0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Cloud+ Outline - Module 2
By: cdoyle
April 14, 2017

Module 2: Storage Device Configuration Part 1 Unit Overview  Storage Types and Configuration Tiering Redundant Array of Independent DIsks (RAID) File System Types Disk Types and Configurations Removable Media - 1 Interface Type Access Speed ...

Phishing Wifi-Passwords & Facebook Credentials with Wifiphisher
By: PrettyPay
April 14, 2017

Wifiphisher is a tool that I love using on a daily basis. It's simple, easy and great for beginners and professionals. WHAT YOU NEED: Laptop with onboard or additional Wifi-Adapter 2x Wifi-Adapters (recommended) Targets (optional)  I had to buy myself an additional Wifi-Adapter to the ...

Hacking for Mischief, Mayhem and Pranking
By: rcubed
April 13, 2017

Last weekend in Dallas the evening calm was shattered by the wail of 156 tornado warning sirens sounding at once. Attempts to turn off individual sirens failed and after 95 minutes of the din, officials mercifully shut down the entire system in a final, desperate act of frustration. A search for a direction in which to point the finger ...

Cloud+ Outline - Module 1
By: cdoyle
April 13, 2017

Cloud+ Module 1: Cloud + Network Storage Types and Configuration Unit Overview Network and Direct Storage Types Accesses and Protocol Storage Preparation and Accessing Network and Direct Storage Types Network Attached Storage - NAS ...

Knowing Your SSL/TLS
By: H5p
April 13, 2017

One thing I have noticed during testing is that there are a number of vulnerabilities that occur as a result of TLS version and cipher suite used. So, I have added a few new tricks in my arsenal to hunt for SSL/TLS that are being used.We will discuss both of the following, one by one - ...

Back to Basics - System Hygiene
By: hemangsoni
April 13, 2017

Back to Basics, Information Security: Today we all are running good so far with old and new security products to give us secure environments. However, we are dying in our knowledge of basics. What do we mean by "basics of information security"? The basics are nothing but hygiene. Similar to how we keep good hygiene at our house, work ...

How to Make a Multiboot USB with All the Tools You Need
By: Breaking Be@ker
April 12, 2017

Just like with any job there are tools, in the IT community there are millions of tools. Finding the tool that is most affordable and most efficient is important to make the life of any IT worker's life easy. But once you find the tools that make your life easier where do they go? Usually (at least for me) ...

Quiz: Micro Certification Placement
By: Olivia
April 11, 2017

You won’t pass or fail. You’ll just get some direction.In previous blogs, I offered tips on how to earn specific Micro Certifications, and how to determine which Micro Certifications were best for your career goals. And while making career decisions is a serious matter, I thought of a fun way I could go about offering more help.I’m sad to admit ...

Set up Your Penetration Testing Lab for Web Application Security Testing
By: Hari Charan
April 11, 2017

To excel at penetration testing , you need to have your lab for practice/research. I would suggest you to use virtual machines which are free in the market. I would go with  VMware Workstation  rather than Virtualbox, it’s just my personal option. You can choose any one. Downloads 1. VMware Workstation Click  ...

Bypass Anti-Virus with ShellCode Injection (Part II)
By: S-Connect
April 11, 2017

Welcome back! To continue with the previous article, here we will learn to create a shell code with Metasploit and PE infector via Shellter into a Win32 application. For those who have not read part I, you can read it here . We have several ways to do that but keep ...