0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

The 12 Steps of Good Vulnerability Management
By: virtualsweatervest
April 11, 2017

Step#1 – Admit That You Have a Problem Many IT professionals live in a world of denial. Assumptions are made about the security of systems and risks are often ignored. These stances are not taken out of ignorance or irresponsibility but are instead often-pragmatic decisions based on the number of resources available and the number of hours ...

Hacker, YouTube Star, and Cybrary’s New Course Contributor: Priyank Gada
By: Olivia
April 10, 2017

If you are an avid reader of 0P3N, chances are you’ve seen a post or two from avid contributor Priyank Gada ( @groupflexi ).Priyank, who has experience as a forensics expert and penetration tester, frequently makes YouTube videos to share his knowledge.One area he’s extremely knowledgeable in is Kali Linux, which inspired his new Micro Course, now ...

Pharming Attack
By: bachan
April 10, 2017

Hello, Guys!I hope you are enjoying my posts. Here I will tell you about an attack which is very hard to detect.The pharming attack.When you type in a URL (www.example.com) into your browser, it then goes to the DNS server to convert it into an IP address. After resolving the domain name into an IP address, you can communicate to the desired ...

Pretexting: Social Engineering "Success" Story
By: CybrarySupport
April 10, 2017

I <3 Social Engineering! Here's my story about how easy it can be to get contact information.So about 3 months ago, I was on the bus going home from school. I ended up getting a text message from an unknown number that was in my area code. It read the following,"Hey man, the people texted me asking about the walls. They are ...

Hacking Android Phones
By: Priyank Gada
April 8, 2017

Did you ever think of hacking into anyone's phone and getting all the data like they do in the movies? Well, that's not actually hacking but it's called spying. Spying is a term in hacking but not considered as hacking. A hacker can remotely install Spyware to spy on others. Ever wonder what would happen if a hacker gained physical access to ...

By: H5p
April 7, 2017

[/{REGEX} + /{PYTHON}] Regex or regular expressions can be used to identify a particular pattern in a large dump of data. This comes handy when there is a requirement to extract/identify a particular pattern of data from a heap of data. USAGE: Log files contain a ...

UNM4SK3D: CIA, Dark Web, and China
By: Olivia
April 7, 2017

#wikileaks (they just keep coming). You know that feeling you get when your favorite artist continues dropping singles but doesn't release an album? The same can be felt for Wikileaks, but instead of anticipation, their releases cause anxiety. The latest series of documents from the Vault7 project was released on March 31st.  These documents detail ...

Steps Before Your Physical Social Engineering PenTest
By: ChrisTCPD
April 7, 2017

The time has come to test your physical security via social engineering.  The budget did not support hiring a professional firm or consultant so it comes down to testing yourself.  Here are a few first steps to get you ready. Get Out Of Jail Free Letter First and foremost, ...

Exploring The Dark Web: Don’t Venture In Alone
By: rcubed
April 6, 2017

Cyber Threat Intelligence is a complex topic consisting of a lot of moving parts. It requires a high degree of technical knowledge combined with a healthy dose of paranoia. Staying ahead of the bad guys or simply keeping up with them is a 24/7 job. Threat intel is gathered from a multitude of sources and one place that’s being ...

5 Entry-Level IT Jobs to Kick-start Your Tech Career
By: jrinehard
April 6, 2017

There are plenty of great entry-level career options that will put you on the right path for a lucrative career in the IT field, but starting a new career, especially in the IT industry can seem a bit confusing at first. What position is right for you, what certifications do you need and what can you ...