0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Printer Steganography
By: mawright
July 1, 2017

After a recent event of an NSA contractor being tracked down via hidden codes on a leaked document, I was interested in learning more about these tracking codes, and how they work. Back in the 90's, manufacturers of color laser printers came together with the government to implement a hidden tracking code within their printers. This was to help ...

UNM4SK3D: Petya, CIA, and Google
By: Olivia
June 30, 2017

#malware On Tuesday, news of a 'NotPetya' ransomware attack which targeted several countries, including Russia, Ukraine, France, India and the United States, demanding $300 in ransom spread like wildfire as fears of 'another WannaCry' hit. Now, just a few days later, and after much analysis, this 'ransomware' is actually said to be a ...

Military Veterans: Why Cyber Security is The Ideal Career
By: Olivia
June 29, 2017

Recently, I read an article that described millennial’s lack of interest in pursuing cyber security careers. While the author suggested this was related to unawareness, he stated it posed a greater threat to the cyber security skills gap as older infosec workers retire. The skills gap is a topic we will never cease to talk about, and an ...

A Brief Introduction to Fully Homomorphic Cryptosystems
By: Lawrence King
June 28, 2017

Recently, I completed a course through MIT Professional Education in Cybersecurity. During the course, we discussed many concepts, best practices, and policies in the field of cyber security. We also discussed the research being performed at MIT in the area of cybersecurity. One of the concepts that stood out was that of Fully Homomorphic Encryption. Fully Homomorphic ...

Your Complete Guide to Linux
By: Olivia
June 28, 2017

Since its’ inception, Linux has become a phenomenon in the IT world as programmers work to enhance the operating system. As it grows, Linux has gained a following among developers very quickly, as it appeals to a wide audience. Most specifically, Linux is ideal for those who know UNIX and want to run it on PC-type hardware, those ...

Google CTF 2017 Mind Reader Write-up
By: Motasem
June 28, 2017

MindReader was supposedly one of the easiest challenges at GoogleCTF and it’s after some guessing. So let’s start! First heading the challenge page we see a box with “read” button. First thing comes to mind is to try to test for “XSS” so a couple of XSS attempts were tested among them the following: <script>alert(test)</script> ...

PST Recovery Tool - Free Full Version
By: elbert04
June 27, 2017

Corrupt PST File Recovery Freeware can be used to fix unreadable PST file and return emails from dishonest PST file of Outlook (2016 to 97) applications. PST File Recovery also fixes oversized PST files and returns emails successfully from them. Corrupt PST File Recovery Freeware is an opportune PST Recovery software, which recovers the Augean, unreadable or ...

Apache Logs Analysis
By: Masood
June 27, 2017

Log analysis can be a tedious task.   Raw logs do not reveal much information unless they are processed through a log analysis engine or Security information and event management (SIEM) solution. In this article, I will pull the Apache logs of my site into a log collector ( Sumo Logic Free ...

Your Complete Guide to Hyper-V
By: Olivia
June 24, 2017

Let’s face it, virtualization is not going away any time soon. Companies will continued to be challenged by the limitations of their servers and the need for a money and time saving solutions will  increase over time. Many are familiar with the capabilities of VMware, but what about Hyper-V from Microsoft?Hyper-V is another popular and capable virtualization tool, ...

What is Tabnapping? Protection & Prevention Techniques
By: Cyber Tiger
June 23, 2017

The word 'Tab Napping' comes from the combination of 'tab' and 'kidnapping' used by clever phishers, scammers, and hackers. Tabnapping is an interesting, tricky, clever, and smart hacking technique for phishing and scamming. Through this, attackers take advantage and control a victim's unattended browser tabs by hijacking and redirecting him to malicious URLs where they can perform a phishing attack and ...