0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


DNS Definition: The Domain Name System (DNS) was invented by Paul V. Mockapetris an American computer scientist and Internet pioneer in 1983 with the help of Jon Postel. The aim of DNS is making retaining addresses easier by providing a naming structure using names rather than a long sequence of numbers. Remembering www.icann.org is much easier than remembering "192.0.32.7". Before ...


Ransomware attacks and data breaches are everywhere now, and it's only intensifying. With this comes a need for better security, but it seems that security professionals are tougher to attract and keep than ever before. This reason alone may help explain why top-tier salaries are on the rise. Now we’re seeing more recognition for the need to ...


The OST and PST files are the two bailiwick formats victimized by MS Convert and Outlook for managing all types of emails and attachments files of clients in an administration. Basically, it has seemed that galore of the users are death through the OST Corruption issues in which they had mislaid their all emails as fountainhead as attachments. Nevertheless, ...


Chronicle 1: The Cyber Security Chronicles {BY: Jeremy Bannister [The CYBER EAGLE]} Chapter 1 - Solid Foundation: IT Security Obstacles That Could be Building Blocks Do you think IT Security is a vital entity or major goal of focus for organizations when deciding what is an important asset, need, and ...


#greatfirewall The Great Firewall just got stronger. China's Ministry of Industry and Information Technology recently made it illegal to use or operate VPNs (Virtual Private Networks) without government permission in an effort to increase Internet censorship. Digital dumplings, fried. Back up. You may or may not know that the 'Great Firewall of China' is "the ...


Hello! Welcome to the first post! I am Muhammad Habib and this post will be about internationalized domain name or IDN Homograph attack. We will be attacking a browser supporting IDNA to perform a phishing attack. First things first: What are homographs? Here’s a simple example ... for the coders here. There’s a prank in which you ...


What happened? The WannaCry strain of encryption-based ransomware, also known as Wanna Decryptor, WCRY, or WannaCrypt, began spreading through Europe to Windows-based computers on May 12, 2017, and holding victims’ data hostage for ransom. As the day progressed, many large firms in Spain, Britain, Russia, China, and Portugal were forced to shut ...


The blog is for the new GNS3 VM (Virtual Machine) users on Windows 7/8/10. What is gns3? It’s a graphical network simulator that allows you to design complex network topologies, where you can run different devices (irrespective of vendors) like cisco, juniper, chCheckpointFortinet, PFSense etc. New features: Gns3 ...


BSidesTLV 2017 was a unique place with a very special atmosphere. Friendly, and vibrant it invites to observe and admire the shared knowledge. Exciting, spectacular, surprising, fascinating- impressions that were left to any visitor or speaker. Security BSides is a hacker convention that runs guidelines to a ...


PST Compress Tool is a one-stop solution to compress large PST files in a couple of seconds. This PST compression tool has got an extraordinary ability to compress PST files by removing big attachments and storing the compressed PST files. This PST Compact Tool Flawlessly reduces PST file size by removing irrelevant PST items. This full-featured PST Compact Tool is ...