0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Don’t be Nervous Your New Co-Worker Could be a Robot
By: Olivia
April 3, 2017

In the past, I’ve written with a mixture of excitement and hesitation on the topic of Artificial Intelligence (AI). AI is defined as: the theory and development of computer systems able to perform tasks that normally require human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.My post ‘A Buzzword to Rattle your Brain’ explored ...

[Part 2]$~Metasploit for Beginners
By: spiritedwolf
April 3, 2017

Metasploit for beginners So, hello friends. This is my 2nd post on Metasploit for beginners if you haven't checked the previous post then it is here. https://www.cybrary.it/0p3n/part-1metasploit-beginners/ So, today we will discuss " Metasploit ...

A Penetration Testing Checklist For Linux Machine – Intrusion Discovery
By: gurubaran
April 3, 2017

Since we already discussed  A Penetration Testing Cheat Sheet For Windows Machine – Intrusion Detection , here we will see the most important Linux machine pen testing checklist on an occasional premise (day by day, week by week, or each time you log on to a framework you oversee) gone through these anomalous behaviours  to search ...

Escaping Linux CHROOT Jail
By: chiheb chebbi
April 1, 2017

Introduction Isolation is a security approach provided by many computer systems. It is based on splitting the system into smaller independent pieces to make sure that a compromised sub-system cannot affect the entire entity. This approach is present in every modern operating system (e.g User accounts, process address spaces etc..). Chroot Jail is a way to separate a ...

Web Server Penetration Testing Checklist
By: BALAJI N
April 1, 2017

Web server pen testing performing under 3 major category which is identity, analysis, and reporting vulnerabilities such as authentication weaknesses, configuration errors, and protocol relation vulnerabilities. "Conduct a serial of methodical and repeatable tests"  is the best way to test the web server along with this to work through all of the different application vulnerabilities. ...

HTML Injection Introduction
By: Hari Charan
March 31, 2017

  What is HTML injection? As you know,  HTML  is used to design web pages. Yes, you’re right. But what happens if a developer forgets to sanitize the user input. What happens if developers don’t predict when a hacker use the application. Do you know what all could be done if this vulnerability exist? To inject you don’t even need a toolkit. You may ...

UNM4SK3D: FCC, WhatsApp, and GiftGhost
By: Olivia
March 31, 2017

#privacyrules Ladies and gentlemen, start your VPNs. As of March 28th, the House of Representatives and the Senate agreed to repeal the FCC's recent privacy rules. And while those rules still need President Trump's likely signature, many are rushing to Google 'Private network how-tos,' with VPN subscriptions in the US surging by 239% ...

GOLISMERO Framework - The Web Knife
By: spiritedwolf
March 31, 2017

Hello Everyone, Today on the behalf of Legion group I would like to make a tutorial on GOLISMERO The Web Knife. Actually one of my friends told me that, "theharvester or golismero.py. Both of those tools are excellently written scripts ...

Overturning FCC Privacy Ruling: A Marketer’s Viewpoint
By: rcubed
March 30, 2017

The United States Senate voted last week to reverse broadband privacy rules put in place last October requiring ISPs to get consent from consumers before selling or sharing their Web browsing data and other private info with third parties. The vote was split decidedly along party lines with the deciding edge going to the Republican-controlled Senate. A similar result ...

Lateral Movement Part 1
By: Alfie
March 30, 2017

Scenario:  you are a normal user in your company’s domain. No admin privileges. Nothing. You can’t even install a program on your machine.What if I told you, that you can be the local administrator on your machine and  probably  on several more in your organization?I am not able to count the number of things you are able to ...