0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Ethical Hacking with Kali Linux – Part 1: Objective
By: bjacharya
March 29, 2016

Ethical Hacking with Kali Linux – Part 1: Objective >> Welcome all, to this series of Kali Linux for Ethical Hacking. This is first part and we’ll be seeing some of the intentions of this series.Kali Linux is a special OS for Hacking and Penetration Testing Tools (for “White Hat” use). # It's used for: – Improving system ...

Are You Offended by Offensive Security?
By: monroerl
March 28, 2016

A commonly held belief in the realm of digital security (cyber security for the new folks and the media) is the methods employed are strictly defensive in nature. Networks prepare for and wait for an attack, defend against the attack, respond as needed and maybe even report the attack to the authorities. If the attack was ...

Cybersecurity News Site Review: TechNewsWorld – Cybersecurity Section
By: ginasilvertree
March 25, 2016

Cybersecurity News Site Review: TechNewsWorld – Cybersecurity Section Relevance to the Readership: Potentially high. A Google search on “cybersecurity news sites,” returned this site as the second listing on the SERP. This site may likely have a devoted readership, who are comfortable with the format, content and other features. Main Feature(s): ...

A Quick Mathematical Formula for Subnetting
By: Fabien M.
March 24, 2016

Let's begin.Steps: Write powers of 2 left to right Write CIDR subnet masks from 1 to 32. This will take 4 lines, one for each octet in the IP addresses Write the subnet mask: add powers of 2 from left to current column  You can invert 2 and 3 if ...

Part 5: Create a Complete Virtual Environment for Penetration Testing
By: Z33MAX
March 24, 2016

Welcome back to the fifth part of the tutorial series. Today, we're going to learn how to compact a VDI into less disk space. I'm going to compact Windows Server VDI and then Sysprep it for ready-to-go imaging or future cloning. Tutorial Requirements: VirtualBox Windows Server R ...

Web Application Security Trends
By: monroerl
March 22, 2016

Application security is frequently found next to web application security in conversations, policies, news reports and annual cyber security trend articles. This word association can be attributed to our increasing reliance on mobile computing and use of Java-enabled content. Taking a page out of the web site content playbook, software applications are being built as needed, a technique known as ...

Spies Are Among Us
By: Antr4ck
March 22, 2016

Taming your computer is your most enthusiastic dreams. Unfortunately, for many years, spyware spread on the Internet to infiltrate the recesses of your computer, observe all actions and alter behavior, bringing down your greatest wish.   Spyware New internet scourges, these parasites - from simple cookie stored on your machine applications - are very discreet. As ...

CCNA - ICND1-003
By: layman
March 22, 2016

Alright, alright. Let's dive into IP addressing. An IP address is a number assigned to a device that participates in a network communication. It's used for two purposes: Host (device identification) Location (network identification) An example of an IP address: ...

Metasploit / Metasploitable2
By: @vinea
March 21, 2016

Greetings People - In my first post, I felt like I owed a few details. This time I'll get a little more detailed.   Why write about Metasploitable? Because it's an easy and fun way to learn how to manage the msfconsole.   Let's begin...  Set parameters and give the name VM : Followed ...

Auto-Compromising Devices with Karmetasploit
By: Patrick
March 21, 2016

For years, I've found that penetrating corporate environments through mobile devices is much easier than attacking border-edge firewalls and hardened servers. For this reason, I've begun using kits such as Karmetasploit.  Leveraging a Raspberry Pi and Metasploit , allows for instant shells and pillaging of data - using nothing more than a RaspberryPi, Alfa antenna and a internet ...