0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


This post is a follow-on to the series I began a few weeks back on mobile app development in general and Android coding in particular. It’s also the concluding post in the series. The previous post on getting started with Android development walked you through the steps of installing Android Studio and creating a demo ...


RANSOMWARE PROTECTION, PREVENTION, MITIGATION We don’t think paying the ransom is the best idea because there’s no guarantee the criminals won’t up the ante, or that they’ll actually follow through on their promise to send you the keys to decrypt your files. And paying the ransom also supports a cyber criminal enterprise that will ensnare more victims. ...


Is there such a thing as "Confidential Customer Credentials" anymore? Article By: Jeremy Bannister (CYBER SECURITY EAGLE) Recently there was information released about Google’s G-mail customer user account credentials becoming the latest to be put on sale on the Dark Net, along with numerous Yahoo customer user account credentials that stem from numerous cyber-attack incidents spanning from ...


SSH is considered a secure protocol, and depending on your environment, the default server configuration may work with a little tweaking of the daemon configuration file. Still, as we will go over in this article, there are some options you may want to configure your SSH servers for more security and control. What is SSH? The Secure Shell protocol is ...


I will be discussing some command line tools which will help the pentesters during their work. Let's cut the talk and get to the meat.1) whoiscommand: whois google.com 2) hostcommand 1: host -hcommand 2: host google.comcommand 3: host -C google.com 3) theharvestercommand 1: theharvestercommand 2: theharvester -d cisco.com -l 20 -b all 4) ...


ANTIVIRUS FAILS TO STOP RANSOM 4.1 Destroying your hard drive After completing this process and before begins spying on users, Rombertik runs a final check to make sure it is not being analyzed in memory. In case it finds any indication of being analyzed, the spyware attempts to destroy the master boot record (MBR) of the ...


What is this course about? This course is mainly focused on Kali Linux and we are going to use Kali Linux as the main operating system. This course also cover some basics of programming knowledge, basics of Linux, Linux terminal commands, etc. What's inside the course? In this course, we are going to use Kali Linux and we ...


COMMON TYPES OF RANSOMWARE 3.1 CryptoLocker Ransomware has been around in some form for over a decade, but came to prominence in 2013, with the rise of the original CryptoLocker malware. While the original was shut down in 2014, the approach has been widely copied. So much so, in fact, that the word CryptoLocker has become ...


In today’s fast-paced and highly connected tech industry, seeking out the most relevant and useful career insight into the industry can seem like an intimidating task, especially when innovation in the tech field can change the name of the game overnight. Most newcomers coming into the tech field have little to no experience but are desperately seeking the right ...


Shellter is a dynamic shellcode injection tool, and the first truly dynamic PE (portable executable) infector ever created. It can be used in order to inject shellcode into native 32-bit Windows applications. It takes advantage of the original structure of the PE file and doesn’t apply any modification such as changing memory access permissions in sections (unless the user ...