0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Xerosploit – Toolkit to Perform MITM, Spoofing, DOS, Images Sniffing/Replacement, WD Attacks
September 14, 2017

In this Kali Linux Tutorial, we are to work with Xerosploit. Xerosploit is a penetration testing toolbox whose objective is to perform the man in the middle attacks. It brings different modules that permit to acknowledge proficient assault and furthermore permits to do DOS attacks and port filtering.We can use this tool to perform DOS, MITM attacks, also the ...

Cloud Access Security vs Cloud Application Security
By: zerge
September 14, 2017

First, we need to differentiate between the public cloud and the private cloud: So, basically, the public cloud consists of cloud applications such as Office 365, Google Suite, Box.com, Dropbox, Salesforce, ServiceNow, etc. There are literally tens of thousands of cloud applications available. We call this Software as a Service (SaaS).On the other hand, a private cloud is when ...

How to Create a Netcat Replacement – Python Part 1
By: Jawady Muhammad Habib
September 13, 2017

Introduction: Netcat is the Swiss army knife when it comes to TCP/IP, a utility used to open network connections commonly integrated into a wide range of apps. Because of the ease of its adaptability and high performance, it exists in several operating systems as command line service to know the status of ports (the case of ...

Export Outlook PST To MBOX Thunderbird
By: kaleykd
September 13, 2017

It is really tough for a business runner to think about a change of the emailing programs. The trouble that appears during a change of an email application is a shift of all the emails from one emailing platform to other. Since there are various emailing applications but every business uses the email application which is easily manageable and ...

Identity Access Management Chapter 1
By: Gokmenduristi
September 12, 2017

Identity Access Management is one of the fastest growing business areas in the world. The Identity and Access management market is estimated to grow from USD 8.09 Billion in 2016 to USD 14.82 Billion by 2021, a Compound Annual Growth Rate (CAGR) of 12.9% between 2016 and 2021. Corporate companies are investing in this area because there are ...

Password Spraying: Are You Vulnerable?
By: Mike Ship
September 11, 2017

Password Spraying...Are You Vulnerable? Most cyber security professionals know and understand the traditional attacks on passwords (i.e. brute force, dictionary, keylogger, etc.). But for the most part, those of us outside of the pen-testing community think of password attacks as taking one user id and brute-forcing it with thousands of passwords. The problem with this particular attack method is ...

ITIL, PMP, or Both? Goal-Based Decisions
By: priyajatoliya
September 10, 2017

PMP or Project Management Professional Certification is an internationally recognized certification for project managers. It means professionals in the field of project management can reach to a greater height in their career with this certification in their portfolio. On the other hand, ITIL or Information Technology Infrastructure Library certification in the widely accepted professional framework in the field ...

The Security Compliance Zombie
By: Mike Ship
September 9, 2017

The Security Compliance Zombie  I recently had the opportunity to view a   webinar   where the topic was how to stop what was referred to as “compliance zombies”. We have all ...

5 Things Every Organization Can Learn from the Equifax Breach
By: Olivia
September 8, 2017

By now you’ve most likely heard that the Equifax breach has hit 44% of the population in America, not to mention the consumers effected in the UK and Canada.In a statement released by Equifax Inc. (NYSE: EFX), which provides little detail other than to note that the impact of the breach reaches approximately 143 million ...

"My Cybrary Story" - Ryan W.
By: ginasilvertree
September 8, 2017

Recently, a Cybrary user named "Ryan W." posted some positive comments about Cybrary on one of our social media sites. I reached out to him and asked if he would share his "Cybrary Story." Here's what he wrote (and, no, we didn't pay him to say all these nice things!). I’m proud to say that I’ve been a member ...