0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

[podcast] Steps when scheduling a pentest, and the questions you forgot to ask... with Jarrod Frates
By: BrBr
July 27, 2016

[embed]https://traffic.libsyn.com/brakeingsecurity/2016-029-JarrodFrates-Whattodobeforeapentest_starts.mp3[/embed]Jarrod Frates (@jarrodfrates on Twitter) has been doing pentests as a red-team member for a long time. His recent position at#InGuardians sees him engaging many companies who have realized that a typical 'pentest #puppymill' or pentest from certain companies just isn't good enough.Jarrod has also gone on more than a few engagements where he has found the client in question ...

So, You Want to Become a Hacker?
By: Archergilly
July 27, 2016

You see a lot of articles that explain, to become a Hacker, you need to know a lot of programming languages, which is something something not everybody can do. This approach has some truth, but at the same time, is closed minded.Hacking, in simplest terms, is making an asset behave in a way it was not originally designed to ...

[Product Update] Introducing Cybrary Teams
July 27, 2016

Cybrary has been working hard to release our newest platform for individuals, allowing them to learn and develop their cyber security skills on Cybrary together. Drum-roll, please... Introducing Cybrary Teams! With Cybrary eclipsing the 500,000 Registered Users mark, we sought to find a way to bring people closer together to learn, share, and grow beyond what's currently available ...

Why is “C” the Default Drive on Your Computer (Instead of A or B)?
By: doctorX
July 26, 2016

Have you ever wondered why the names of hard drives start from “C”? Where have the A and B drives gone? Here's the answer: Hard disk drives have been standard since 1980 Before hard disk drives, Floppy disk drives were used as data storage devices ...

Free Firewalls for Small and Medium Networks
July 26, 2016

Today, I'll share personal experience about the most important free firewalls that can be used in small and medium-sized networks. Most of these firewalls work in the Linux environment, including FreeBSD, or OpenBSD, which work with different techniques such as (Packet Filter), (IPFilter), (IPFirewall), and iptables.We'll talk about the firewalls that are fast and good for small networks working ...

Learn to be a Hacker with Cybrary
By: KnightsCode
July 25, 2016

Where do you start with this? At the moment, you may have far too many people sharing their own ideas about being a hacker. I'm not here to sugar coat it for you. I'm not going to tell you that you need to be "creative," "adaptive," or "persistant". If you're choosing to be an ethical hacker, then you should ...

Part 2: XSS Code Analysis and Exploitation
By: Chilico
July 24, 2016

Hello Cybrarians, once again,In this article, we continue our code analysis and exploitation of XSS from Part 1 . If you haven't already read it, please do .  Let's begin... Example 6: As we see, our code is now completely different for the previous examples. In this one, our code running inside JavaScript so in ...

Sunday's Cyber Security Fact - Collaboration is Key (July 24, 2016)
By: ginasilvertree
July 24, 2016

According to a 2016 survey by PwC: 65% of businesses surveyed are "embracing a more collaborative approach to cybersecurity, one in which intelligence on threats and response techniques is shared with external partners. Internally, organizations are rethinking the roles of key executives and the Board of Directors to help create more resilient and proactive security ...

The Integrated Guide to Network Security 1.5
By: ram
July 22, 2016

Network Security 1.5 Given a scenario, troubleshoot security issues related to wireless networking... As you read about each of these methods and protocols, realize that there are security implications and weaknesses to each, and diligence and vigilance are your two most powerful attributes. Anyone with the right gear can see all of the ...

Report: Healthcare Under Attack – Cybercriminals Target Medical Institutions
By: ginasilvertree
July 22, 2016

InfoArmor has identified a group of bad actors performing targeted cyberattacks on healthcare institutions and their IT infrastructure, including connected medical devices such as Magnetic Resonance Imaging systems (MRI), X-ray machines and mobile computing healthcare workstations.This group of bad actors has performed at least four successful attacks against US-based organizations of varying size, compromising a significant number ...