0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



Estimated reading time: 3 minutes Summary: This tutorial is for password auditing of network credentials within your domain. We will use Kali Linux along with some open source software to validate your password policies. As always make sure you have permission to perform this audit at the least every everyone should check to verify that people using ...


Estimated reading time: 2 minutes Something interesting you might not know is "Apple's" phishing email. There are a number of different emails claiming to be from Apple being sent to people. Let's say that someone signed into your iCloud or Facetime account and gave you a link to follow. ...


Android is the Google platform billions of people use on their smartphones. The origins of Android began in 2006, around the same time that Apple denied it was creating the now ever-popular iPhone. Compact laptops were the hot new item and the tablets of the day looked like a laptop sans keyboard. The smartphones back then were Blackberries and ...


Hello Cybrary Community, Today I’ll show you how to test the availability of a webserver using Python: Let’s start writing our script. import socket, sys if len(sys.argv) != 2: print >>sys.stderr, 'usage: python test_webserver.py <www.example.com>' ...


Introduction to Computer Science Security Tutorial Estimated reading time: 2 minutes Welcome to this crash course on security. My aim for this tutorial is to fill the gap between the academic courses (knowledge) part and real life scenario (practical) part. My motivation for doing this tutorial is based on personal issues I ...


#cyberpolicy You've heard of the 12 days of Christmas, now post- holiday we're looking at 60 days of cyber. An Executive Order draft reveals the White House will be calling for swift review of “national security systems” within 60 days of the order being signed. During this time, President Trump says he will "ask ...


Estimated reading time: 6 minutes Hello, Cybrarians!All of you should be familiar with SQL injection, but today databases are not simply following the tradition of relational databases. Today, many firms are using NoSQL database platforms like MongoDB and Cassandra. So, for hacking those databases, SQLMap is not the option you need or want.NoSQLMap is an open source tool ...


Age does have some benefits, though they are sometimes hard to appreciate among the aches and pains and general tendency for complaining about…well, getting older. In some respects, I was fortunate to begin my career in technology in 1980 just when things were getting interesting for that field. It would be more than a decade later before ...


Estimated reading time: 6 minutes Intro to OSSEC HIDS OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection and real-time alerting and active response. When tied together with something like Snorby, Sguil, ELSA or Alienvault, this can be a very powerful tool ...


Estimated reading time: 2 minutes Hi All, The following article is intended as a brief introduction to the Veil-Evasion tool. This is part of the Veil-Framework was created by Chris Truncer . The Evasion tool is used to generate a range of different payloads ...