0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How to Create a Netcat Replacement – Python Part 1
By: Jawady Muhammad Habib
September 13, 2017

Introduction: Netcat is the Swiss army knife when it comes to TCP/IP, a utility used to open network connections commonly integrated into a wide range of apps. Because of the ease of its adaptability and high performance, it exists in several operating systems as command line service to know the status of ports (the case of ...

Export Outlook PST To MBOX Thunderbird
By: kaleykd
September 13, 2017

It is really tough for a business runner to think about a change of the emailing programs. The trouble that appears during a change of an email application is a shift of all the emails from one emailing platform to other. Since there are various emailing applications but every business uses the email application which is easily manageable and ...

Identity Access Management Chapter 1
By: Gokmenduristi
September 12, 2017

Identity Access Management is one of the fastest growing business areas in the world. The Identity and Access management market is estimated to grow from USD 8.09 Billion in 2016 to USD 14.82 Billion by 2021, a Compound Annual Growth Rate (CAGR) of 12.9% between 2016 and 2021. Corporate companies are investing in this area because there are ...

Password Spraying: Are You Vulnerable?
By: Mike Ship
September 11, 2017

Password Spraying...Are You Vulnerable? Most cyber security professionals know and understand the traditional attacks on passwords (i.e. brute force, dictionary, keylogger, etc.). But for the most part, those of us outside of the pen-testing community think of password attacks as taking one user id and brute-forcing it with thousands of passwords. The problem with this particular attack method is ...

ITIL, PMP, or Both? Goal-Based Decisions
By: priyajatoliya
September 10, 2017

PMP or Project Management Professional Certification is an internationally recognized certification for project managers. It means professionals in the field of project management can reach to a greater height in their career with this certification in their portfolio. On the other hand, ITIL or Information Technology Infrastructure Library certification in the widely accepted professional framework in the field ...

The Security Compliance Zombie
By: Mike Ship
September 9, 2017

The Security Compliance Zombie  I recently had the opportunity to view a   webinar   where the topic was how to stop what was referred to as “compliance zombies”. We have all ...

5 Things Every Organization Can Learn from the Equifax Breach
By: Olivia
September 8, 2017

By now you’ve most likely heard that the Equifax breach has hit 44% of the population in America, not to mention the consumers effected in the UK and Canada.In a statement released by Equifax Inc. (NYSE: EFX), which provides little detail other than to note that the impact of the breach reaches approximately 143 million ...

"My Cybrary Story" - Ryan W.
By: ginasilvertree
September 8, 2017

Recently, a Cybrary user named "Ryan W." posted some positive comments about Cybrary on one of our social media sites. I reached out to him and asked if he would share his "Cybrary Story." Here's what he wrote (and, no, we didn't pay him to say all these nice things!). I’m proud to say that I’ve been a member ...

Poor Patch Management - A Cyber Security Risk
By: TONY
September 8, 2017

The effects of poor patch management were brought to the fore with the global ransomware attack that affected over 150 countries and scores of organizations in the second quarter of 2017. The ransomware exploited a vulnerability in windows operating system. In all fairness to Microsoft, the operating system OEM, a patch to address this vulnerability had ...

UNM4SK3D: CIA, Dragonfly 2.0, and Siri
By: Olivia
September 8, 2017

#wikileaks  As expected, Wikileaks has added yet another leak to the Vault 7 collection, one that leaves Harry Potter fans speculating. This time, rather than being a hacking tool or surveillance method focused leak, this project focuses on a Missile Control System, complete with blueprints.  'Project Protego' as it's called, is a PIC-based missile ...