0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Pentesting vs. Vulnerability Assessment in Typical Application Scenarios
By: Joul Kouchakji
October 20, 2016

Pentesting vs. Vulnerability Assessment in Typical Application Scenarios: Analogies, Differences, Failures & Opportunities 1. Introduction The increase of internet connectivity brought a kind of confusion to several e-commerce industries as many vital vulnerabilities that have caused them a huge damage in their systems, have been identified as a web application vulnerabilities. These security breaches found by conducting ...

Ransomware Protection
By: mysticman2k
October 20, 2016

I recently wrote a post in the forums regarding ransomware prevention, I'd like to highlight some good practices that can help you out with the prevention of Ransomware being executed against your /clients servers.After attempting to develop our own in-house solutions to prevent the automatic encryption of files we found that the process was cumbersome due to the MS Windows Operating ...

Apache Guide to Running *Juliar * on a Webserver
By: Rattar
October 19, 2016

  This guide will teach you how to run Juliar on a WebServer. For those of you who haven't heard, Juliar is actively being developed to work as a server side language.You might ask: Why should I use Juliar to run a webserver? Besides being quick and easy to use. Juliar provides nice commands that allow ...

Practicing for the CCNA Using Cisco Packet Tracer
By: NGNSkull
October 19, 2016

Welcome to this quick guide on how to create small labs to practice routing, switching and more with the help of Cisco Packet Tracer.This is Cisco's network simulation software, which is used in instructor-led courses.It's fairly quick to learn and really easy to use.  It'sgot a lot of Cisco equipment ready for you to play with. You ...

Windows USB Forensics
By: Charanjeet Singh
October 19, 2016

Today, I’m going to tell you about windows usb and removable media forensics. Whenever we connect some external removable media device to a laptop or pc,  generates registry entries which contains a lot of information like device name, device type, its manufacturer name as well as information about the last  device connected to the pc. This type of information is ...

NoobSecToolkit V3 - A Security Students Playground
By: Krintoxi
October 18, 2016

NoobSecToolkit is a Python Based Tool kit that brings together powerful security and anonymity tools and scripts with predefined security configurations and modifications. Making it very simple for students to get started with offensive security! I have made articles  showing  you how to enhance your Linux Security and facilitate basic penetration testing using version 2 ...

Introduction to SIEM
By: vinothpkumar
October 18, 2016

Hi Readers, We’ll see a brief introduction about Security Information and Event Management (SIEM). What is a SIEM? SIEM is a tool that helps us to monitor our network traffic and provide real-time analysis of security alerts produced by the applications. SIEM is also a log management tool that gathers logs from different applications ...

Power Grid Attack – Doomsday Scenario
By: rcubed
October 18, 2016

We’ve all heard the scare stories about how hackers will one day successfully launch a power grid attack in the US. You may have even tried to imagine it by comparing it to something you can recall from recent history such as the infamous Northeast Blackout of 2003. A cascading series of calamitous events caused a large ...

How To Crack WPA/WPA2 Wi-Fi Passwords Using Aircrack-ng
By: Tejareddy
October 17, 2016

In this post I will tell you how to crack wpa/wpa2 wi-fi in kali linux using aircrack-ng. To do this, first you should install kalinux or you can use live kali linux. To make a kali-linux bootable click here . To crack Wi-Fi, first, you need a computer with kali linux and a wireless card which ...

Forensics for Vigilantes
By: catcopy
October 17, 2016

Rule#1.Remains anonymous- A vigilante always logs into anonymous accounts.Rule#2.Know the law- A vigilante knows the law and knows how to identify crimes that she/he would like to pursue.Rule#3.Collect data and file reports- When you meet a perpetrator on-line, collect all evidence to incriminate the person enough to file a report.Rule#4.Don't get intimidated.- When you warn people about their behavior ...