0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Catch the Phishy Domains – Python & Slack Integration
By: P3t3rp4rk3r
March 25, 2018

Hey Guys, Today I just wanna discuss about catch the phishing domains before it was targeted to your organization.In Cybersecurity Defenders prospective, Everyone wants to detect something malicious /weird before it exploited. So, I have seen/worked lot of pentesting engagements on different organizations. 70% cases are Red Teamers successfully exploits client machine through phishing only. In lot of ...

AWS vs Azure vs Google Cloud: Ultimate Comparison [2018 Update]
By: Saurabh Chaturvedi
March 25, 2018

While the choice of private / hybrid / public cloud might be a difficult decision, there is a larger matter that must be conquered first: AWS vs  Azure  vs Google Cloud [Platform]. While these three cloud providers collectively dominate this sphere, their approach to cloud computing is strongly dictated by ...

Six Essential Skills of a Project Manager in 2018
By: michaelwarne
March 24, 2018

Project Management is a tough nut to crack. If you are a Project Manager that means you should be quick like a bunny, clever like a fox and gentle like a dove. Other than that, you should have a certain set of skills and expertise to manage your team. In the void of these skills either you ...

DroopyOS
By: aisherwood
March 24, 2018

DroopyOS Overview Objective :  Get Flag OVA Link :  https://www.vulnhub.com/entry/droopy-v02,143/ Tools used : netdiscover, nmap, nikto, metasploit, truecrack, veracrypt To start, I just ran a quick netdiscover to get the DroopyOS ...

Dark Caracal and the "Bulkanization" of Malicious Tools
By: wfarighi
March 23, 2018

2018 introduced more than just another calendar year because of the identification of an Advanced Persistent Threat (APT) campaign known as Dark Caracal... A cyber espionage campaign was discovered by the Electronic Frontier Foundation and the mobile security company Lookout. Dark Caracal targeted Android mobile devices from users in 20+ countries beginning in 2012. The ...

Unraveling the Cyber Skills Gap & Talent Shortage
By: Olivia
March 22, 2018

With high profile security breaches like Equifax, the publicity over data security, as well as the cost, has only continued to grow. According to The 2017 Cost of Data Breach Study from the Ponemon Institute, the global average cost of a data breach is $3.6 million, or $141 per data record.Businesses large and small have faced financial ruin and severe ...

Bot Vs Bot (Attack Vs Defend)
By: Bharathram
March 22, 2018

  What is Automation in CyberSecurity? CyberSecurity measures are protecting your digital assets. These days, nearly all data is stored digitally; data as small as your schedule to information, to your banking details are all found digitally. As the technical means of digital penatration are ever increaing, mere protection is not sufficient. It has ...

Netcat Tool: 5 Most Common Usage with Examples
By: Jithin Aby Alex
March 22, 2018

Netcat is one of the most powerful and useful tool for testing and debugging the network and protocol connectivity.Though administrators use this tool for troubleshooting purposes, the attackers may use this for malicious intentions such as establishing a connectivity, transferring files, scanning ports etc.Netcat can act as in client-server mode as well. This tool is available for ...

How to Convert MSG to EML Format without Losing Information
By: angeljonson
March 22, 2018

In this post, we are going to explain how to convert MSG to EML format along with the respective attachments. So, if you want to export MSG files to EML format and finding a way then this article will help you a lot. Keep reading the article and get ...

Top security and privacy tool for internet security and privacy protection
By: Shaquib Izhar
March 21, 2018

 We all use internet in our day to day life for communication, file sharing,social networking and for lot of other reasons. But we are also aware of how privacy invasion is increasing day by day with increasing of Black Hats, even some sites also stores Cookies to track your online activity about ...