0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Are We There Yet?
By: JBingham
October 11, 2016

Are We There Yet?   Here you are, about to graduate from college.  Congratulations.  You are now ready to begin your career.  Let’s say you have decided to go into the field of Information Technology (IT).  You’ve always been good with fixing any issues that arise on your home computer, and at school, ...

The Career Path of the Penetration Tester
By: WhiteHat4Ever
October 10, 2016

The path of a penetration tester is a path of many possibilities and options that can lead to the primary goal of obtaining and advancing in cyber security as a penetration tester. I've been asked more than once about the necessary steps to enter into the world of cyber security yet there isn't a single guideline that suits everyone. ...

Configuring Port Security
By: cybern4
October 9, 2016

Cisco switches offer a tool called port security using it we can: Limit who connects (based on layer 2 address) Control how many can connect to a port Set an action when a violation occurs   Port security is used to mitigate MAC ...

Mac OS Sierra Guide to Juliar WebServer
By: Rattar
October 8, 2016

Hey all,As you may have heard, Juliar officially now supports Macintosh, specifically macOS Sierra. NOTE: This guide will probably work with older version of MacOS X, its just not been tested on it.In order to take a full advantage of  the Juliar web server capabilities, we are going to disable the server that comes with MacOS and enable ...

ITT Tech Closing and Impact on Students
By: rcubed
October 7, 2016

The ITT Technical Institute (ITT Tech for short) announced on September 6, 2016 that it was immediately ceasing operations and closing all of its campuses. Less than two weeks later, on September 16, 2016, ITT Tech filed for bankruptcy protection and so ended the run of the oldest for-profit educational companies in the United States. ...

Who is Your Mechanic: InfoSec Level Equivalents
By: infosectdk
October 7, 2016

Question: Who is the most important person in an organization? Is it the CEO? Is it the Finance director? Is it Bob in Sales? Is it you? We are all cogs in the machine, but sometimes there are some key components a company can not do without.A few years ago I read a quote  from the book Solider by ...

Create a Word List on Kali Using CRUNCH
By: Tejareddy
October 7, 2016

Kali Linux  is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools aimed at various information security tasks, such as  Penetration Testing, Forensics and Reverse Engineering. Kali Linux is developed, funded and maintained by  Offensive Security , a leading information security training company. Kali ...

Evil Twin Access Point | WiFI Pumpkin
By: fr4nc1stein
October 6, 2016

Hello Everyone:I would like to share how to setup an Evil Twin Access Point. Pre-requisite: Operating System: Kali 2.0/WifiSlax 4.11.1/Parrot 3.0.1/2.0.5In other Linux like UBUNTU you need to install the following dependencies:      Python 2.7     hostapd     isc-dhcp-server ...

How to Reverse Engineering an Android Application Package (APK)
By: Divya Lakshmanan
October 5, 2016

Have you wanted to look inside the code of your Android application to see how it works?Here is a technique for you. I have done this on Kali. You can also perform this procedure on other Linux distros as well as Windows also (you need to download the required tools). Prerequisites: 1) Basic knowledge of Android Programming Tools required: 1) adb ...

Women in Tech – Smashing Myths and Prejudice
By: rcubed
October 5, 2016

What if I were to tell you that during the stone age of computing (1940s) women dominated the programming profession? You might have a difficult time believing me if you were to look around and observe the gender imbalance of women in tech today, but during WWII, it was women that “manned” the frontlines in the computer programming arms ...