0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How SSL Certificates Really Work
By: Romansh Yadav
January 16, 2018

SSL stands for secure socket layer.  The SSL certificate is used to create an encrypted connection between user/browser and the server. So, let’s start from very basic. When you type Google in your browser, your browser sends this request to DNS server and DNS ...

Five Best ZIP Recovery Tools
By: rohanwiese
January 16, 2018

Data with the ZIP record extension is a ZIP Compressed file and is the most favored archive format you'll run into.A ZIP file, like other archive file formats, is simply a collection of one or more documents and/or folders but is compressed into an one file for easy transportation and compression.The most common use for ZIP files is made ...

How to Convert EML Files to Multiple Formats with Attachments
By: angeljonson
January 15, 2018

Nowadays, there are a number of email client applications available to manage and organize the information in the digital industry. Every email client saves their data into the different file formats. But, there are some applications that used to save the data into EML file format. Some of the EML supportive applications are ...

Juliar - Using recurrence to solve difficult problems
By: Rattar
January 13, 2018

Hey Everyone,I am creating a series of the insides of Juliar in order to educate you guys in better understanding Juliar and hopefully converting you to firm believers of it :)In this first tutorial in the series, we will explore the use of recurrence in order to speed up Juliar.So let's look at a basic built in ...

UNM4SK3D: WhatsApp, WPA3, and FBI
By: Olivia
January 12, 2018

#vulnerability Hate it when someone tries to read your messages over your shoulder? So do we. A new discovery by researchers from Ruhr-Universität Bochum (RUB) in Germany found that an outsider may be able to secretly eavesdrop on your 'private,' encrypted group chats through WhatsApp and Signal messaging apps. As a reminder, WhatsApp and ...

Cracking less secure login password for beginners
By: Shaquib Izhar
January 11, 2018

This is beginner level post for learning how to hack less secured password of login page. For this I am going to use some router for cracking the password and of course Hydra to brute forceit.  What you need Kali Linux ( or any Linux distribution ...

Juliar - 2018 Guide to Running Juliar on your computer
By: Rattar
January 10, 2018

Hey Everyone,Happy New Year! We've been hard at work working on both Juliar.Future and Juliar BLUE that we decided to merge the two projects into one.The new Juliar inherits the new clean editor from Juliar BLUE. This means that Juliar doesn't depend on JavaFX anymore to run GUI. Instead, Juliar now uses browser to render the interface. ...

Become the Man-In-The-Middle with an Open Internet Proxy
By: sergiomitm
January 9, 2018

Ever wanted to manage a chunk of internet traffic? Whether you are learning to use network management tools or doing something more nefarious, having a test bed of traffic is an important tool. Follow this tutorial and you'll be the boss of more traffic than you can handle. I'm showing you how to create an open internet proxy with Squid. ...

A Cybrary Year in Review: 2017
By: Olivia
January 9, 2018

Like many of you, the Cybrary team is excited for the New Year ahead. A new year means new learning goals and a renewed sense of motivation to better yourself and your career. We’ll be the first to say, we’re excited about all the things we can achieve together, and we’re certain that Cybrarians are going to ...

Linux Cheatsheet
By: shantanurauthan
January 7, 2018

System Information  uptime = Show how long the system has been running. hostname = Shows system host name. hostname -I = Shows IP address of the host. date = Show current date and time. whoami = Who you are logged in ...