0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Poor Patch Management - A Cyber Security Risk
By: TONY
September 8, 2017

The effects of poor patch management were brought to the fore with the global ransomware attack that affected over 150 countries and scores of organizations in the second quarter of 2017. The ransomware exploited a vulnerability in windows operating system. In all fairness to Microsoft, the operating system OEM, a patch to address this vulnerability had ...

UNM4SK3D: CIA, Dragonfly 2.0, and Siri
By: Olivia
September 8, 2017

#wikileaks  As expected, Wikileaks has added yet another leak to the Vault 7 collection, one that leaves Harry Potter fans speculating. This time, rather than being a hacking tool or surveillance method focused leak, this project focuses on a Missile Control System, complete with blueprints.  'Project Protego' as it's called, is a PIC-based missile ...

Footprinting and Reconnaissance 2
By: Raul Pop
September 7, 2017

Here are some more tools to explore Footprinting and Reconnaissance . For the new people on this long trip, enjoy the ride and good luck on your studies! For questions or help on how to use these tools, I am happy to help you so feel free to contact me anytime. 1) Copernic Tracker Link:  ...

A Job in Security Leads to Job Security
By: jrinehard
September 6, 2017

Cyber Security/IT salaries continue to rise as companies deal with a snowballing shortage of cyber talent. A lucrative career indeed Over a decade ago, career options for technology seeker s were generally limited to security firms, handfuls of jobs inside mainstream companies, and in government agencies. Today, as technology becomes more and more incorporated ...

A Reliably Fast Way to Repair Corrupt Outlook PST Files
By: kanerichardson
September 4, 2017

Corruption Issues in Outlook PST MS Outlook, when used as a desktop email client, stores its data in Outlook data files (PST). Though a convenient format for saving and transferring data, Outlook PST files may get corrupted due to many reasons. We have categorized them into two main categories. Hardware Related Issues ...

Retrieve OST Data with OST to PST Conversion
By: johnparktech2012
September 2, 2017

The work that you perform offline in Microsoft Outlook is saved in a folder called Offline Storage Table or OST. When you try to access your offline data, the OST file is opened and the data come up. Imagine, a single fault incurs in the OST file and the OST data becomes completely inaccessible. To avoid such issues and ...

SharePoint Recovery Tool to Recover SharePoint Server Database
By: rohanwiese
September 1, 2017

SharePoint Server Recovery tool professionally repairs corrupted database of the SharePoint server and retrieves entire documents and other objects from it. The SharePoint Recovery software allows repairs for the damaged or inaccessible database and creates a new MDF file, which can be incorporated into the SharePoint server to make the web sites accessible. Software Features Aryson SharePoint Server ...

UNM4SK3D: CIA, Instagram, and St. Jude
By: Olivia
September 1, 2017

#wikileaks  Wikileaks is in the news for more reasons than 1 this week. As expected, they've added another hacking tool to the growing list of Vault 7 leaks. The latest, 'AngelFire' is a Windows hacking tool used to gain persistent remote access. But, prior to that leak, Wikileaks was hacked themselves by none ...

Web Scraping with Python Part 1 - The Basics
By: Yuri Slobodyanyuk
August 31, 2017

Very few coding activities expose us to so many exciting technologies at once - the web (HTTP/HTML/XML/CSS/JS), data mining, NLP, and security (IPS/WAF evasion) like the Web bots. Yet, with the proliferation of the automated tools and Google, this once mainstream skill is becoming either black hat only or too "old-school". None of this should be the case and ...

Cyber Fact: Social Engineering
By: Olivia
August 30, 2017

According to Security Magazine, Hackers attack every 39 seconds, with 1 in 3 Americans attacked this past year alone. Additionally, 62% of companies have experienced phishing social engineering attacks, making it one of the top three cyberthreat concerns for 2016. What is social engineering? Social engineering is a method that depends on human ...