0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


By @theBenygreen In information security, when we talk about external attacks, you will realize that the browsers are generally called in contribution. It’s simple: browsers are a good entry door and even with no 0day exploits on hand, you can even get a shell . For a pentester, it is a good skill to know how to ...


Hi, everybody. I'm @thebenygreen, and I will introduce you to one of my codes, Beefstrike.BeefStrike is a Cortana script for BeEF integration inside the Armitage ( a Metasploit GUI) . The result is the ability to use client-side exploits like remote exploits and automate BeEF command execution after hooking. One of the great power of Armitage is his ability ...


What is a certified ethical hacker , and how much does he/she earn?As the term implies, a Certified Ethical Hacker (CEH) is an individual who companies hire to inspect the security of their online systems by attempting to hack into them.These ethical hackers, who are occasionally called “ penetration testers ,” identify flaws in the system that an unethical ...


4 Noob’s guide to ransomware DISCLAIMER: For educational and informative purposes only. The author bears no responsibility for any form of usage of the knowledge presented in here. Every one of us has been a victim of at least one computer malware infection at some point in our lives. ...


TOR Browser / Tails OS Setup Virtual Machine, install Linux OS (fully updated and patched) Configure VPN software for hiding your location on your host OS (disable geolocation, clear all log, change your OS default language to some other country) Configure proxy switcher for your tor browser on VM (Linux) ...


#hacked It seems that word of new breaches have been released almost daily as of late. The latest, coming on the back on the devastating Equifax breach, is news that the Securities and Exchange Commission (SEC) was hacked last year. Gulp. The SEC is the top U.S. market's regulator. Their official website states, "The mission ...


If the Outlook PST files causing trouble in opening or viewing, then there are very many chances of PST file corruption or it may be due to something else. If those PST files are corrupted or inaccessible than user won't able to view Emails, Calendars, Contacts, Notes, Tasks and Journal entries etc., and if those PST files are important to user then ...


Every infosec professional who has ever argued against the CEH exam may change their minds after this recent announcement from EC Council. The certifying body will be launching a new, fully-proctored ‘Licensed Penetration Tester (LPT)’ Certification at this year’s Hacker Halted.The new LPT certification exam will be delivered as a live test that can be ...


Regarding Cloud technologies, there are two sides of the story: on the one hand, there are suppliers of new technologies that, as always move forward, and on the other hand, users who do not want to change anything won't change anything. So let’s try to approach this “problem” with win-win solutions for both sides, but with emphasis on ...


Preventive Security - Alive or Dead There are some new buzz words in the cyber security industry today. Terms such as “data-driven security” and “security analytics” seem to be in the forefront and what all of the “cool” kids are talking about while the “old-timers” dig in ...