0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Cybrary Adds INFOSEC Curmudgeon Jeff Man to the Team
By: Olivia
August 18, 2017

As Cybrarians may or may not have noticed, Cybrary has entered an accelerated, high-growth phase. In addition to changes across the site, including the new offerings of various vendor products in the catalog, Cybrary has also begun to expand the team.[caption id="attachment_96849" align="alignleft" width="219"] Jeff Man, INFOSEC Curmudgeon & Cyber Security Evangelist[/caption]The newest addition ...

Cyber Fact: Hacktivism
By: Olivia
August 18, 2017

According to Heimdal Security, “Hacktivism accounts for half of the cyberattacks launched in the world.” What is hacktivism? Hacktivism is a politically or socially motivated form of hacking. Deeply rooted in hacker culture and ethics, it is often related to free speech, human rights, or freedom of information. Although hacktivism may seem positive, ...

Tutorial: Multiple Threads Downloader Source Code
By: Bmsr256
August 18, 2017

This time I will present you here a source code made in Python which you can download a file with multiple threads option. This source code is for educational purposes and I hope is helpful to you. If you find any bugs in this code or have questions, leave a message in the comments section. `#!/usr/bin/env python#coding=utf-8import osimport sysimport ...

UNM4SK3D: HBO, NetSarang, and Fancy Bear
By: Olivia
August 18, 2017

#hacked   Blackmail is coming. In a bizarre string of events, HBO hit show Game of Thrones is at the center of breaches and episode leaks, among other pieces to this growing hacker's puzzle.  Initially, unknown hackers claimed to have 1.5 terabytes of data from HBO and leaked that information in two batches ...

How to Connect Router/Firewall On GNS3 VM to a Host Machine
By: Parvez Ahmed
August 17, 2017

How to connect a Router/Firewall that is running on GNS3 VM to a host machine. Have you ever wondered how to connect your simulated device (Router/Firewall) on GNS3 VM to host machine so that you can pull/push the configuration from/to the device? Here is the solution: 1. You have to add one loopback adapter to your host ...

Linux+ 103 Transcender Practice Test Question Preview
By: Olivia
August 17, 2017

According to CompTIA, the Linux+ certification offers a framework for acquiring working knowledge of Linux for IT professionals working as junior-level system administrators, as well as those working in Web and software development.Successful candidates will have the following skills: Work at the Linux command line Perform easy maintenance tasks including assisting users, ...

Footprinting and Reconnaissance
By: Raul Pop
August 17, 2017

Today I am going to give you some tools to explore the Footprinting and Reconnaissance . For the new people on this long trip, enjoy the ride and good luck on your studies! For questions or help on how to use these tools, I will be glad to help you so feel free to contact me anytime. 1) ...

Cyber Pop: Pretty Good Privacy
By: Olivia
August 16, 2017

Privacy is a topic that the security community can never give too much attention. To. For those with an online presence, it is especially important to consider who has access to your information. One common method for doing so through an encryption method called Pretty Good Privacy (PGP) . What is Pretty Good Privacy (PGP)? Developed ...

Best PST Recovery Tool to Repair Highly Corrupted Outlook Files
By: justin hansen
August 16, 2017

Author Bio: This organization has been the creation of one of the best software solutions amongst which, one Outlook application is presently considered one of the best PST recovery tool solutions. Summary: Outlook PST files being one of the most commonly used email platforms is discussed here along with the issues faced by its users that ...

A Multi Layered Approach to Security with a Difference
By: mysticman2k
August 16, 2017

So we’ve all heard of a multi layered approach to Security, well I recently decided that we should consider adding an additional layer. With the ongoing rise of ransomware threats (and now ransomware that seeks out and encrypts backup files as well as shadow copies), the weakest link is generally the end user. This means we are ...