0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Introduction to Network Security: Protocols
By: imarchany
July 11, 2017

Network security has been a top notch in the cybersecurity field due to the interconnected devices across the world. It has become very important in our lives because the Internet continues to evolve and computer networks grow dramatically. The fundamentals of network protocols give you a better understanding how the network is structured and how communications are being ...

A Decentralized Model: The Ultimate Solution for DNS Security?
By: chiheb chebbi
July 10, 2017

DNS Definition: The Domain Name System (DNS) was invented by Paul V. Mockapetris an American computer scientist and Internet pioneer in 1983 with the help of Jon Postel. The aim of DNS is making retaining addresses easier by providing a naming structure using names rather than a long sequence of numbers. Remembering  www.icann.org is much easier than remembering "192.0.32.7". Before ...

The CISO Role: Top Salary for Top Security
By: jrinehard
July 10, 2017

Ransomware attacks and data breaches are everywhere now, and it's only intensifying. With this comes a need for better security, but it seems that security professionals are tougher to attract and keep than ever before. This reason alone may help explain why top-tier salaries are on the rise. Now we’re seeing more recognition for the need to ...

How to Recover and Convert OST to PST
By: lliamaria
July 9, 2017

The OST and PST files are the two bailiwick formats victimized by MS Convert and Outlook for managing all types of emails and attachments files of clients in an administration. Basically, it has seemed that galore of the users are death through the OST Corruption issues in which they had mislaid their all emails as fountainhead as attachments. Nevertheless, ...

Cyber Security Chronicles - Ch 1: Company Security Obstacles
By: THE CYBER EAGLE (CYBER SECURITY + NETWORK SPECIALIST)
July 8, 2017

Chronicle 1: The Cyber Security Chronicles {BY: Jeremy Bannister [The CYBER EAGLE]} Chapter 1 - Solid Foundation: IT Security Obstacles That Could be Building Blocks Do you think IT Security is a vital entity or major goal of focus for organizations when deciding what is an important asset, need, and ...

UNM4SK3D: China, NotPetya, and Bitcoin
By: Olivia
July 7, 2017

#greatfirewall The Great Firewall just got stronger. China's Ministry of Industry and Information Technology recently made it illegal to use or operate VPNs (Virtual Private Networks) without government permission in an effort to increase Internet censorship. Digital dumplings, fried.  Back up. You may or may not know that the 'Great Firewall of China' is "the ...

IDN Homograph Attack – Exploitation in Phishing
By: Jawady Muhammad Habib
July 7, 2017

Hello! Welcome to the first post! I am Muhammad Habib and this post will be about internationalized domain name or IDN Homograph attack. We will be attacking a browser supporting IDNA to perform a phishing attack. First things first: What are homographs? Here’s a simple example ... for the coders here. There’s a prank in which you ...

Response & Action | The Post WannaCry Ransomware Attack Report
By: pu239
July 6, 2017

What happened? The WannaCry strain of encryption-based ransomware, also known as Wanna Decryptor, WCRY, or WannaCrypt, began spreading through Europe to Windows-based computers on May 12, 2017, and holding victims’ data hostage for ransom. As the day progressed, many large firms in Spain, Britain, Russia, China, and Portugal were forced to shut ...

How to Install and Configure GNS3 VM
By: Parvez Ahmed
July 6, 2017

The blog is for the new GNS3 VM (Virtual Machine) users on Windows 7/8/10. What is gns3? It’s a graphical network simulator that allows you to design complex network topologies, where you can run different devices (irrespective of vendors) like cisco, juniper, chCheckpointFortinet, PFSense etc. New features: Gns3 ...

My BSidesTLV Talk - Magda Chelly
By: Responsible Cyber
July 6, 2017

BSidesTLV 2017 was a unique place with a very special atmosphere. Friendly, and vibrant it invites to observe and admire the shared knowledge. Exciting, spectacular, surprising, fascinating- impressions that were left to any visitor or speaker. Security BSides is a hacker convention that runs guidelines to a ...