0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Hello Guys. This is my first video on Cybrary. It deals with cracking SSH Passwords with Hydra. Yes, I know the video is old (from 2014), but the info is still relevant. If you have any questions, please comment below and I'll answer as soon as possible. Transcript: 0:00 ...


This script does a lot but has some impactful key features that are worth reviewing. The Rubber Ducky Recon Script displays the current WiFi Connections credentials by exploiting the [ ] character in Command Prompt, which acts as "everything". So in this script, we are using the in netsh wlan show ...


XSS is a very commonly exploited vulnerability type which is very widely spread and easily detectable . An attacker can inject untrusted snippets of JavaScript into your application without validation. This JavaScript is then executed by the victim who is visiting the target site. Cross Site “Scripter” (aka XSSer) ...
![Kali Linux For Ethical Hacking 1c - Info Gather with SPARTA Lab [Video Series]](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

Ok, welcome back to my new video post on using SPARTA for Information Gathering. This is part 01c and you can find my other 2 parts 01a/01b in OP3N . Basically, the target audience of this video is Kali Linux beginners.In this video, we will see a Python Script build tool in Kali Linux ...


A topic that has filled my mind for some time is the fine line that is often crossed between privacy and social information. We have seen the Mr robot series and how he reflected that security researcher or hackers don't have a good social life, and we all see how social apps entered our lives. Now we share everything we ...


Definitions and Types: Mediation is considered a unique system referring to a method of resolving disputes among conflicting parties. In general, it is the role of the mediator who is the third party to provide assistance, to the parties involved, in order to negotiate an agreement. Mediation refers to a status in which the mediator, who ...


What is Web Application Penetration Testing? Web Application Pen testing is a method of identifying, analyzing and Report the vulnerabilities which exist on the Web application including buffer overflow, input validation, code Execution, Bypass Authentication, SQL Injection, CSRF, and Cross Site Scripting (XSS) in the target web Application that is given for Penetration Testing. Repeat ...


#ransomware Hacking group referred to as 'The Dark Overload' took their Netflix addiction to a new level and released 10 of the 13 newest episodes of hit series 'Orange is the New Black' after the company failed to pay the desired ransom. Talk about Netflix and not chill. The series was set to ...


How Digital Crimes Fit with the Current Legal System Crimes have been evolving throughout our history, as there are new secure ways created to protect the society, the criminals are getting smarter in breaking these new ways. Society till the late 19 th century consisted of all physical items such as paper files, ...


Today I’ll show you how to be more efficient and faster when you want to code. My secret is Atom, an open source text editor, used by the majority of elite coders under the same vim, sublime text etc. Atom has the particularity to contain thousands of packages that will make your job easier. You can download it at, ...