0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Human Hacking: Social Engineering 101
By: Zoran L.
December 14, 2016

Human Hacking: Social Engineering 101  Typically, people are the weakest link in a security chain lifecycle; therefore, they – not technology – become the priority of a hacker.  In the most of high-profile data breaches, hackers used some form of social engineering.Companies may spend millions of dollars to protect their data with ...

Here’s How to Get Hired: 7 Resume Must Do’s for the IT Professional
By: Olivia
December 14, 2016

Once upon a time, I worked as a recruiter for a telecommunications company.And I believe that while your interview skills are incredibly important, one’s resume is truly the ‘key to the kingdom’ of sorts. After all, if you can’t get through the door at a company, then your interview skills are essentially useless. Trust me when I say having looked ...

Linux Smackdown: Which Distro Reigns Supreme for Pentesting?
By: rcubed
December 13, 2016

There are some things in life that were simply meant for each other: peanut butter and jelly, snow and Christmas, and Friday night and pizza. In the case of pizza, it goes well with pretty much anything, especially cold beer. When it comes to the art of pentesting, the first ingredient is a target loaded with vulnerabilities. ...

CEH vs. OSCP: A Modern Analysis for the Career-minded Professional
By: jrinehard
December 13, 2016

Rising to the surface in a sea of cybersecurity hiring candidates demands more than mere skill. Employers demand stronger assurances, and the best guarantees of employee talent come in the form of certifications.Choosing between obtaining Certified Ethical Hacker and Offensive Security Certified Professional credentials may seem difficult to the uninitiated. Here's some vital clarification on which ...

So You Have a Virus …. Now What? - An End User's Guide
By: RoninSmurf
December 13, 2016

The intention of this document is to help the end user (normal non IT professionals) with how to deal with a computer virus. While this is intended for the end user. IT professionals may find it useful for some tips or help with dealing with the everyday user that finds themselves in a bad situation. So you ...

Let's "C" How this Goes: Programming Introduction to C
By: jnox
December 12, 2016

Hello there fellow Cybrarians! Let me start out by saying thank you! Thank you to all the people willing to take the time to help us learn about the IT world and willing to lend a helping hand to others, so thank you to everyone on Cybrary! ^_^ Ghost hug (you don’t feel it but ...

Timestamp Information and Commands for Forensic Analysis
By: DaveB135
December 12, 2016

When conducting a forensic analysis of Windows Operating Systems it is extremely important for the analyst to have an understanding of the various time formats present within the Windows OS.  Since many examinations come down to the time stamps on various artifacts, the analyst should be able to describe and explain the various time stamp protocols if asked to ...

The National Institutes of Standards in Technology (NIST)
By: Rachel Laura M
December 10, 2016

What is NIST? The National Institutes of Standards in Technology (NIST) dates back to 1901. The United States Congress originally founded NIST as means to combat and issue with competition in the US during that time. Back in the day, the infrastructure in the USA was very poor and lacked the strength of countries such as Germany ...

Your Personal Guide to Staying Anonymous
By: bigcode1991
December 10, 2016

Welcome to a tutorial on the basics of staying "anonymous". From the movies you see a hoodie-wearing figure in a cyber cafe using public wifi and "an all in one tool" for not getting caught, and using a RAT (Remote Access tool). Well, its not that simple. There are some great OSs for anonymity and for those who think ...

Tutorial: An Intro to Blackbox Web Pentesting
By: Babak Esmaeili
December 9, 2016

Hello Friends,Today I'm gonna explain how to pentest a web application of a website in blackbox mode. The steps: Find the technology and the kind of  web page language Find all sub-domains exist for the website and repeat number 1 for them too (very important) Test every input include ...