0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

What Holds the Hacker's Heart? NetCat
By: Mr. Sirja
May 30, 2017

Hello, Cybrarians!Do you know what NetCat is?  We can say NetCat is the heart of the Hacker, Pentesters and Security ninjas. Well, it first surfaced in 1995 and it is one of the most popular and very lightweight Network Security Tools.Netcat lets computers transfer data with each other via TCP & UDP protocols.We'll learn some basic uses ...

Cyber Reality Crime Alert: Newly Identified Virus (NIV) Prevention
By: gangsters
May 29, 2017

According to reliable sources and research, and relevant case studies, it is ensured that there is a new virus that has appeared in cyberspace. It's a newly identified virus (NIV). It enters into a device through an internet connection with any type of contents and data. But normally, NIV doesn't harm the devices or systems ...

Lesson 1- Let's Learn Python!
By: jumb01
May 28, 2017

This series is going to teach you the concepts, and functions of the Python programming language, it will help you build an understanding of the language. Gradually we will base the series on security related issues, with the focus of ethical hacking and penetration testing. :~$ whoami Aslam Admani That's me!Well, why Python you ask? ...

History of Project Management
By: themindandbeauty
May 27, 2017

  An Introduction It is construction which we consider a general term handling the art and science of to configuring material or immaterial objects, systems or organizations and it is typically done on location for a known owner (Halpin, Daniel W.; Senior, Bolivar A., 2010) starting with planning, diagram, and fund to ...

UNM4SK3D: NSA, China, and Spotify
By: Olivia
May 26, 2017

#wannacry (again).  Break out the tissues, this report will make you 'WannaCry' some more. Following the most massive ransomware campaign, there were multiple warnings against subsequent attacks and hackers using the NSA exploits to their advantage. Those warnings were correct, but the reality is even more severe. As a refresher, WannaCry "exploited a ...

Why is the IoT a Threat to Internet Security?
By: Sean Mancini
May 26, 2017

The new wave of the internet is among us. We are now in the era of the “Internet of things," (IoT) sensors and devices that connect to the internet from your home IP.  Does your fridge have a computer component that tells you the weather? What about a fridge that can connect to your mobile phone ...

The Raison D’etre behind User Behavior: The Future of Cyber Security Analytics
By: dasabiro
May 26, 2017

The purpose of this article is to demonstrate an analytic maturity model through which cyber security experts/institutions can assess their progress in the use of user behavioral analytics to forge the thorough scrutiny in applying security postures that safeguard confidentiality, integrity and the availability of data to the right user primarily eliminating nuance.   ...

Hermes 2.0 Ransomware
By: Maundrey Wilton Kock
May 25, 2017

Ransomware viruses have become a popular tool used by cyber criminals to exploit their victims. Once the ransomware virus finds its way into your computer it encrypts all the data on the PC, and if you want your data decrypted you are required to pay a certain amount of money via Bitcoin.Cyber criminals have now moved their focus to ...

How Can ISP's Help with DDoS Mitigation?
By: Sean Mancini
May 25, 2017

We have seen it time and time again, DDoS attacks against organizations causing network interruptions and downtime. (What else is new?) These Organizations at times are hopeless at the hands of the attackers sometimes even for ransom. Think of a small or medium business with a 50Mbps internet connection that is getting attacked. What options ...

Applying Bogon Access Lists to Networking Gear
By: Sean Mancini
May 24, 2017

Hello all, Here is a little snippet of information on the importance of applying an access list to your edge router to IP blocks that are listed on the bogon list. What is the bogon list? The bogon list is a list of IP subnets that are either invalid non-routable IP blocks such as 192.168.0.0, ...