0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Email Spoofing with Python Tools
By: Denny Gonzalez
July 5, 2016

Greetings to all, Email spoofing is a very old technique. It's still widely used in the schemes Spear Phishing or Spear Apps to trick a user into believing they're receiving an email from a specific person. That is, a user impersonates another and try to make a credible message as possible. In many ...

How to Sandbag Against IP Target Acquisition for Reverse Proxied/Obfuscated Services
By: V
July 5, 2016

This article is the counter to my article about finding the obfuscated IPs of a server. In the pentesting scene and security scenes, one of the more popular methods of securing servers and websites is by obfuscation and/or misinformation. If you can't find the real IP of a backend server, it's harder to accurately test it for: ...

Sunday’s Cyber Security Fact: Cyber Security Standards (July 3, 2016)
By: ginasilvertree
July 3, 2016

What are Cyber Security Standards?   "Cyber security standards are various forms of security standards which enable entities and organizations to practice security techniques to help minimize the number of cyber security attacks. In essence, the cyber security standards are fundamental guides which provide a general outline as ...

"Done for You" - Collection of Content on How to Prevent Ransomware
By: ginasilvertree
July 2, 2016

Today, most companies are deeply concerned about how to prevent ransomware. News stories abound and Infosec professionals are scrambling to keep themselves and their users out of the fire.Below, you'll find a compilation of content to understand this important topic - from a 360 perspective.But, first a quick definition. According to Wikipedia: "Ransomware is a type of malware that ...

CyberPop - What's Penetration Testing or Pentesting?
By: ginasilvertree
July 1, 2016

CyberPop is a quick way to learn more definitions and facts about cyber security.  Today’s Question: What's Penetration Testing or Pentesting?   Answer: “Penetration Testing or Pentesting refers to techniques for actively testing an organization’s computer or network security, usually by identifying potential vulnerabilities and weak spots and trying to exploit those and/or break in.” Browse courses and topics ...

10 Methods for Staying Anonymous Online
By: bl0wNcl0udz
July 1, 2016

Technology - and most importantly, the internet - is a major part of our daily lives. Some use and rely on it for almost all of their day to day tasks. But, despite it's many wonderful qualities and uses, it can be a dangerous place for those who aren't educated in the safety measures one must take in order ...

Ethical Hacking with Kali Linux – Part 6: Nmap (Network Mapper)
By: bjacharya
July 1, 2016

Ethical Hacking with Kali Linux – Part 6: Nmap (Network Mapper) > > ‘Nmap’, basically Network Mapper, is a port scanning utility/tool. It helps determine whether ports are open or closed. It also helps find out the operating system running on the host or target machine (along with services of ports).> > We can ...

How to Use Ettercap and SSLstrip for a Man in the Middle Attack
By: TYEB
June 30, 2016

What's a Man in the Middle Attack (MITM)? A MITM is a kind of cyber attack where a Hacker/ Penetration tester compromises your network and starts redirecting all the network traffic through his own device (Laptop, Phone, Raspberry Pi, etc.).What's bad in these attacks is that the hacker, between ...

What You Should Know About Target Acquisition for Pentesting
By: V
June 30, 2016

In the pentesting and security scenes, one of the more popular methods of securing servers and websites is by obfuscation and/or mis-information. If you can't find the real IP of a backend server, it's harder to accurately test for vulnerabilities, brute force resistance, bandwidth limits or the impact of a DDoS.This is becoming more and more common with services ...

Got Burgeoning Hacking Skills? Consider a Degree in Cyber Security
By: ginasilvertree
June 29, 2016

Got burgeoning hacking skills? Growing cyber security talents? A compelling mission to join or continue working in the cyber security industry? A cyber security degree is something to seriously consider: Cybercrime continues to grow into more of a global threat – just read the news. Small, medium and large companies desperately ...