0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Importance of Planning, Management and Testing
By: Abhishek Bagewadi
March 2, 2017

The Importance of Planning, Management, and Testing for Successful Delivery of the Project        1)        Planning        2)        Resource  Management        3)        Motivation        4)        Test Process management ...

Ransomware as a Service
By: Lawrence King
March 1, 2017

As if your network security staff does not have enough to worry about already, now anyone can get in on the ransomware game. Now, we have variants of RaaS (Ransomware as a Service) to worry about. This allows anyone who wants to profit from ransomware to start their own ransomware campaign with the help of a ...

Traffic Redirects: HTTP to HTTPS / www to non-www
By: HakTuts
March 1, 2017

When we deploy a website online for users, by default it allows the user to access the domain with and without "www". This means that the same content is served by an apache server on both " kalilinuxhack.com " and " www. kalilinuxhack .com ". It is bad for SEO ...

How to get Malware Certified
By: Olivia
February 28, 2017

I’ve been on a mission to answer the question, “How do I get _ certified?” In recent posts, I’ve dove into how to earn the TCP/IP certification and how to best utilize your hard earned certifications on your resume. With new micro certifications being released weekly, it’s important to show users truly how limitless their options are when it ...

Let’s Build an Android App
By: rcubed
February 28, 2017

It’s now time to roll up our sleeves and get our hands dirty with a little mobile app development. This next post in the series on Mobile App Development will focus on putting things in place for developing Android mobile apps. The last time I had my hands on Android code was over two years ago – a lifetime ...

Journey through Command Line Tools
By: coldking
February 28, 2017

Hello Everyone,I've been a part of the Cybrary community for some time, and I thought about sharing my journey through the command line, alternative tools to get away from GUI based programs, and why you should use them.Recently I've been trying to cut off as many programs that have command line based alternatives.  To some of you newbies, this may ...

Watering Hole Attack
By: bachan
February 27, 2017

Hello, Guys! I think many of you have heard the recent news that a group, known as Lazarus, infected a Polish bank's website and targeted 150 different IP Addresses around 31 countries. The trick used by the group was called the Watering Hole Attack. Let's take a look at what a watering hole attack is. It is a ...

Ethical Hacking - Kali Linux 2.0 Tutorials
By: pnp.007
February 27, 2017

Kali Linux & Parrot Security OS, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments. Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools aimed at various information security tasks, such as  Penetration Testing, Forensics, and Reverse Engineering. Kali ...

Raw Log Anatomy: Understanding My SIEM System
By: deleriumendless
February 26, 2017

Raw Log Anatomy: My SIEM system reads my raw logs, why do I need to understand them? **NOTE: Examples used in this posting are very old, but the principles remain sound. I had a choice between using very old logs that I could leave whole, or make significant changes ...

Coding Theory: The wide world of cryptography
By: Rachel Laura M
February 25, 2017

Coding theory and cryptography are two well-known areas of information security as both are necessary for today’s technology oriented; online-based world. However, many wonder what is the difference between coding theory and cryptography? Essentially, coding theory is associated with error correcting codes. When learning about coding theory, remember these three associated terms: Data Compression: ...