0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


In the past, I’ve written with a mixture of excitement and hesitation on the topic of Artificial Intelligence (AI). AI is defined as: the theory and development of computer systems able to perform tasks that normally require human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.My post ‘A Buzzword to Rattle your Brain’ explored ...
![[Part 2]$~Metasploit for Beginners](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

Metasploit for beginners So, hello friends. This is my 2nd post on Metasploit for beginners if you haven't checked the previous post then it is here. https://www.cybrary.it/0p3n/part-1metasploit-beginners/ So, today we will discuss " Metasploit ...


Since we already discussed A Penetration Testing Cheat Sheet For Windows Machine – Intrusion Detection , here we will see the most important Linux machine pen testing checklist on an occasional premise (day by day, week by week, or each time you log on to a framework you oversee) gone through these anomalous behaviours to search ...


Introduction Isolation is a security approach provided by many computer systems. It is based on splitting the system into smaller independent pieces to make sure that a compromised sub-system cannot affect the entire entity. This approach is present in every modern operating system (e.g User accounts, process address spaces etc..). Chroot Jail is a way to separate a ...


Web server pen testing performing under 3 major category which is identity, analysis, and reporting vulnerabilities such as authentication weaknesses, configuration errors, and protocol relation vulnerabilities. "Conduct a serial of methodical and repeatable tests" is the best way to test the web server along with this to work through all of the different application vulnerabilities. ...


What is HTML injection? As you know, HTML is used to design web pages. Yes, you’re right. But what happens if a developer forgets to sanitize the user input. What happens if developers don’t predict when a hacker use the application. Do you know what all could be done if this vulnerability exist? To inject you don’t even need a toolkit. You may ...


#privacyrules Ladies and gentlemen, start your VPNs. As of March 28th, the House of Representatives and the Senate agreed to repeal the FCC's recent privacy rules. And while those rules still need President Trump's likely signature, many are rushing to Google 'Private network how-tos,' with VPN subscriptions in the US surging by 239% ...


Hello Everyone, Today on the behalf of Legion group I would like to make a tutorial on GOLISMERO The Web Knife. Actually one of my friends told me that, "theharvester or golismero.py. Both of those tools are excellently written scripts ...


The United States Senate voted last week to reverse broadband privacy rules put in place last October requiring ISPs to get consent from consumers before selling or sharing their Web browsing data and other private info with third parties. The vote was split decidedly along party lines with the deciding edge going to the Republican-controlled Senate. A similar result ...


Scenario: you are a normal user in your company’s domain. No admin privileges. Nothing. You can’t even install a program on your machine.What if I told you, that you can be the local administrator on your machine and probably on several more in your organization?I am not able to count the number of things you are able to ...