0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

ITT Tech Closing and Impact on Students
By: rcubed
October 7, 2016

The ITT Technical Institute (ITT Tech for short) announced on September 6, 2016 that it was immediately ceasing operations and closing all of its campuses. Less than two weeks later, on September 16, 2016, ITT Tech filed for bankruptcy protection and so ended the run of the oldest for-profit educational companies in the United States. ...

Who is Your Mechanic: InfoSec Level Equivalents
By: infosectdk
October 7, 2016

Question: Who is the most important person in an organization? Is it the CEO? Is it the Finance director? Is it Bob in Sales? Is it you? We are all cogs in the machine, but sometimes there are some key components a company can not do without.A few years ago I read a quote  from the book Solider by ...

Create a Word List on Kali Using CRUNCH
By: Tejareddy
October 7, 2016

Kali Linux  is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools aimed at various information security tasks, such as  Penetration Testing, Forensics and Reverse Engineering. Kali Linux is developed, funded and maintained by  Offensive Security , a leading information security training company. Kali ...

Evil Twin Access Point | WiFI Pumpkin
By: fr4nc1stein
October 6, 2016

Hello Everyone:I would like to share how to setup an Evil Twin Access Point. Pre-requisite: Operating System: Kali 2.0/WifiSlax 4.11.1/Parrot 3.0.1/2.0.5In other Linux like UBUNTU you need to install the following dependencies:      Python 2.7     hostapd     isc-dhcp-server ...

How to Reverse Engineering an Android Application Package (APK)
By: Divya Lakshmanan
October 5, 2016

Have you wanted to look inside the code of your Android application to see how it works?Here is a technique for you. I have done this on Kali. You can also perform this procedure on other Linux distros as well as Windows also (you need to download the required tools). Prerequisites: 1) Basic knowledge of Android Programming Tools required: 1) adb ...

Women in Tech – Smashing Myths and Prejudice
By: rcubed
October 5, 2016

What if I were to tell you that during the stone age of computing (1940s) women dominated the programming profession? You might have a difficult time believing me if you were to look around and observe the gender imbalance of women in tech today, but during WWII, it was women that “manned” the frontlines in the computer programming arms ...

Don't Get Scammed by An e-mail about A Parcel
By: prezzio
October 5, 2016

During last few months you might have observed an  increase in phishing and scam attacks. So… read the guidelines below and don’t get caught. Be a little skeptical of the following: Treat outlandish email offers as junk mail.  If they look too good to be true, then they probably are. ...

Personnel Security – Adjudication of the Human Resource and the “Whole Person” rule.
By: J.
October 3, 2016

     Personnel Security is of course concerned with the people that have access or management is considering for access to the company, government or other institutions resources. It is therefore important that, like any other security consideration, a risk based approach be taken to the determination of hiring or retaining employees, contractors, vendors or others (including visitors) ...

National Cybersecurity Awareness Month 2016
By: rcubed
October 3, 2016

The National Cybersecurity Awareness Month 2016 is entering its 13 th year this October. Founded in 2004, it is co-sponsored by the United States Department of Homeland Security (DHS) and the National Cyber Security Alliance (NCSA) to put the focus on the threats that exist online and the vigilance we all must assume to protect ...

Practical Web Application Penetration Testing Series - Chapter 3a
By: Babak Esmaeili
September 30, 2016

Burpsuite Scanner Tutorial Hello Cybrarians, We are gonna divide this chapter into 3 sections: A brief intro of burp scanner,configuration and installing add-ons and plugins to it and engaging it with explorer  Keep going on pentesting ...