0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



List of crafted instructions, executed once the code is injected into the application specifically running applications are called Shell Code. This is possibly done with the popular way via a Stack Buffer overflow & Heap-based Buffer overflow . It’s about referring to start command shell through the customized written code. ...


I think it’s safe for me to assume that anyone who’s the least bit familiar with cyber security has heard of Black Hat and White Hat hackers, and even those in between, the Gray Hats. I’d like to expand your cyber lexicon further and introduce you to the newest category: Silver Hats. A "Silver Hat" is a ...


Hello Cybrarians,Chinese fraudsters are using fake cellphone towers to spread android banking trojans. They are using the SMiShing attack for this type of fraud. Here is where a new word came into existence is SMiShing.SMiShing (aka SMS Phishing) is defined as a phishing attack sent via SMS. In this type of security attack, fraudsters trick users into downloading a trojan horse, virus, worm, ...


In my experience working in IT, I have seen many organizations who leave peripheral devices on the network with internet access and they leave the passwords at the default settings. The servers and workstations are secured. Network switches, wireless access points, and routers are locked down as well. For some reason, people do not see printers, scanners, and copiers ...


4 SIMPLE STEPS TO ANONYMOUSLY SCAN A REMOTE WEBSITE USING NMAP Here are the materials required to successfully follow this tutorial: A laptop with an access to the internet A remote website that you own or that you have ...


This story begins in the fall of my first-year cyber security class. We were put into groups during our "cyber spookhouse" the point of the activity was to show and inform our fellow students, from different industrial fields, to coerce them into hardening their security. I was placed into the MITM group with four others and we decided to ...


In the past, I’ve written with a mixture of excitement and hesitation on the topic of Artificial Intelligence (AI). AI is defined as: the theory and development of computer systems able to perform tasks that normally require human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.My post ‘A Buzzword to Rattle your Brain’ explored ...
![[Part 2]$~Metasploit for Beginners](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

Metasploit for beginners So, hello friends. This is my 2nd post on Metasploit for beginners if you haven't checked the previous post then it is here. https://www.cybrary.it/0p3n/part-1metasploit-beginners/ So, today we will discuss " Metasploit ...


Since we already discussed A Penetration Testing Cheat Sheet For Windows Machine – Intrusion Detection , here we will see the most important Linux machine pen testing checklist on an occasional premise (day by day, week by week, or each time you log on to a framework you oversee) gone through these anomalous behaviours to search ...


Introduction Isolation is a security approach provided by many computer systems. It is based on splitting the system into smaller independent pieces to make sure that a compromised sub-system cannot affect the entire entity. This approach is present in every modern operating system (e.g User accounts, process address spaces etc..). Chroot Jail is a way to separate a ...