file systems, then why would we use XFS? Let's take ...

Cyber Security Utilities: SysInternals
By: kunalgupta007
April 20, 2018

I would not be surprised if you didn't have any idea about Microsoft "Sysinternals." But it is not something that you should miss if you're working in Security/Networking/Linux as an Administrator.Why Sysinternals?I know, it is good to know all CMD Commands, but sometimes you may get confused between commands. If you're a beginner, then you have yo learn them, right?So here SysInternal comes ...

Read Yahoo Mail in Outlook – Migration Tips
By: techalphy
April 20, 2018

Are you looking for a solution to access Yahoo mail in Outlook 2016 in an efficient way? If yes, you are at the right place as we come up with different ways to configure Ymail in MS Outlook 2007/ 2010/ 2013/ 2016. Here, we will discuss all reasons to sync Yahoo email with Outlook ...

The Ultimate Breakup Guide: Bye-Bye Outlook
By: justin hansen
April 19, 2018

How to Break Up Outlook PST Files Easily: Complete Guide In today’s arena, digital communication has become more popular across the globe. Every individual or enterprises is using e-communication to share crucial information with the peoples or employees. Nowadays, email becomes an official way of communication between the peoples. The Microsoft Outlook is one of the most popular ...

Arpag - Python Automatic Exploit Tool
By: anilbaranyelken
April 19, 2018

Arpag - Automatic Exploit Tool arpag : In Turkish mythology magical word means. The tool name arpag has been selected because it has made the exploit process automatic. The Project has used Metasploit rc code and python requests module and python socket module.  Installation: git clone https://github.com/anilbaranyelken/arpag.git cd arpagpip install -r requests  Usage: arpag.py ...

Cybrary's TLDR on GDPR
By: Tatianna
April 18, 2018

GDPR - Let's do this... On May 25th, 2018 a new privacy law goes into effect across the European Union (EU). It is called GDPR or General Data Protection Regulation. Any company that does business in the EU is required to adhere to GDPR. As a cyber security company that has users all over the world, ...

Capture the Flag - Start Tr0lling
By: aisherwood
April 18, 2018

Overview Objective : Get Flag Tools used : netdiscover, nmap, nikto, wireshark, hydra, scp, a brain OVA Link - Original Post To start, we'll get the IP of the tr0ll VM. I usually just use netdiscover as follows:  Next, we can do a ...

New Cryptomix Variant, Works!
By: aepshavin
April 18, 2018

New Cryptomix variant and extension [.WORK] -Ransomware, in general, uses the same way as its distribution method, the conventional way of using spam email. Spread by email is still very useful because there are still many people who are easily deceived by email tricks, this reason why cybercriminals always repeat the same method continuously. Changes in Ransomware WORK Cryptomix: ...

The Resilience of Critical Infrastructures
By: Palita2018
April 17, 2018

2.4 What to Protect Against - Cyber Threats Wikipedia updated list: 0–9 A B C ...

Better Performance for MacBook Users
By: evavergis
April 17, 2018

One important piece of advice I can give mac users is to invest in a good quality USB type-C hub for your MacBook Pro for better performance. In other words, if you have an amazing engine and a nice looking exterior, what good it is if the car doesn't have wheels/tires to go anywhere? More and more people are ...