0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

End User Awareness: Ransomware
By: prezzio
September 24, 2016

Users are receiving increasing numbers of  phishing emails  containing  ransomware , both at home and at work. Some users can accidentally activate the virus and as a consequence, their colleagues at work might be seriously impacted. This short communication will teach your users what ransomware is and how to defend yourself. Please read it carefully.  Ransomware  is a type of computer ...

Hacker vs. Cracker – Do You Know The Difference?
By: Jennifer
September 23, 2016

The term hacker has been misunderstood, misused and represented in the press as a malicious person.  The mainstream media uses these terms interchangeably, and this has led to confusion when communicating to others about security issues and techniques.  Unfortunately the misunderstanding and use of the terms in the press  has this  misconception implanted in the minds around the globe, ...

Using VLAN Maps
By: cybern4
September 23, 2016

VLAN Maps are used to filter or redirect traffic in a VLAN, giving you more granular control over the traffic.   Steps to Configuring a VLAN Map   Determine what you want to accomplish : It is vital to know what you want to achieve prior the configuration. This will save you lots ...

Hiding in Plain Sight - The Art of Steganography
By: RoninSmurf
September 22, 2016

In this article we are going to look at steganography, or how we can hide common notes and files into images and audio files. Steganography is a fascinating topic and tool that can be used and studied for various reasons. Using these tools are incredibly easy, and this guide is intended to help introduce people to steganography. ...

State of the Art Wi-Fi Security
By: siva
September 22, 2016

Wifi is everywhere these days. From homes to large enterprise corporate networks, wifi is quick and easy to install, easy for employees to use, and more constantly supported on mobile. However, the greater availability of Wifi means increased danger from attacks, and increased challenges to an organization, and IT security professionals. The main ...

Pentesting Scanner for SQLi/XSS/LFI/RFI
By: Babak Esmaeili
September 21, 2016

v3n0M v4.0.6 – Popular Pentesting scanner in Python3.5 for SQLi/XSS/LFI/RFI and other Vulns V3n0M is a free and open source scanner. Evolved from baltazar’s scanner, it has adapted several new features that improve fuctionality and usability. It is mostly experimental software.This program is for finding and executing various vulnerabilities. It scavenges the web using dorks and organizes ...

Restoring GRUB After Installing Windows
By: doctorX
September 21, 2016

Hi Cybrarian! Today I'm gonna share with you 3 ways to restore GRUB boot-loader after losing it when you decided to dual boot windows with Linux. The reason for this problem is that windows doesn't recognize neighboring systems, and it's a common problem. Now I will show you how to restore this by using 3 methods: live ...

OWASP's 13th Annual AppSecUSA Conference
By: Tatianna
September 20, 2016

We’d like to invite you to OWASP ’s 13 th Annual AppSecUSA Conference taking place in Washington, DC, October 11-14. The event is comprised of two days of training sessions followed by a two-day conference where software security leaders, researchers and technologists discuss cutting-edge ideas, initiatives and technological advancements to secure web applications. This is ...

Create your first interactive program in *Juliar *
By: Rattar
September 20, 2016

Today, we will create our first interactive program in Juliar . First we will need latest version of Juliar We can get this by going to www.juliar.org/downloads.ju  and downloading the Linux or Windows version.Open notepad or your favorite text-editor program and copy and paste the following:  How old are you?ask x condition=>= 18 *get ...

Social Media and Apps "Stealing" Your Information - Mobile Security Test Tools
By: jadenturner
September 20, 2016

[clear] This particular list is due to the seriousness of mobile security testing which is a grossly overlooked and ignored area and probably one of the if not the most important.  As I predicted in my 2014 article "Security Testing for Critical for 2015" - security is still in it's infant stages.  Seems we are still in the reactive ...