0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Protect Your Network by "Thinking Like a Thief"
By: Bob
September 15, 2017

Protect  your network system: Kenya, like any other developed nation, is faced with increasing cyber security threats targeting core business functions for both the government and the private sector. Recent attacks on  Kenyan Banks, the Government tax collector, the IEBC systems, the rise of cyber bullying and the recent global attack by WannaCry ransomware, surely ...

Encryption is Everywhere
By: ginasilvertree
September 14, 2017

Encryption is everywhere (well, almost everywhere) around sensitive data in motion and, sometimes, sensitive data at rest. Without it, e-commerce transactions, government secrets and electronic medical records - and many other types of data - could not safely exist. Data is a precious resource in the electronic economy and, like every precious resource, it needs perpetual protection.As a member ...

3 Ways to Increase Office-365 Security
By: Sasha Radenovic
September 14, 2017

Cloud services are gaining popularity for some time, and one of the most popular office cloud services is Office 365, especially with SMB companies, and their main concern is security. Most of those companies do not have an Information Security Officer ( CISO ), just basic IT staff for administration and network issues. Microsoft's product and service set ...

Xerosploit – Toolkit to Perform MITM, Spoofing, DOS, Images Sniffing/Replacement, WD Attacks
By: BALAJI N
September 14, 2017

In this Kali Linux Tutorial, we are to work with Xerosploit. Xerosploit is a penetration testing toolbox whose objective is to perform the man in the middle attacks. It brings different modules that permit to acknowledge proficient assault and furthermore permits to do DOS attacks and port filtering.We can use this tool to perform DOS, MITM attacks, also the ...

Cloud Access Security vs Cloud Application Security
By: zerge
September 14, 2017

First, we need to differentiate between the public cloud and the private cloud: So, basically, the public cloud consists of cloud applications such as Office 365, Google Suite, Box.com, Dropbox, Salesforce, ServiceNow, etc. There are literally tens of thousands of cloud applications available. We call this Software as a Service (SaaS).On the other hand, a private cloud is when ...

How to Create a Netcat Replacement – Python Part 1
By: Jawady Muhammad Habib
September 13, 2017

Introduction: Netcat is the Swiss army knife when it comes to TCP/IP, a utility used to open network connections commonly integrated into a wide range of apps. Because of the ease of its adaptability and high performance, it exists in several operating systems as command line service to know the status of ports (the case of ...

Export Outlook PST To MBOX Thunderbird
By: kaleykd
September 13, 2017

It is really tough for a business runner to think about a change of the emailing programs. The trouble that appears during a change of an email application is a shift of all the emails from one emailing platform to other. Since there are various emailing applications but every business uses the email application which is easily manageable and ...

Identity Access Management Chapter 1
By: Gokmenduristi
September 12, 2017

Identity Access Management is one of the fastest growing business areas in the world. The Identity and Access management market is estimated to grow from USD 8.09 Billion in 2016 to USD 14.82 Billion by 2021, a Compound Annual Growth Rate (CAGR) of 12.9% between 2016 and 2021. Corporate companies are investing in this area because there are ...

Password Spraying: Are You Vulnerable?
By: Mike Ship
September 11, 2017

Password Spraying...Are You Vulnerable? Most cyber security professionals know and understand the traditional attacks on passwords (i.e. brute force, dictionary, keylogger, etc.). But for the most part, those of us outside of the pen-testing community think of password attacks as taking one user id and brute-forcing it with thousands of passwords. The problem with this particular attack method is ...

ITIL, PMP, or Both? Goal-Based Decisions
By: priyajatoliya
September 10, 2017

PMP or Project Management Professional Certification is an internationally recognized certification for project managers. It means professionals in the field of project management can reach to a greater height in their career with this certification in their portfolio. On the other hand, ITIL or Information Technology Infrastructure Library certification in the widely accepted professional framework in the field ...