0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How To Crack WPA/WPA2 Wi-Fi Passwords Using Aircrack-ng
By: Tejareddy
July 30, 2021

Aircrack-ng is a set of tools in Kali Linux that can be used to assess Wi-Fi network security. It is capable of monitoring (capturing packets), attacking, and cracking Wi-Fi networks. In this post, Aircrack-ng will be used to crack a password-protected WPA/WPA2 Wi-Fi network. Attack Prerequisites Kali Linux can be A) installed or B) used in the Live version through a ...

Data Privacy Good Privacy Governance and Controls
By: Muhammad Tariq Ahmed Khan
July 29, 2021

There has been a misconception about privacy that confuses many people. People tend to share seemingly related or unrelated personal information online, such as birthdays, addresses, contact details, marriage, and holiday plans on social media. People are also inclined to share pictures of favorite foods, people, localities, and workplaces, in addition to providing opinions on sensitive issues (religious, national, political, ...

Top 5 Intrusion Detection Systems
By: Nihad Hassan
July 29, 2021

As the digital transformation continues to move steadily, people become more dependent on technology. Nowadays, computerized systems are prevalent in all industries to manage resources and handle various business operations. Protecting these assets has become vital for the continued operations of any organization. Cyberthreats are evolving every day in terms of number and sophistication. Malicious actors are continuously looking for ...

What Is Regex And Why It's Important For Log Analysis?
By: Shimon Brathwaite
July 28, 2021

Regex stands for regular expressions, and it’s a means of searching a string of characters (text) for specific patterns. An easy way to understand this is the command “Ctrl + F” function on most computers. If you ever wanted to find a word in a long essay, you press command + F, and a small search box appears in the ...

Phishing Using Shellphish
By: gagan1999
July 28, 2021

What is a Phishing Attack? A Phishing Attack is a fraud that attempts to obtain sensitive information like usernames, Bank Account Numbers, credit card information, and passwords. Phishing is an example of a Social Engineering technique used to deceive users. The way phishing works is that an attacker clones a trusted website or spoofs an email of a known target, leading ...

Zero Trust Networks
By: Samia Oukemeni
July 27, 2021

As the demand for the cloud environment and remote work is rising, enterprise security becomes more challenging than ever. Zero-Trust concepts bring a new solution to move network defenses from static on-premises security to dynamic, identity-based access control to resources and bring down traditional security walls. Network Security in the Age of COVID-19 The events of 2020 and the COVID-19 have ...

THC Hydra: Cracking Router's Admin Login Password Revision
By: bachan
July 27, 2021

What is THC Hydra? THC Hydra is a password-cracking tool that supports a wide range of network protocols like FTP, LDAP, most HTTP methods like GET and POST, databases like MySQL, and much more. These functions make it a handy tool for network penetration testing. When it comes to credential brute-force attacks, Hydra is one of the most widely used ...

What Is Okta Advanced Server Access
By: Owen Dubiel
July 26, 2021

Oktas ASA (Advanced Server Access) is the necessary next step into properly securing both cloud and on-premise assets. Gone are the days of just securing the network perimeter; that network boundary has now expanded to the cloud. Symmetrically controlling access to all assets is essential to maintaining any enterprise's overall security posture. On top of effectively providing access centrally, it ...

The Effect Of COVID-19 On Secure Online Transactions
By: Nihad Hassan
July 26, 2021

The ongoing COVID-19 crisis has significantly changed how people live, work, and interact with each other. For instance, the massive shift of the workforce to remote working (from home) and enforcing social distancing policy by governments worldwide have impacted consumer buying habits during the pandemic and possibly forever. Using internet technologies to work, study, socialize, and buy products and services ...

The What, Why, And Who Of Threat Intelligence
By: Prasanna Peshkar
July 23, 2021

In the world of cybersecurity, the ability to predict imminent attacks even before they enter targeted networks can assist companies in prioritizing their responses and speed up the decision-making method and response period, giving better security collectively. This is why cyber threat intelligence was launched. Unknown enemies have seemingly unlimited resources, putting stress on security leaders to constantly evaluate every phase ...