0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Not so long ago, when you wanted to pursue any kind of educational experience, you had to enroll in a course, pay your tuition and then commit to a specific time and place for a certain amount of time (e.g., a quarter, semester or academic year) to complete the experience. However, in today’s modern and technology-centered times, there are ...


#outage The annoyance when your Internet won't load is quite possibly the most irritating feeling of the 21st century. So when the Amazon S3 outage occurred on Tuesday, February 28th for almost 5 hours, both consumers and businesses alike were in quite a mood. S3, or Simple Storage Service, provides hosting ...


A hacker is a person having an intimate understanding of the internal workings of a system, computers and computer networks in particular. They are the ones often characterized as malicious, criminals or cyber terrorists but those are black hat hackers(bad hackers). Due to the mass media usage of the word, every hacker is often looked at as a cyber criminal. There are ...


What is SessionID? SessionID is a unique ID for checking the authentication of a logged on user. Based on the SessionID the Server responds to a browser. And the Session Hijacking involves, accessing the random sessionID based on user input. This sessionID is being used for both the Web and Mobile applications. Authentication Bypass places a major stack in ...


Last Tuesday (2/28/2017) Amazon’s AWS S3 web service was intermittently unavailable. S3 (Simple Storage Service) is one of the many web services hosted on the Amazon Web Services platform , AWS. It’s also the most used service hosting everything from the image files used by websites both small and humongous, to database files powering some pretty large e-commerce ...


What is CISA? The Certified Information Systems Auditor (CISA) is a certification issued by the Information Systems Audit and Control Association (ISACA). Certified Information Systems Auditor (CISA) is a globally recognized certification in the field of audit , control , and ...


The Importance of Planning, Management, and Testing for Successful Delivery of the Project 1) Planning 2) Resource Management 3) Motivation 4) Test Process management ...


As if your network security staff does not have enough to worry about already, now anyone can get in on the ransomware game. Now, we have variants of RaaS (Ransomware as a Service) to worry about. This allows anyone who wants to profit from ransomware to start their own ransomware campaign with the help of a ...


When we deploy a website online for users, by default it allows the user to access the domain with and without "www". This means that the same content is served by an apache server on both " kalilinuxhack.com " and " www. kalilinuxhack .com ". It is bad for SEO ...


I’ve been on a mission to answer the question, “How do I get _ certified?” In recent posts, I’ve dove into how to earn the TCP/IP certification and how to best utilize your hard earned certifications on your resume. With new micro certifications being released weekly, it’s important to show users truly how limitless their options are when it ...