0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


#wikileaks (but wait, there's more). At this point, the leaks have become a flood. And speculation is drowning us. This week, Symantec Security researchers have confirmed that the alleged CIA hacking tools exposed by WikiLeaks have been used against at least 40 governments and private organizations across 16 countries, and seem to reflect those ...


Module 2: Storage Device Configuration Part 1 Unit Overview Storage Types and Configuration Tiering Redundant Array of Independent DIsks (RAID) File System Types Disk Types and Configurations Removable Media - 1 Interface Type Access Speed ...


Wifiphisher is a tool that I love using on a daily basis. It's simple, easy and great for beginners and professionals. WHAT YOU NEED: Laptop with onboard or additional Wifi-Adapter 2x Wifi-Adapters (recommended) Targets (optional) I had to buy myself an additional Wifi-Adapter to the ...


Last weekend in Dallas the evening calm was shattered by the wail of 156 tornado warning sirens sounding at once. Attempts to turn off individual sirens failed and after 95 minutes of the din, officials mercifully shut down the entire system in a final, desperate act of frustration. A search for a direction in which to point the finger ...


Cloud+ Module 1: Cloud + Network Storage Types and Configuration Unit Overview Network and Direct Storage Types Accesses and Protocol Storage Preparation and Accessing Network and Direct Storage Types Network Attached Storage - NAS ...


One thing I have noticed during testing is that there are a number of vulnerabilities that occur as a result of TLS version and cipher suite used. So, I have added a few new tricks in my arsenal to hunt for SSL/TLS that are being used.We will discuss both of the following, one by one - ...


Back to Basics, Information Security: Today we all are running good so far with old and new security products to give us secure environments. However, we are dying in our knowledge of basics. What do we mean by "basics of information security"? The basics are nothing but hygiene. Similar to how we keep good hygiene at our house, work ...


Just like with any job there are tools, in the IT community there are millions of tools. Finding the tool that is most affordable and most efficient is important to make the life of any IT worker's life easy. But once you find the tools that make your life easier where do they go? Usually (at least for me) ...


You won’t pass or fail. You’ll just get some direction.In previous blogs, I offered tips on how to earn specific Micro Certifications, and how to determine which Micro Certifications were best for your career goals. And while making career decisions is a serious matter, I thought of a fun way I could go about offering more help.I’m sad to admit ...


To excel at penetration testing , you need to have your lab for practice/research. I would suggest you to use virtual machines which are free in the market. I would go with VMware Workstation rather than Virtualbox, it’s just my personal option. You can choose any one. Downloads 1. VMware Workstation Click ...