Cybrary Pro Day is here!

0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

ITIL v3 Foundations Summary & Outline
By: cdoyle
October 15, 2016

(outline as of 9/20/2016) Course Title:ITIL Foundation Module 1 - What is ITIL Information Technology Infrastructure Library "A globally recognized best practice for quality IT Service Management (ITSM)" History: ITIL v1 (1989-1990) ~approximately 50 books ...

Top 10 Android Tools For Security Auditing and Hacking
By: ex0xpl0it
October 15, 2016

With the plethora of OS available for mobile devices,  Android which is the most common,  is in my opinion, the best. Android is an operating system  which allows you to install other applications on the device.  This informative article will list some of the best ones available. Using Android to hack is becoming very common and each day more ...

Artificial Intelligence In The Cyber Domain
By: james8
October 14, 2016

While it’s true that there is a growing need to fill the cyber workforce with human talent, artificial intelligence will play a vital role in the future. This notion often reminds me of the movie the Matrix where a cyber intelligence is self-aware. However, this is a highly exaggerated and fictional scenario.Automating what can be done with incident response ...

To root or not to root your Android device
By: m0yP
October 14, 2016

So here we are, close to Android 7, or N (for Nougat)'s release. The biggest mobile platform in the world (1.4+ billion users) with Google's new mobile operating system.First of all, let me clarify something: this will not be a how-to guide, I won't try to convince anyone to root or not to root their device, nor I ...

Forge and Sniff Packets Using scapy for Python
By: prometheus
October 14, 2016

Hello, and welcome again! Scapy is one of the powerful packet manipulator and decoder libraries for Python.  Scapy is used for forging and manipulating packets through python and can also be used as an alternative to carrying out a few functionalities provided by popular Wireshark and Nmap.In this article lets see how to use few basic functionalities of ...

Workarounds for Chrome
By: lemmycv
October 14, 2016

Google Chrome is a great browser when it comes to responsiveness and speed but at the sacrifice of memory. I personally love to make sure my computers are running as lean as possible and I wondered if I could do the same with chrome. Lo and behold, there are ways to speed up your browsing. ...

Practical Social Engineering Tactics
By: MohammadYahya
October 13, 2016

Attackers know that hacking a WiFi key is just a temporary thing. Maybe they think, why not hack the entire connection instead? Well, here are some basic "tried and true" social engineering tactics that actually work, and you should be aware of. Don't get taken advantage of by these simple actions. 1. The Cold Call:  On hacking something, port ...

Rule/Behavior Based Payment Authentication
By: Niyaz
October 13, 2016

The world is rapidly evolving with technology inventions. Many of such advancements are happening in the payment industry. In the 90s, no one would have believed using mobile phones to make payments for day to day shopping,  but the fact is, it is happening now. The time is very near when no one will ...

CIA Triad: Easy as ABC
By: infosectdk
October 13, 2016

Does everyone know what CIA means?Well I hope you do.There are lots of acronyms, and often they have different meanings in different settings.WTF can mean Web Threat Framework, from a data management view it can also mean “Where’s the file?” and of course there is that other meaning, which I don’t need to elaborate on.But ...

Cybercrime and the Gaming Industry
By: rcubed
October 13, 2016

Groups with ominous-sounding names such as Lizard Squad, Team Poison, and the Armada Collective are making a virtual killing from cybercrime. But the attack surfaces they target aren’t what you may have come to expect. Rather than going after financial and banking platforms where more challenging safeguards and harsher penalties are in place, these enterprising cybercriminals are ...