0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Kali Linux - Hacking OS Tutorial Series
By: pnp.007
February 25, 2017

UA Tester A tool for User Agent WAF, IDS/IPS, and Redirection testing.UA-tester is a tool to check whether a website provides different pages for different user agents like for mobile, desktop bots etc. Well, this tool also delivers a lot of information. It is basically a python script which runs through various user-agents on a specified site. It also ...

Crack the CEH Exam
By: priyajatoliya
February 24, 2017

EC-Council stands for International Council of E-Commerce Consultants that is a member-based professional organization of global reach. Certified Ethical Hacker (CEH) is an EC council certification that is awarded to indicate your adeptness in network security, particularly in checking malicious hacking attacks, through preventive countermeasures. A certified ethical hacker can infiltrate a network and inspect extant vulnerabilities at the behest of ...

UNM4SK3D: Google, Netflix, and Bill Gates
By: Olivia
February 24, 2017

#SHA-1 Maybe you've heard of it, and maybe you haven't. But Google just impressed the world again by producing the first successful SHA-1 collision attack ever. And that means it's officially time for services to migrate to safer cryptographic hashes.  Let's back up. SHA-1, Secure Hash Algorithm 1, is a very ...

How to Delete Linux and Fix Windows Boot System
By: Suminder Singh
February 23, 2017

Hello, users!This is my first post on Cybrary, so please leave comments at the bottom letting me know how I did with this.I'm going to tell you how to fix your dual windows system if you want to delete your Linux OS and save your Windows OS. Let's get started! Nothing tough, just follow my steps and you'll do ...

Insights and Trends on Micro Certifications
By: Olivia
February 22, 2017

Linux Academy and Cybrary  survey 6,000 IT professionals on experiences with micro certification. Results offer insight into learning preferences, certification in the workforce, training costs, and trends. To read the full press release, click here.

Tutorial: Extracting Passwords
By: Parichay Rai
February 22, 2017

I want to share one of the ways of extracting the password from a machine even when there is an antivirus agent installed on it.A pentester aims to compromise the domain and become the domain admin. Often I have observed that compromising a domain host is easy. This can be achieved by exploiting a vulnerability in the host using a vulnerability scanner such as ...

Legal Obligations for Backup and Recovery
By: Lawrence King
February 22, 2017

Some organizations that handle sensitive data may have legal obligations to backup and store data using a secure methodology. There also may be retention rates that must be adhered to. Some organizations such as healthcare, financial and accounting organizations may not be aware of the exact rules they must follow. Meeting the requirements can be complicated ...

Introduction to Mobile Development Platforms
By: rcubed
February 21, 2017

It seems the title of the previous post in this series threw a few people. I suppose it serves me right for flirting with a click baity title. The point I was attempting to make was that though mobile app development has a lot of allure as a road to fame and riches, the reality is much starker for ...

Cryptography Part 2: An In-Depth Review
By: bytezealot
February 21, 2017

  Estimated reading time: 6 minutes Cryptography Part 2: An In-Depth Review PKI (Public Key Infrastructure): - CA (Certificate Authority) The CA stores issues, and signs the digital certificates. - RA (Registration Authority) Verifies the identity of entities requesting their digital certificates to be stored at the CA. - ...

Project Management for Beginners
By: leena661
February 21, 2017

Project management is the application of processes, methods, knowledge, skills and experience to achieve the project objectives. A lifecycle defines the inter-related phases of a project; a program or portfolio provides a structure for governing the progression of the work.There are the  seven phases  in the project management lifecycle. Concept phase - an initial idea ...