0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Beware of the Google Docs Scam - How to Protect Yourself
By: indrajeet
May 15, 2017

Did someone share a Google Doc with you? If yes, you might be one of the millions of internet users who fell victim to this scam campaign.In the last few days, a lot of people received emails from their contacts with a seemingly normal and legitimate invitation to view a Google document  which says that the person [sender] "has ...

Management Quality: Concepts, Standards, and Implementation
By: themindandbeauty
May 14, 2017

Preface To begin, it is management which determines objectives. As follows, it is strategic management which meets customer satisfaction. The main emphasis of the quality management is that strategic management should make its efforts to satisfy its customers.The management should maintain strategies which improve quality; these strategies must observe variations which regular reasons constitute and find solutions degrading ...

Cyber Security Chronicles (Current State of Cyber Security)
May 13, 2017

By: Jeremy Bannister ( The Cyber Eagle ) Take 1 :  Enter the Eagles Nest (Intro)I have decided to write a series of articles that relate to the state of cyber security in today's' IT industry. I will share some of my ideas and suggestions that could not only greatly benefit the future of ...

Firewall Detection with WafW00f
By: Priyank Gada
May 12, 2017

WAFW00F is a Python tool to help you fingerprint and identify Web Application Firewall (WAF) products. It is an active reconnaissance tool as it actually connects to the web server, but it starts out with a normal HTTP response and escalates as necessary.You can override or include your own headers, it has SOCKS and HTTP proxy support and detects a ...

What is Penetration Testing to You?
By: jmcedric
May 12, 2017

My friend asked me "What is Penetration Testing?"I stumbled upon this question myself trying to figure out what the true meaning of "Pen Testing" is. I am doing it every day, like my daily routine, but that's it. Without thinking, I said to my friend, "pen testing is a process of someone who looks for security holes and reports them ...

UNM4SK3D: France, Android, and FIN7
By: Olivia
May 12, 2017

#hacked Hear no evil. See no evil. Speak no evil. Over the weekend, France ignored the 'massive' pre-election hacking attack on Emmanuel Macron’s campaign and elected him the new President over far-right candidate Marine Le Pen. Hackers leaked nine gigabytes of emails two days before the French Presidential Election, which everyone across the world ...

How to Use DNS Analysis Tools in Kali Linux
By: Priyank Gada
May 11, 2017

What's inside this video? I'll unpack it for you. In this video, we will learn how to use all DNS analysis tools present in Kali Linux. I am going to use Kali Linux 2016. You can use any version that you have. We will slowly learn all the tools present in Kali Linux. DNSRecon Help URL:  https://tools.kali.org/information-gathering/dnsrecon ...

Intro to the USB Rubber Ducky
By: D'Angelo Gonzalez
May 11, 2017

I've made a video on the USB Rubber Ducky by Hak5 which can be found at the bottom of this article. But, I will also go into some depth in writing here. So what exactly is the USB Rubber Ducky? In short, the USB Rubber ducky is not actually a USB in the traditional sense. It is ...

Which is best? 2.4 or 5GHz
By: bachan
May 10, 2017

Hello, Cybrarians!I've been asked many times which wireless signal frequency is better, 2.4 GHz or 5 GHz?If you want a deeper understanding you can look it up online or visit quora.com which is my favorite site because it helps me a lot.So, both are suitable for their work. Both are suitable frequency options, but which you use depends on ...

Hacking and Hackers Explained
May 10, 2017

Greetings Citizens of the World. Let me first introduce you myself. I'm The Geeq . Many of you might know my name but still, for many I'm anonymous. I'm here to tell you about Hacking: Hacktivism, Black Hat Hackers, Crackers, and more. Sounds Pretty awesome right? But wait, let me say that many of you would say that ...