0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Tutorial: BeEF and Armitage/Cobaltstrike Integration - Part 02
By: ben
September 27, 2017

By  @theBenygreen In information security, when we talk about external attacks, you will realize that the browsers are generally called in contribution. It’s simple: browsers are a good entry door and  even with no 0day exploits on hand, you can even get a shell . For a pentester, it is a good skill to know how to ...

Tutorial: BeEF and Armitage/Cobaltstrike Integration - Part 01
By: ben
September 26, 2017

Hi, everybody. I'm @thebenygreen, and I will introduce you to one of my codes, Beefstrike.BeefStrike is a Cortana script for BeEF integration inside the Armitage ( a Metasploit GUI) . The result is the ability to use client-side exploits like remote exploits and automate BeEF command execution after hooking. One of the great power of Armitage is his ability ...

The Average Salary of a Certified Ethical Hacker (CEH)
By: jrinehard
September 26, 2017

What is a  certified ethical hacker , and how much does he/she earn?As the term implies, a Certified Ethical Hacker (CEH) is an individual who companies hire to inspect the security of their online systems by attempting to hack into them.These ethical hackers, who are occasionally called “ penetration testers ,” identify flaws in the system that an unethical ...

A "Noob's" Guide to Ransomware
By: Likhitesh
September 23, 2017

4 Noob’s guide to ransomware DISCLAIMER: For educational and informative purposes only. The author bears no responsibility for any form of usage of the knowledge presented in here. Every one of us has been a victim of at least one computer malware infection at some point in our lives. ...

Dark Network Guide!
By: ajatshatru
September 22, 2017

TOR Browser / Tails OS Setup Virtual Machine, install Linux OS (fully updated and patched) Configure VPN software for hiding your location on your host OS (disable geolocation, clear all log, change your OS default language to some other country) Configure proxy switcher for your tor browser on VM (Linux) ...

UNM4SK3D: SEC, APT33, and CCleaner
By: Olivia
September 22, 2017

#hacked  It seems that word of new breaches have been released almost daily as of late. The latest, coming on the back on the devastating Equifax breach, is news that the Securities and Exchange Commission (SEC) was hacked last year. Gulp. The SEC is the top U.S. market's regulator. Their official website states, "The mission ...

How to Open PST Files without Outlook
By: eddieamell
September 21, 2017

If the Outlook PST files causing trouble in opening or viewing, then there are very many chances of PST file corruption or it may be due to something else. If those PST files are corrupted or inaccessible than user won't able to view Emails, Calendars, Contacts, Notes, Tasks and Journal entries etc., and  if those PST files are important to user then ...

Exciting News from EC Council
By: Olivia
September 20, 2017

Every infosec professional who has ever argued against the CEH exam may change their minds after this recent announcement from EC Council. The certifying body will be launching a new, fully-proctored ‘Licensed Penetration Tester (LPT)’ Certification at this year’s Hacker Halted.The new LPT certification exam will be delivered as a live test that can be ...

Traveling to the Cloud!
By: Sasha Radenovic
September 20, 2017

Regarding Cloud technologies, there are two sides of the story: on the one hand, there are suppliers of new technologies that, as always move forward, and on the other hand, users who do not want to change anything won't change anything. So let’s try to approach this “problem” with win-win solutions for both sides, but with emphasis on ...

Preventive Security - Alive or Dead
By: Mike Ship
September 20, 2017

Preventive Security - Alive or Dead There are some new buzz words in the cyber security industry today. Terms such as “data-driven security” and “security analytics” seem to be in the forefront and what all of the “cool” kids are talking about while the “old-timers” dig in ...