0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Hands-On Social Engineering Tutorial: Whaling
By: Jawady Muhammad Habib
July 19, 2017

Hello, Cyber Security enthusiasts to another article in s3curi7y.tn. Today, we will talk about whaling and some of the techniques an attacker may use. We will cover the implementation of several commonly used effective methods of social engineering (SE) in phishing CEOs. This is known as 'whaling'. ...

Next Generations of Firewalls
By: Sasha Radenovic
July 18, 2017

§          Purpose of Firewall The firewall should prevent unwanted traffic, block "downtime" on the local network and protect the computers in it. As long as the applications used strictly defined ports and protocols, it was also possible using conventional firewall devices that block traffic on a particular port and/or ...

Your Complete Guide to Splunk
By: Olivia
July 18, 2017

According to research by Northeastern University, “The total amount of data in the world was 4.4 zettabytes in 2013. That is set to rise steeply to 44 zettabytes by 2020. To put that in perspective, one zettabyte is equivalent to 44  trillion  gigabytes.”I’ve emphasized in my recent post about SQL vs Oracle Databases the importance data has ...

Social Engineering: Human Buffer Overflow Attack Overview
By: thehhonestpirate
July 18, 2017

A Human Buffer Overflow attack is a concept that is almost unbelievable. When I first learned about the concept of a human buffer overflow attack, I couldn’t believe what I was reading. I was captivated by the concept and decided to study further into the roots of the human buffer overflow and why it works. I recently talked ...

What You Need to Adopt an Intelligence Driven SOC
By: pankaj1251
July 17, 2017

In the last three years, the proliferation in the growth of active threat actors such as polymorphic attacks and availability of sophisticated hacking tool has rapidly impacted the security posture and expenditure of any size organization. The driving factor for adoption of the next generation SOC is a constantly changing environment, adopting a more cloud-centric approach, and adopting the Internet ...

How to Pass the CISSP Exam on the First Attempt
By: Mayur Pahwa CISSP SSCP
July 16, 2017

You may read multiple posts on the various blogs and websites where you are given tips as to how to pass the exam on the first go and where the authors refer books and answer questions. In this blog post, I’m not going to bombard you with those details. Instead, I’m going to share my journey and experience ...

Understanding Ransomware Recovery Tool
By: virat8586
July 15, 2017

Got hit by Ransomware Virus and all your files have been encrypted?Don't Panic as this Ransomware Recovery Tool is your solution. With unlimited technological advancements and platter of applications for us, there are hackers who are sitting behind doors and working day & night to hack your system files. Sometimes they use it to ask for ...

A Quick Overview of VHDX Recovery Software
By: abrienne
July 14, 2017

Recover corrupted VHDX files and extract files from corrupt VHDX in Windows OS VHDX Recovery Tool is an ideal software to make you access your corrupted/deleted VHDX files . VHDX Recovery is a powerful program that smartly performs the recovery of corrupted Hyper-V VHDX files.  The software extensively supports Hyper-V virtual ...

UNM4SK3D: Verizon, CIA, and Google Play
By: Olivia
July 14, 2017

#exposed As if the net neutrality battle wasn't bad enough, Verizon customers beware! It is estimated that as many as 14 million customer's data was exposed after NICE Systems , a third-party vendor, mistakenly left the sensitive users’ details available on a server. How did this happen, you ask? According to UpGuard director of ...

Windows Password Cracking Without External Tools
By: Techquest89
July 14, 2017

Imagine if you will, a 17 hour work day, some idiot unplugged the main switch to your server rack (at the end of your 8 hour work day) and causes the entire server rack to go catatonic.  Zoom ahead forward, you finally have gotten almost everything fixed, the last server comes up and you are greeted with the lovely ...