0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Biometric Verification as Identity Theft Protection
By: Immanuel V
November 7, 2016

As a cyber security expert doing a lot of research I've found a solution for identity theft.A security step added for identity verification which is known, but not added as a process in either the industries or governments of many countriesWe all know that by using foot- printing and reconnaissance methods, a hacker can access SSNs, personal information, addresses, ...

Passwords: First Line of Defense Against the Prying Eyes on the Internet
By: Clouds
November 4, 2016

  All of us remember the tale of Alibaba and Forty thieves, where Alibaba protects the treasure with a secret passphrase to enter the cave “Khulja, Simsim”. But unlike Alibaba who just don’t have to remember more than one password, today password became an integral part of our lives.  From social ...

Networker's View of Windows CMD
By: beller0ph0n
November 4, 2016

Networker's View of Windows CMD: Hello fellow members of this wonderful community. Today we shall once again dive into the MS Windows CMD to explore some of its commands which can help us troubleshoot/manage networking configuration of our computer. First and arguably the most important command on our list is ipconfig (Internet Protocol ...

Computer Forensics and the Hillary Clinton Email Case
By: rcubed
November 3, 2016

I thought it might be both interesting and challenging to examine the recent revelation about the newly discovered emails on Anthony Weiner’s laptop. Emails that the FBI feels may be pertinent to the Hillary Clinton Email case. It should be an Interesting topic for Cybrarians taking any of the courses here on Cybrary.it dealing with computer ...

How to Shutdown Windows OS Interactively via Shutdown Command
By: beller0ph0n
November 3, 2016

Microsoft Windows 7 operating system, as well as previous versions of Windows OS, comes with a  built-in shutdown command which among other things enables the user to initiate a shutdown procedure. By entering the   shutdown /? command inside CMD (Command Prompt) you can see the ...

Bypassing Windows Password via USB
By: dharavsamani
November 3, 2016

Bypassing Windows Password via USB Requirements:   Kon-Boot for Windows 2.5.0 USB drive Victims computer (It Can Bypass Windows XP,  Windows Vista, Windows 7, Windows 8, Windows 8.1 ...

How to Crack LM and NTLM Hash: CudaHashcat
By: bachan
November 2, 2016

Hi, guys!Today I will show you how to crack windows password hashes.Tools used: CudaHashcat Cain and Abel A strong dictionary OK, let me clear some things up, first:  When you save your password in windows, it is encrypted into hashes. Hashes are stored in the SAM file. I will crack ...

How to Improve TCP Performance
By: thaveshnig@gmail.com
November 2, 2016

Chapter 1   1.1] Introduction:   This report will focus on the areas of which TCP performance is significantly improved. IETF, RFC, multi-rate networks, wireless networks, TCP/IP, adaptive window, end-to-end performance, TCP improvements with regard ...

ATSCAN: Web Vulnerability Finder
By: bachan
November 1, 2016

Hello Everyone,It's time to scan for web vulnerabilities. As we all know finding vulnerabilities in websites is fun as well as profitable. We can get hall-of-fame notoriety and bug bounties.A tool atscan  is going to help.  A clone is available from GitHub, here .  It is a tool that was written in Perl and developed by Alisam Technology.Alisam ...

Top Skills for Getting Hired in 2016
By: rcubed
November 1, 2016

LinkedIn.com recently reported a spike in job applications for October 2016. At the same time, they revealed their Top Skills of 2016 , an annual list of skills employers need most. If that weren’t enough, LinkedIn.com broke things down on a global scale and included top skills across 14 countries. I suppose if you’re so inclined, ...