0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How to Install a Cisco (IOS) Router On GNS3 VM
By: Parvez Ahmed
July 24, 2017

The blog is for the users who would like to simulate the router environment in GNS3VM irrespective of the vendors (Cisco, Juniper etc.) In my earlier blog, I explained how to install and configure the GNS3 VM and how to configure a device through a template (from GNS3 Marketplace). Today, we'll install a device on GNS3 VM ...

Black Hat 2017: Inside Look
By: Olivia
July 23, 2017

The History of Black Hat “From its inception in 1997, Black Hat has grown from a single annual conference in Las Vegas to a global conference series with annual events in Abu Dhabi, Barcelona, Las Vegas and Washington DC. It has also become a premiere venue for elite security researchers and the best security trainers ...

Cookies and Sessions
By: rithinskaria
July 21, 2017

Cookies and Sessions Sometimes, websites need to track the movement of visitors. They need to understand when a user is logged in. For example, when you log into Gmail and then navigate to the 'Compose Mail' web page of Gmail, it does not ask you to log in again. It 'remembers' that you are already logged in. Websites ...

UNM4SK3D: Ethereum, CIA, and IoT
By: Olivia
July 21, 2017

#heist Hide yo kids, hide yo cryptocurrency. It's been 2 weeks since we last reported on the Bithumb hack where over $1M USD in Bitcoin and Ethereum were stolen, but since that initial heist, there are two additional hacks to report.  A hacker who remains unknown has stolen over $32M in USD worth of ...

Information Gathering Using Windows Command-Line
By: ziednamouchi
July 21, 2017

Let's first of all talk about footprinting. Footprinting refers to collecting as much as possible information about a network target from publicly available resources. It’s the first step in ethical hacking. Using Footprinting helps the hacker to find several ways to intrude the target’s network/system. Ethical hackers , or pen testers, use several ...

Women In Cyber - Pursuing Passion
By: Responsible Cyber
July 20, 2017

I have launched a  Women In Cyber Initiative  and I feel overwhelmed by all the support received from my contacts: men and women.  With the current situation in cyber security, the forecasted skill shortfall, the security challenges and the rise of cyber crimes, we might think that we all should be worried.  We might think ...

Migration to the Cloud: Yes or No?
By: Sasha Radenovic
July 20, 2017

How to move the company's information system into the cloud: On the one hand, you hear that "everyone" is working, and on the other hand, you get stories about the big expenses of something that should actually save you money. It only remains to precisely assess your needs and move forward, step by step. Cloud is expanding and ...

Recon-ng: The Advanced Open-Source Recon Framework
By: Jawady Muhammad Habib
July 19, 2017

  Information Gathering – Intro Gathering information AKA reconnaissance phase is the first step when conducting a penetration testing operation. Actually, it is the most time-consuming phase of the overall work by gathering information about a given target. This will be the intro to a series of episodes (articles) which will cover some IG tools dedicated ...

Hands-On Social Engineering Tutorial: Whaling
By: Jawady Muhammad Habib
July 19, 2017

Hello, Cyber Security enthusiasts to another article in s3curi7y.tn. Today, we will talk about whaling and some of the techniques an attacker may use. We will cover the implementation of several commonly used effective methods of social engineering (SE) in phishing CEOs. This is known as 'whaling'. ...

Next Generations of Firewalls
By: Sasha Radenovic
July 18, 2017

§          Purpose of Firewall The firewall should prevent unwanted traffic, block "downtime" on the local network and protect the computers in it. As long as the applications used strictly defined ports and protocols, it was also possible using conventional firewall devices that block traffic on a particular port and/or ...