0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


You won’t pass or fail. You’ll just get some direction.In previous blogs, I offered tips on how to earn specific Micro Certifications, and how to determine which Micro Certifications were best for your career goals. And while making career decisions is a serious matter, I thought of a fun way I could go about offering more help.I’m sad to admit ...


To excel at penetration testing , you need to have your lab for practice/research. I would suggest you to use virtual machines which are free in the market. I would go with VMware Workstation rather than Virtualbox, it’s just my personal option. You can choose any one. Downloads 1. VMware Workstation Click ...


Welcome back! To continue with the previous article, here we will learn to create a shell code with Metasploit and PE infector via Shellter into a Win32 application. For those who have not read part I, you can read it here . We have several ways to do that but keep ...


Step#1 – Admit That You Have a Problem Many IT professionals live in a world of denial. Assumptions are made about the security of systems and risks are often ignored. These stances are not taken out of ignorance or irresponsibility but are instead often-pragmatic decisions based on the number of resources available and the number of hours ...


If you are an avid reader of 0P3N, chances are you’ve seen a post or two from avid contributor Priyank Gada ( @groupflexi ).Priyank, who has experience as a forensics expert and penetration tester, frequently makes YouTube videos to share his knowledge.One area he’s extremely knowledgeable in is Kali Linux, which inspired his new Micro Course, now ...


Hello, Guys!I hope you are enjoying my posts. Here I will tell you about an attack which is very hard to detect.The pharming attack.When you type in a URL (www.example.com) into your browser, it then goes to the DNS server to convert it into an IP address. After resolving the domain name into an IP address, you can communicate to the desired ...


I <3 Social Engineering! Here's my story about how easy it can be to get contact information.So about 3 months ago, I was on the bus going home from school. I ended up getting a text message from an unknown number that was in my area code. It read the following,"Hey man, the people texted me asking about the walls. They are ...


Did you ever think of hacking into anyone's phone and getting all the data like they do in the movies? Well, that's not actually hacking but it's called spying. Spying is a term in hacking but not considered as hacking. A hacker can remotely install Spyware to spy on others. Ever wonder what would happen if a hacker gained physical access to ...


[/{REGEX} + /{PYTHON}] Regex or regular expressions can be used to identify a particular pattern in a large dump of data. This comes handy when there is a requirement to extract/identify a particular pattern of data from a heap of data. USAGE: Log files contain a ...


#wikileaks (they just keep coming). You know that feeling you get when your favorite artist continues dropping singles but doesn't release an album? The same can be felt for Wikileaks, but instead of anticipation, their releases cause anxiety. The latest series of documents from the Vault7 project was released on March 31st. These documents detail ...