0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



When conducting a forensic analysis of Windows Operating Systems it is extremely important for the analyst to have an understanding of the various time formats present within the Windows OS. Since many examinations come down to the time stamps on various artifacts, the analyst should be able to describe and explain the various time stamp protocols if asked to ...


What is NIST? The National Institutes of Standards in Technology (NIST) dates back to 1901. The United States Congress originally founded NIST as means to combat and issue with competition in the US during that time. Back in the day, the infrastructure in the USA was very poor and lacked the strength of countries such as Germany ...


Welcome to a tutorial on the basics of staying "anonymous". From the movies you see a hoodie-wearing figure in a cyber cafe using public wifi and "an all in one tool" for not getting caught, and using a RAT (Remote Access tool). Well, its not that simple. There are some great OSs for anonymity and for those who think ...


Hello Friends,Today I'm gonna explain how to pentest a web application of a website in blackbox mode. The steps: Find the technology and the kind of web page language Find all sub-domains exist for the website and repeat number 1 for them too (very important) Test every input include ...


The Password that Put You at Risk We're Security Researchers or Penetration Testers or other Security Wings in cyber space. So, you guys should know about attacker's behavior and the cyber taste. Consider not only the attackers behavior, but also the users on every corner of the county. Today, I'm introducing the ...


#deeplearning Fortune 500 Companies have a new secret weapon against cyber crime: IBM's Watson for Cyber Security. This overachieving supercomputer uses machine learning and language processing to sift through vast amounts of data, both structured and unstructured. As Watson distinguishes patterns, it is able to apply context to those patterns, helping professionals ...


Disable SELinux For the sake of simplicity and saving time, we will be disabling SELinux, which isn’t recommended. We urge you to learn how SELinux works and to set it up accordingly after getting samba working successfully. This will disable SELinux from being enabled on boot: vi /etc/selinux/configChange “SELINUX=enforcing” to “SELINUX=disabled” Run this to immediately ...


I am sure many people that use OSINT are aware of these tools and links; however, information, and acquiring that information from all sources, is relevant and should never be overlooked. Hopefully, this will come in handy for OSINT investigations.I have listed some resources that are known within the hacker community in acquiring information on many entities, this includes ...


This is a Python script I wrote to send emails to email accounts or cellular devices. It can be used to send a single message or multiple copies of the message to the recipient. It is a very crude and my first python script I work. The script uses the send email terminal command and prompts for the address of the ...


Do you remember the Geico marketing campaign from a few years ago featuring cavemen with the slogan, “So easy a caveman could do it”? The driving message of this snarky humored campaign was that getting insurance is so, so easy, why wouldn’t you do it?My message is the same.And while I’m not calling you a caveman, I am saying that ...