0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Hide Your IP Using the Zenmate Chrome Extension
By: Ahmed Elessawy
July 12, 2016

An IP (Internet Protocol) address allows your computer to connect with others over the internet. The IP address allows the web to find your device amongst the billions of others connected to it.Of course, this also means that attackers can track what you’re doing online. If someone can see your IP address, they can watch and log your internet activity ...

Browser Plug-Ins and Extensions for Pentesters/Security Analysts
By: MaskedFrog
July 11, 2016

Sometimes, it's necessary to probe a server or network without the resources at hand to load bloated proxies or web testing frameworks. Here's where browser plug-ins and extensions shine.This short list of plug-ins/extensions is not exhaustive. There are hundreds, if not thousands, of plug-ins and Extensions available with dozens and dozens of them intended for pentesting purposes. They can ...

Android Secret Codes Every H@ck3r Should Know
By: Genius
July 11, 2016

#1234# (View SW Version PDA, CSC, MODEM) #12580369# (SW & HW Info) #197328640# (Service Mode) #0228# (ADC Reading) #32489# (Ciphering Info) #232337# (Bluetooth Address) #232331# (Bluetooth Test Mode) #232338# (WLAN MAC Address) #232339# (WLAN Test Mode) #0842# (Vibra Motor Test Mode) #0782# (Real Time Clock Test) ...

Sunday’s Cyber Security Fact: Unique Pieces of Malware (July 10, 2016)
By: ginasilvertree
July 10, 2016

"Symantec discovered more than 430 million new unique pieces of malware in 2015, up 36 percent from the year before. Perhaps what is most remarkable is that these numbers no longer surprise us. As real life and online become indistinguishable from each other, cybercrime has become a part of our daily lives. Attacks against businesses and nations hit the ...

What Are Hackers and How Can You Become One?
By: mrNayaNi
July 8, 2016

Introduction: Hey everybody - This article is all about Hackers: who they are and to become one. Let's start from the beginning. Hacker is a term that began to be used in 1960. Hackers were people who hacked computer code. Later, hackers came to be known as individuals who had advanced knowledge on computers, networks etc.According to Wikipedia, ...

Infosec 101: DNS - What is it and How do I Spoof it?
By: GodSpeed
July 8, 2016

DNS stands for Domain Name System and it does the job of translating the name of websites you enter in the address bar into an IP address.  When you enter www.google.com into the address bar, it gets translated to the respective IP address and after that, a connection is established.  ...

CyberPop - What's Remediation?
By: ginasilvertree
July 8, 2016

CyberPop is a quick way to learn more definitions and facts about cyber security. Today’s Question: What's Remediation Answer: What an organization does to limit or stop an attack once it’s detected, as part of incident response. Includes things like blocking IP addresses, removing infected files or devices, and restoring affected systems to a known good state.

Custom Python Script: Sending an Email Through Terminal
By: prometheus
July 7, 2016

Ever wondered how you'd write up and send an email without launching the browser and the gateway portal of the serving entity? In this post, we describe how to send an email through a command line terminal. You'll be able to do so with little prior knowledge of Python or any other programming language.   Lets get started... ...

Have You Seen These 3 SonicWALL Functions?
By: huntincj
July 7, 2016

Recently, I took another SonicWALL clas and was shocked to see some of the functionality that's available to the smaller business with devices such as the NSA 220.Here are 3 functions you may find surprising:  1. Regular Expression (REGEX) Matching (5.9 and Up) This is particularly powerful for DLP if you host your own email server. You can set ...

Privacy Matters
By: Antifuse
July 6, 2016

Is Privacy Worth Protecting? Absolutely. Although, some people would say otherwise, claiming things like, "People don't care about their own privacy", and "Why should they care if they have nothing to hide?" This way of thinking implies people don't care about their "rights" to privacy. Privacy should be protected, even if we don't care about our own right to ...