0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Hello! Welcome to the first post! I am Muhammad Habib and this post will be about internationalized domain name or IDN Homograph attack. We will be attacking a browser supporting IDNA to perform a phishing attack. First things first: What are homographs? Here’s a simple example ... for the coders here. There’s a prank in which you ...


What happened? The WannaCry strain of encryption-based ransomware, also known as Wanna Decryptor, WCRY, or WannaCrypt, began spreading through Europe to Windows-based computers on May 12, 2017, and holding victims’ data hostage for ransom. As the day progressed, many large firms in Spain, Britain, Russia, China, and Portugal were forced to shut ...


The blog is for the new GNS3 VM (Virtual Machine) users on Windows 7/8/10. What is gns3? It’s a graphical network simulator that allows you to design complex network topologies, where you can run different devices (irrespective of vendors) like cisco, juniper, chCheckpointFortinet, PFSense etc. New features: Gns3 ...


BSidesTLV 2017 was a unique place with a very special atmosphere. Friendly, and vibrant it invites to observe and admire the shared knowledge. Exciting, spectacular, surprising, fascinating- impressions that were left to any visitor or speaker. Security BSides is a hacker convention that runs guidelines to a ...


PST Compress Tool is a one-stop solution to compress large PST files in a couple of seconds. This PST compression tool has got an extraordinary ability to compress PST files by removing big attachments and storing the compressed PST files. This PST Compact Tool Flawlessly reduces PST file size by removing irrelevant PST items. This full-featured PST Compact Tool is ...


Hello all,I haven't posted an Op3n in a while. I've been very busy. In this tutorial, we will learn the power of a new Juliar command: " sysExec() " sysExec() allows you to execute Command Prompt and Terminal commands right inside of Juliar. You might be thinking why would you want to use Juliar to create scripts ...

I'll get straight to the point. As a business owner, I've learned some lessons over the years and want to share my experience in a quick way.Any business owner, regardless of the level of operation, should employ a white hat to secure/test all of their systems - the U.S. government (and presumably other country governments) does this to test ...


JavaScript is the most commonly used programming language on a global scale. Even Back-End developers are more likely to use it than any other language. A survey from Stack Overflow revealed that 90.5% of developers know JavaScript.What makes these development skills so valuable? For starters, front-end developers make an average of $75,563 in the US, according to Glassdoor ...


Shadow Brokers is a hacker group which has leaked several NSA hacking tools and scripts to the public. Firstly when they got hands on NSA tools they tried to auction it in the black market ranging from 2 to 200 Bitcoins, but the auction failed and they leaked all the dump in public on Github. ...


You may not be surprised to know that women only make up 11% of cybersecurity workers globally, according to an ISC2 report. This staggering underrepresentation is reflective across all STEM careers, a fact that is only adding to the skills gap in the technology industry.Many women who are in the field, such as Magda CHELLY , Cybrary SME, Cyber Feminist ...