0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



DroopyOS Overview Objective : Get Flag OVA Link : https://www.vulnhub.com/entry/droopy-v02,143/ Tools used : netdiscover, nmap, nikto, metasploit, truecrack, veracrypt To start, I just ran a quick netdiscover to get the DroopyOS ...


2018 introduced more than just another calendar year because of the identification of an Advanced Persistent Threat (APT) campaign known as Dark Caracal... A cyber espionage campaign was discovered by the Electronic Frontier Foundation and the mobile security company Lookout. Dark Caracal targeted Android mobile devices from users in 20+ countries beginning in 2012. The ...


With high profile security breaches like Equifax, the publicity over data security, as well as the cost, has only continued to grow. According to The 2017 Cost of Data Breach Study from the Ponemon Institute, the global average cost of a data breach is $3.6 million, or $141 per data record.Businesses large and small have faced financial ruin and severe ...


What is Automation in CyberSecurity? CyberSecurity measures are protecting your digital assets. These days, nearly all data is stored digitally; data as small as your schedule to information, to your banking details are all found digitally. As the technical means of digital penatration are ever increaing, mere protection is not sufficient. It has ...


Netcat is one of the most powerful and useful tool for testing and debugging the network and protocol connectivity.Though administrators use this tool for troubleshooting purposes, the attackers may use this for malicious intentions such as establishing a connectivity, transferring files, scanning ports etc.Netcat can act as in client-server mode as well. This tool is available for ...


In this post, we are going to explain how to convert MSG to EML format along with the respective attachments. So, if you want to export MSG files to EML format and finding a way then this article will help you a lot. Keep reading the article and get ...


We all use internet in our day to day life for communication, file sharing,social networking and for lot of other reasons. But we are also aware of how privacy invasion is increasing day by day with increasing of Black Hats, even some sites also stores Cookies to track your online activity about ...


We’re pleased to be partnering with Cisco for this blog. Scroll down to download the Cisco 2018 Annual Cybersecurity Report Professionals at organizations both large and small are facing many challenges each day as attackers adapt their techniques at a continuously faster pace. Often, what increases the risk of these external threats ...


For those outside of the cyber security community or those who are just entering it, there is often much debate about ethical hacking. Is it actually ethical? What exactly does ethical hacking entail? And, why is ethical hacking necessary?In this blog, I plan to answer those questions and shed light on why ethical hacking is needed now ...


L’ informatique décisionnelle (en anglais business intelligence ( BI ) 1 ou decision support system ( DSS )) est l'informatique à l'usage des décideurs et des dirigeants d'entreprises. Elle désigne les moyens, les outils et les méthodes qui permettent de collecter, consolider, modéliser et ...