0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Netcat Tool: 5 Most Common Usage with Examples
By: Jithin Aby Alex
March 22, 2018

Netcat is one of the most powerful and useful tool for testing and debugging the network and protocol connectivity.Though administrators use this tool for troubleshooting purposes, the attackers may use this for malicious intentions such as establishing a connectivity, transferring files, scanning ports etc.Netcat can act as in client-server mode as well. This tool is available for ...

How to Convert MSG to EML Format without Losing Information
By: angeljonson
March 22, 2018

In this post, we are going to explain how to convert MSG to EML format along with the respective attachments. So, if you want to export MSG files to EML format and finding a way then this article will help you a lot. Keep reading the article and get ...

Top security and privacy tool for internet security and privacy protection
By: Shaquib Izhar
March 21, 2018

 We all use internet in our day to day life for communication, file sharing,social networking and for lot of other reasons. But we are also aware of how privacy invasion is increasing day by day with increasing of Black Hats, even some sites also stores Cookies to track your online activity about ...

More Vendors, Greater Complexity
By: Olivia
March 21, 2018

We’re pleased to be partnering with Cisco for this blog. Scroll down to download the Cisco 2018 Annual Cybersecurity Report Professionals at organizations both large and small are facing many challenges each day as attackers adapt their techniques at a continuously faster pace. Often, what increases the risk of these external threats ...

Why is Ethical Hacking Necessary?
By: Olivia
March 20, 2018

For those outside of the cyber security community or those who are just entering it, there is often much debate about ethical hacking. Is it actually ethical? What exactly does ethical hacking entail? And, why is ethical hacking necessary?In this blog, I plan to answer those questions and shed light on why ethical hacking is needed now ...

Business Intelligence (BI): French
By: radouan2018
March 20, 2018

L’ informatique décisionnelle  (en anglais  business intelligence  ( BI ) 1  ou  decision support system  ( DSS )) est l'informatique à l'usage des décideurs et des dirigeants d'entreprises. Elle désigne les moyens, les outils et les méthodes qui permettent de collecter, consolider, modéliser et ...

Comptia’s New PenTest+ Certification
By: erussell
March 20, 2018

  I took the opportunity to take the CompTIA PenTest+ beta certification exam. CompTIA intends this to be a new vendor-neutral intermediate certification between CompTIA’s Security+ and the CompTIA Advanced Security Practitioner (CASP) . This certification sits alongside the CompTIA Cybersecurity Analyst (CySA+). Similar to other CompTIA exams, this exam consists of both multiple choice and performance-based ...

Support for Beginners: Linux OS for Android
By: tniromin2
March 20, 2018

Termux can be introduced as a pocket edition of Linux OS, and I am highly recommending this for both beginners and package developers. You may visit their site   <  HERE    > and you may learn a few basics and aid your self from < Here >This OS(apk)  has a 99% similarity of commands ...

Resources and Career Information for Hackers
By: ahmedxbrov
March 18, 2018

  Breakthroughs      There are too many breakthroughs, but we can limit them to several key concepts:1 - penetrate sites and servers and forums.     2. LAN penetration.     3 - hacking personal computers. First: hacking sites and servers and forums      If we want to expand in this concept of breakthroughs, we find that it is divided ...

Network Basics: Proxychains
By: odin00
March 18, 2018

To understand what proxychains are we first need to understand what a proxy server is.This is the definition according to Wikipedia:" A P roxy server  is a  server  (a computer system or an application) that acts as an  intermediary  for requests from  clients  seeking resources from other servers.  A ...