0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

The Ultimate Breakup Guide: Bye-Bye Outlook
By: justin hansen
April 19, 2018

How to Break Up Outlook PST Files Easily: Complete Guide In today’s arena, digital communication has become more popular across the globe. Every individual or enterprises is using e-communication to share crucial information with the peoples or employees. Nowadays, email becomes an official way of communication between the peoples. The Microsoft Outlook is one of the most popular ...

Arpag - Python Automatic Exploit Tool
By: anilbaranyelken
April 19, 2018

Arpag - Automatic Exploit Tool arpag : In Turkish mythology magical word means. The tool name arpag has been selected because it has made the exploit process automatic. The Project has used Metasploit rc code and python requests module and python socket module.  Installation: git clone https://github.com/anilbaranyelken/arpag.git cd arpagpip install -r requests  Usage: arpag.py ...

Cybrary's TLDR on GDPR
By: Tatianna
April 18, 2018

GDPR - Let's do this... On May 25th, 2018 a new privacy law goes into effect across the European Union (EU). It is called GDPR or General Data Protection Regulation. Any company that does business in the EU is required to adhere to GDPR. As a cyber security company that has users all over the world, ...

Capture the Flag - Start Tr0lling
By: aisherwood
April 18, 2018

Overview Objective : Get Flag Tools used : netdiscover, nmap, nikto, wireshark, hydra, scp, a brain OVA Link - Original Post To start, we'll get the IP of the tr0ll VM. I usually just use netdiscover as follows:  Next, we can do a ...

New Cryptomix Variant, Works!
By: aepshavin
April 18, 2018

New Cryptomix variant and extension [.WORK] -Ransomware, in general, uses the same way as its distribution method, the conventional way of using spam email. Spread by email is still very useful because there are still many people who are easily deceived by email tricks, this reason why cybercriminals always repeat the same method continuously. Changes in Ransomware WORK Cryptomix: ...

The Resilience of Critical Infrastructures
By: Palita2018
April 17, 2018

2.4 What to Protect Against - Cyber Threats Wikipedia updated list: 0–9 A B C ...

Better Performance for MacBook Users
By: evavergis
April 17, 2018

One important piece of advice I can give mac users is to invest in a good quality USB type-C hub for your MacBook Pro for better performance. In other words, if you have an amazing engine and a nice looking exterior, what good it is if the car doesn't have wheels/tires to go anywhere? More and more people are ...

Your Intro to Capture The Flag (CTF)
By: clairvo
April 17, 2018

Welcome, to any enthusiastic cybrarian viewing this.I am a high school senior and my entire senior project is based on the world of CTF. In the following article, I will be translating the first section of my senior project documentation for everyone interested in getting a better understanding of CTF. 1.1. Introduction CTF ...

Improve Internet Security by Blocking Malicious Domains
By: Shaquib Izhar
April 16, 2018

What is this post about? In this post, I will show you how can you block all malware domain which hosts malicious code on their sites which can compromise your system or your browser by saving some bad cookies or malware on your computer, not only this it will also block ads and online tracking ...

Outlook is Back "In"? How to Bulk Convert MSG to PST
By: lukaswright
April 16, 2018

Are you looking to bulk import MSG files to Outlook 2016, 2013, 2010, 2007, and below editions? Then, download best MSG to PST Converter to combine multiple MSG files to PST with attachments . In this article, you will get the complete solution to convert MSG to PST without Outlook. Before moving on, let us ...