0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

3-D Authentication
By: jeffcyber-2016
January 26, 2018

3-D Authentication by Jeff P. Godoy Executive Overview We are at war for the domination of cyberspace. Every day we as a nation are attacked literally millions of times, often by nation state cyber-terrorism. More and more cyber weapons are being added at a constant rate, often free to download ...

Data Privacy Day: Why Privacy Matters
By: Olivia
January 25, 2018

It’s not easy to ignore headlines regarding GDPR and the passing of FISA for another six years of warrantless surveillance. Both of these issues, among many being covered in the industry news, center around data privacy and the various laws that can affect your personal information. In fact, a recent survey from Deloitte indicates that 81% of ...

Cyber Insurance as a Way to Protect Your Data from Hacker Attacks
By: Juliebradley
January 25, 2018

Globalization has become a trend of the 21st century. The positive side of this process is an increase in international trade, an increase in the scale and pace of capital movements, the emergence of 24-hour real-time global financial markets. This was largely due to modern technologies and the Internet. They allowed overcoming the ...

Google Dorks
By: Sahad Mk
January 25, 2018

Google dorks are a boon for hackers. A Google dork helps you find sensitive information like login pages, server configurations and even passwords (may or may not be valid). Google dorks are based on Google hacking - not hacking Google - and it's using advanced searching operators such as inurl, file type, etc. Google dorks are helpful in penetration testing ...

New Entrophy Tool
By: Sean Mancini
January 24, 2018

I have posted before about the importance of a truly random number generator. I created a very simple tool that I am still building. It takes physical sources of entropy and other software sources of randomness and produces hashes and random numbers that can be used for many different applications.My goal is to make this as simple as possible - no ...

Bitcoin and Cyber Security: Digital Frenemies
By: Olivia
January 23, 2018

It’s no secret that cryptocurrency has been taking the world by storm, with fast food chains leveraging Bitcoin as part of marketing campaigns to attract customers. Just this week, KFC unveiled the ‘Bitcoin Bucket’ in Canada, which sold out almost instantly. This ploy, while a clever tactic, points at the pervasiveness of the growing cryptocurrency trend, which ...

DHCP (Dynamic Host Configuration Protocol)
By: D3f3nd3r
January 23, 2018

DHCP (Dynamic Host Configuration Protocol) in Windows Server Environment It is a protocol used to provide IP addresses automatically to clients. DHCP server uses port no. 67and DHCP client uses port no.68. It is used in workgroup and domain as well. ...

Partitions of Active Directory
By: D3f3nd3r
January 22, 2018

There are four partitions in an active directory: SCHEMA PARTITIONIt is the place where domain controller stores the information’s of objects and their attributes by the help of schema master role. DOMAIN PARTITIONIt is the place of active directory database where the information’s of domains will be stored with the help of domain ...

Why Do You Need a VPN?
By: David Balaban
January 21, 2018

Virtual private networks, or VPN are in high demand now. More and more people access their confidential data using public networks. Therefore, the threat of theft of this data has substantially increased. Here's what you need to know about it. What does the VPN do? Virtual private networks provide ...

How to Evade AV with OWASP-ZSC - Part 1
By: mkrishna
January 20, 2018

Among the tools available to create shell-code capable of going undetected by  Anti-Virus (AV) software, OWASP-ZSC ( Z ero-day S hell C ode) may be the most versatile. Shellcode is basically instructions  that executed when the code is injected into a running application such SMB and other vulnerable services and applications. Buffer overflows are  most often ...