0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Auditing *Nix Systems in Under 2 Minutes
By: Alfie
May 18, 2017

Want to do a quick comprehensive audit for your *nix workstation or server? Granted, more than 100 controls will be tested, but use Nix Auditor.Steps:1.  Download the script https://github.com/XalfiE/Nix-Auditor  2.  Make the script executable - using chmod +x  3. Run the script - ensure you are root for comprehensive results 4. Analyze the results under the following ...

Craft Attacks from Geographic Location Data on Social Media Using Creepy
By: B15MU7H
May 18, 2017

Craft Attacks from Geographic Location Data on Social Media Using CreepyCree.py is an open source intelligence tool dedicated to determining victim geographic location (exact longitude and latitude) based on their social media posts. This article will provide a tutorial on what you can do with creepy and how you can use it to your advantage. How to Use Creepy ...

Online Privacy was Never so Exposed - Trends & Measures for 2017
By: candicebrown
May 16, 2017

The Internet is changing the way we communicate. Be it for business pursuits online, or just to chatting with friends, or enjoying some casual entertainment, the internet helps us to stay connected.However, one of the most imperative concerns of internet usage is online privacy, and how cyber crooks may choose to take advantage of it.In fact, internet privacy is a ...

Beware of the Google Docs Scam - How to Protect Yourself
By: indrajeet
May 15, 2017

Did someone share a Google Doc with you? If yes, you might be one of the millions of internet users who fell victim to this scam campaign.In the last few days, a lot of people received emails from their contacts with a seemingly normal and legitimate invitation to view a Google document  which says that the person [sender] "has ...

Management Quality: Concepts, Standards, and Implementation
By: themindandbeauty
May 14, 2017

Preface To begin, it is management which determines objectives. As follows, it is strategic management which meets customer satisfaction. The main emphasis of the quality management is that strategic management should make its efforts to satisfy its customers.The management should maintain strategies which improve quality; these strategies must observe variations which regular reasons constitute and find solutions degrading ...

Cyber Security Chronicles (Current State of Cyber Security)
By: THE CYBER EAGLE (CYBER SECURITY + NETWORK SPECIALIST)
May 13, 2017

By: Jeremy Bannister ( The Cyber Eagle ) Take 1 :  Enter the Eagles Nest (Intro)I have decided to write a series of articles that relate to the state of cyber security in today's' IT industry. I will share some of my ideas and suggestions that could not only greatly benefit the future of ...

Firewall Detection with WafW00f
By: Priyank Gada
May 12, 2017

WAFW00F is a Python tool to help you fingerprint and identify Web Application Firewall (WAF) products. It is an active reconnaissance tool as it actually connects to the web server, but it starts out with a normal HTTP response and escalates as necessary.You can override or include your own headers, it has SOCKS and HTTP proxy support and detects a ...

What is Penetration Testing to You?
By: jmcedric
May 12, 2017

My friend asked me "What is Penetration Testing?"I stumbled upon this question myself trying to figure out what the true meaning of "Pen Testing" is. I am doing it every day, like my daily routine, but that's it. Without thinking, I said to my friend, "pen testing is a process of someone who looks for security holes and reports them ...

UNM4SK3D: France, Android, and FIN7
By: Olivia
May 12, 2017

#hacked Hear no evil. See no evil. Speak no evil. Over the weekend, France ignored the 'massive' pre-election hacking attack on Emmanuel Macron’s campaign and elected him the new President over far-right candidate Marine Le Pen. Hackers leaked nine gigabytes of emails two days before the French Presidential Election, which everyone across the world ...

How to Use DNS Analysis Tools in Kali Linux
By: Priyank Gada
May 11, 2017

What's inside this video? I'll unpack it for you. In this video, we will learn how to use all DNS analysis tools present in Kali Linux. I am going to use Kali Linux 2016. You can use any version that you have. We will slowly learn all the tools present in Kali Linux. DNSRecon Help URL:  https://tools.kali.org/information-gathering/dnsrecon ...