0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

KATANA Framework: The Hacker's Choice
By: bachan
October 27, 2016

Hello Cybrarians, Wazzup?! It's time to have some fun with Katana . Katana is a framework written in python for the pentesters, by pentesters. It is a very user-friendly and comprehensive platform. The project is open source. You can even add your own modules and update it, as well as clone it to your machine by following the ...

Self-driving Cars: An Introduction
By: rcubed
October 27, 2016

Elon Musk, CEO of Tesla Motors, recently announced that all the electric cars coming off Tesla’s assembly line will now be equipped to be full-on autonomous. It appears that the quest for truly self-driving cars – ones where you don’t have to sit in the driver’s seat anxiously hovering over the wheel in case human ...

4. Python for Hackers - Reverse TCP Shell
By: Priyank Gada
October 27, 2016

What's inside: In this video, we will be learning more about TCP reverse shell. In next video, we are going to learn about how to create TCP reverse shell. Description:This lesson discusses Python for Hackers and covers the basic concepts of TCP reverse shell and teaches about various types of shells.[toggle_content title="Additional Materials & Information:"]Github ...

Top In-Demand Cyber Security Certifications
By: rcubed
October 26, 2016

When it comes to IT certifications most would agree that the “Big-3” essentials are CompTIA A+ , CompTIA Network+ , and CompTIA Security+ . From there, a few specialized certs along the lines of Cisco CCNA, Linux and Microsoft certifications as well as a few other vendor and technology-specific certifications, are a good bet ...

2. Python For Hackers - Attacker's Machine
By: Priyank Gada
October 25, 2016

What's Inside: In this video, we are going to configure the attacker's machine and we are going to install Kali Linux on it.  This is the second video of the series. Description:This lesson is about Python for Hackers . Participants learn the following: Installing virtual box Installing Kali Linux ...

1. Python For Hackers - Introduction
By: Priyank Gada
October 25, 2016

What's Inside: This is the first video of the 14 Part Course series. In this video, we will see what's in the course and how are we going to proceed. Description:This is designed for ethical hackers and is on a basic level. Participants learn how to set up a lab using python and learn about other tools. Github Repository ...

DDOS: Infinite Pinging Yourself in *Juliar *
By: Rattar
October 25, 2016

Introduction In this tutorial, I will show you how to create a super simple program to DDOS yourself. You heard that correctly, we are going to DDOS ourselves. This tutorial doesn't use any advanced methods and as such should only be used as a beginners tutorial. So let's create an infinite ping on a machine using Juliar. Who ...

How to Pivot the Network (Port-Forwarding/Redirection) - A Hands-On Look
By: breuermar
October 25, 2016

Description: This tutorial is about "moving" through a network (from machine to machine). We use a compromised host as our pivot to move through the network.  This tutorial has a lack of screenshots. You can create the screenshots yourself as you follow this tutorial ;-) Prerequisites: You need (at least) three machines for this tutorial. ...

Tutorial: BlackArch Full Install on USB 3.0
By: ReK2
October 25, 2016

Necessary tools: One USB 3.0 stick with at least 100G to be able to install all your tools and personal scripts Another USB any type or DVD/CD, this is for the install Laptop or desktop computer Latest blackarch live cd iso file  HERE ...

KARMA: A MITM Attack
By: bachan
October 25, 2016

Hello, Cybrarians !It's time to gain some information about man-in-the-middle attack. Most of you people ever heard about the attack KARMA which I am going to explain here. So, let us start. What is KARMA ? KARMA stands for Karma Attacks Radio Machines Automatically. A radio machine could simply be a smart-phone, tablet, laptop or any wi-fi ...