0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


As Cybrarians may or may not have noticed, Cybrary has entered an accelerated, high-growth phase. In addition to changes across the site, including the new offerings of various vendor products in the catalog, Cybrary has also begun to expand the team.[caption id="attachment_96849" align="alignleft" width="219"] Jeff Man, INFOSEC Curmudgeon & Cyber Security Evangelist[/caption]The newest addition ...


According to Heimdal Security, “Hacktivism accounts for half of the cyberattacks launched in the world.” What is hacktivism? Hacktivism is a politically or socially motivated form of hacking. Deeply rooted in hacker culture and ethics, it is often related to free speech, human rights, or freedom of information. Although hacktivism may seem positive, ...


This time I will present you here a source code made in Python which you can download a file with multiple threads option. This source code is for educational purposes and I hope is helpful to you. If you find any bugs in this code or have questions, leave a message in the comments section. `#!/usr/bin/env python#coding=utf-8import osimport sysimport ...


#hacked Blackmail is coming. In a bizarre string of events, HBO hit show Game of Thrones is at the center of breaches and episode leaks, among other pieces to this growing hacker's puzzle. Initially, unknown hackers claimed to have 1.5 terabytes of data from HBO and leaked that information in two batches ...


How to connect a Router/Firewall that is running on GNS3 VM to a host machine. Have you ever wondered how to connect your simulated device (Router/Firewall) on GNS3 VM to host machine so that you can pull/push the configuration from/to the device? Here is the solution: 1. You have to add one loopback adapter to your host ...


According to CompTIA, the Linux+ certification offers a framework for acquiring working knowledge of Linux for IT professionals working as junior-level system administrators, as well as those working in Web and software development.Successful candidates will have the following skills: Work at the Linux command line Perform easy maintenance tasks including assisting users, ...


Today I am going to give you some tools to explore the Footprinting and Reconnaissance . For the new people on this long trip, enjoy the ride and good luck on your studies! For questions or help on how to use these tools, I will be glad to help you so feel free to contact me anytime. 1) ...


Privacy is a topic that the security community can never give too much attention. To. For those with an online presence, it is especially important to consider who has access to your information. One common method for doing so through an encryption method called Pretty Good Privacy (PGP) . What is Pretty Good Privacy (PGP)? Developed ...


Author Bio: This organization has been the creation of one of the best software solutions amongst which, one Outlook application is presently considered one of the best PST recovery tool solutions. Summary: Outlook PST files being one of the most commonly used email platforms is discussed here along with the issues faced by its users that ...


So we’ve all heard of a multi layered approach to Security, well I recently decided that we should consider adding an additional layer. With the ongoing rise of ransomware threats (and now ransomware that seeks out and encrypts backup files as well as shadow copies), the weakest link is generally the end user. This means we are ...