0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Journey through Command Line Tools
By: coldking
February 28, 2017

Hello Everyone,I've been a part of the Cybrary community for some time, and I thought about sharing my journey through the command line, alternative tools to get away from GUI based programs, and why you should use them.Recently I've been trying to cut off as many programs that have command line based alternatives.  To some of you newbies, this may ...

Watering Hole Attack
By: bachan
February 27, 2017

Hello, Guys! I think many of you have heard the recent news that a group, known as Lazarus, infected a Polish bank's website and targeted 150 different IP Addresses around 31 countries. The trick used by the group was called the Watering Hole Attack. Let's take a look at what a watering hole attack is. It is a ...

Ethical Hacking - Kali Linux 2.0 Tutorials
By: pnp.007
February 27, 2017

Kali Linux & Parrot Security OS, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments. Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools aimed at various information security tasks, such as  Penetration Testing, Forensics, and Reverse Engineering. Kali ...

Raw Log Anatomy: Understanding My SIEM System
By: deleriumendless
February 26, 2017

Raw Log Anatomy: My SIEM system reads my raw logs, why do I need to understand them? **NOTE: Examples used in this posting are very old, but the principles remain sound. I had a choice between using very old logs that I could leave whole, or make significant changes ...

Coding Theory: The wide world of cryptography
By: Rachel Laura M
February 25, 2017

Coding theory and cryptography are two well-known areas of information security as both are necessary for today’s technology oriented; online-based world. However, many wonder what is the difference between coding theory and cryptography? Essentially, coding theory is associated with error correcting codes. When learning about coding theory, remember these three associated terms: Data Compression: ...

Kali Linux - Hacking OS Tutorial Series
By: pnp.007
February 25, 2017

UA Tester A tool for User Agent WAF, IDS/IPS, and Redirection testing.UA-tester is a tool to check whether a website provides different pages for different user agents like for mobile, desktop bots etc. Well, this tool also delivers a lot of information. It is basically a python script which runs through various user-agents on a specified site. It also ...

Crack the CEH Exam
By: priyajatoliya
February 24, 2017

EC-Council stands for International Council of E-Commerce Consultants that is a member-based professional organization of global reach. Certified Ethical Hacker (CEH) is an EC council certification that is awarded to indicate your adeptness in network security, particularly in checking malicious hacking attacks, through preventive countermeasures. A certified ethical hacker can infiltrate a network and inspect extant vulnerabilities at the behest of ...

UNM4SK3D: Google, Netflix, and Bill Gates
By: Olivia
February 24, 2017

#SHA-1 Maybe you've heard of it, and maybe you haven't. But Google just impressed the world again by producing the first successful SHA-1 collision attack ever. And that means it's officially time for services to migrate to safer cryptographic hashes.  Let's back up. SHA-1, Secure Hash Algorithm 1, is a very ...

How to Delete Linux and Fix Windows Boot System
By: Suminder Singh
February 23, 2017

Hello, users!This is my first post on Cybrary, so please leave comments at the bottom letting me know how I did with this.I'm going to tell you how to fix your dual windows system if you want to delete your Linux OS and save your Windows OS. Let's get started! Nothing tough, just follow my steps and you'll do ...

Insights and Trends on Micro Certifications
By: Olivia
February 22, 2017

Linux Academy and Cybrary  survey 6,000 IT professionals on experiences with micro certification. Results offer insight into learning preferences, certification in the workforce, training costs, and trends. To read the full press release, click here.