0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Bypassing Windows Password via USB
By: dharavsamani
November 3, 2016

Bypassing Windows Password via USB Requirements:   Kon-Boot for Windows 2.5.0 USB drive Victims computer (It Can Bypass Windows XP,  Windows Vista, Windows 7, Windows 8, Windows 8.1 ...

How to Crack LM and NTLM Hash: CudaHashcat
By: bachan
November 2, 2016

Hi, guys!Today I will show you how to crack windows password hashes.Tools used: CudaHashcat Cain and Abel A strong dictionary OK, let me clear some things up, first:  When you save your password in windows, it is encrypted into hashes. Hashes are stored in the SAM file. I will crack ...

How to Improve TCP Performance
By: thaveshnig@gmail.com
November 2, 2016

Chapter 1   1.1] Introduction:   This report will focus on the areas of which TCP performance is significantly improved. IETF, RFC, multi-rate networks, wireless networks, TCP/IP, adaptive window, end-to-end performance, TCP improvements with regard ...

ATSCAN: Web Vulnerability Finder
By: bachan
November 1, 2016

Hello Everyone,It's time to scan for web vulnerabilities. As we all know finding vulnerabilities in websites is fun as well as profitable. We can get hall-of-fame notoriety and bug bounties.A tool atscan  is going to help.  A clone is available from GitHub, here .  It is a tool that was written in Perl and developed by Alisam Technology.Alisam ...

Top Skills for Getting Hired in 2016
By: rcubed
November 1, 2016

LinkedIn.com recently reported a spike in job applications for October 2016. At the same time, they revealed their Top Skills of 2016 , an annual list of skills employers need most. If that weren’t enough, LinkedIn.com broke things down on a global scale and included top skills across 14 countries. I suppose if you’re so inclined, ...

Linux Webserver Using Lighttpd and Juliar
By: Rattar
October 29, 2016

Recently I got a request to have Juliar run on a Linux Lighttpd Server?You might wonder...why support Lighttpd? There are a few reasons: It's easy to setup and you can set up the whole Juliar server within seconds. Lighttpd allows easy configuration passing and it's super fast. Juliar and ...

Initialize a Cyber Security Career
By: S3nt1n31
October 28, 2016

With the number of cyber-attacks growing worldwide coupled with the adversarial gains in these successes, the need for qualified cyber security professionals will continue to grow. Just recently, on October 21st, 2016,  the Internet experienced a major slow down within the United States due to a DNS Distributed Denial of Service (DDoS) attack. A specific company was the target due to ...

[Product Update] Notecards and New Lesson Pages
October 28, 2016

Introduction Learning is a tricky thing. Research suggests 3 primary learning styles: auditory, visual, and tactile. Each person is different in the way they learn, and each technique offers various suggestions and strategies to optimize the learning experience. The Cybrary Team spent the past few weeks researching these learning styles and found something truly fascinating, all 3 styles ...

Anatomy of a DDoS Attack
By: rcubed
October 28, 2016

Friday morning October 21, 2016 didn’t get off to a good start for me. Shortly before 9 am EDT I was attempting to make an online purchase using PayPal as my payment processor of choice. When I clicked the “Submit” link (the button graphic wasn’t displaying), my browser spun its wheels for a few seconds and then ...

An A-Z Index of the Windows CMD Command Lines
By: fkay2014
October 27, 2016

List was taken from the following website:  https://ss64.com/nt/ A: ADDUSERS Add or list users to/from a CSV file ADmodcmd Active Directory Bulk Modify ARP       Address Resolution Protocol ASSOC     Change file extension associations• ASSOCIAT One step file association AT        Schedule ...