0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Cracking less secure login password for beginners
By: Shaquib Izhar
January 11, 2018

This is beginner level post for learning how to hack less secured password of login page. For this I am going to use some router for cracking the password and of course Hydra to brute forceit.  What you need Kali Linux ( or any Linux distribution ...

Juliar - 2018 Guide to Running Juliar on your computer
By: Rattar
January 10, 2018

Hey Everyone,Happy New Year! We've been hard at work working on both Juliar.Future and Juliar BLUE that we decided to merge the two projects into one.The new Juliar inherits the new clean editor from Juliar BLUE. This means that Juliar doesn't depend on JavaFX anymore to run GUI. Instead, Juliar now uses browser to render the interface. ...

Become the Man-In-The-Middle with an Open Internet Proxy
By: sergiomitm
January 9, 2018

Ever wanted to manage a chunk of internet traffic? Whether you are learning to use network management tools or doing something more nefarious, having a test bed of traffic is an important tool. Follow this tutorial and you'll be the boss of more traffic than you can handle. I'm showing you how to create an open internet proxy with Squid. ...

A Cybrary Year in Review: 2017
By: Olivia
January 9, 2018

Like many of you, the Cybrary team is excited for the New Year ahead. A new year means new learning goals and a renewed sense of motivation to better yourself and your career. We’ll be the first to say, we’re excited about all the things we can achieve together, and we’re certain that Cybrarians are going to ...

Linux Cheatsheet
By: shantanurauthan
January 7, 2018

System Information  uptime = Show how long the system has been running. hostname = Shows system host name. hostname -I = Shows IP address of the host. date = Show current date and time. whoami = Who you are logged in ...

UNM4SK3D: Intel, AdThink, and GPS
By: Olivia
January 5, 2018

#meltdown   If you own a computer, you should be having a 'meltdown.' Recently disclosed are critical flaws 'Meltdown' and 'Spectre' that affect most computers worldwide via CPUs from Intel, AMD, and ARM, allowing hackers to access sensitive data.  Researchers from Google's Project Zero Team, Cyberus Technology, Graz University of Technology, the University of Pennsylvania ...

Bitcoin Security
By: Sean Mancini
January 5, 2018

If you have been hearing the news lately there has been a lot of media attention about Bitcoin. What is bitcoin?Bitcoin is a cryptocurrency that is digital and has no central body governing it which also means there are no middlemen such as banks or other financial institutions. Whatever your reasons for investing in the currency there are some things that ...

DMCA Defined and Described
By: Brian Scott Luke, MBA
January 4, 2018

One of the best benefits of The Digital Performance Right in Sound Recordings Act of 1995 (DPRSRA) was that DPRSRA created a public performance right for record companies, and their signed artists, in certain sound recordings when the content is broadcast by digital audio transmission. Previously, only songwriters and publishers enjoyed this performance right.  This new right is a limited ...

What is CISM and is the Certification Worth it?
By: Vikrant Saran
January 4, 2018

Certified Information Security Manager [CISM] is a certification meant for professionals involved in IT security management and governance. The certification is offered by Information Systems Council Audit and Control Association [ISACA], a global organization involved in imparting the best practice for information systems management.  Earning of CISM credential leads to career advancement because the CISM is ranked as ...

EML to PST Converter (Windows Live Mail to Outlook PST Conversion)
By: adambreowns
January 2, 2018

Email has been the important part of our day-to-day life. We just can’t live without email in this modern world. Whether you are an individual or an entrepreneur running an organization, you cannot even imagine smooth functioning of your business without email. Without email, every small task would have been complex in this world. Emails have widely been used ...