0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



Are We There Yet? Here you are, about to graduate from college. Congratulations. You are now ready to begin your career. Let’s say you have decided to go into the field of Information Technology (IT). You’ve always been good with fixing any issues that arise on your home computer, and at school, ...


The path of a penetration tester is a path of many possibilities and options that can lead to the primary goal of obtaining and advancing in cyber security as a penetration tester. I've been asked more than once about the necessary steps to enter into the world of cyber security yet there isn't a single guideline that suits everyone. ...


Cisco switches offer a tool called port security using it we can: Limit who connects (based on layer 2 address) Control how many can connect to a port Set an action when a violation occurs Port security is used to mitigate MAC ...


Hey all,As you may have heard, Juliar officially now supports Macintosh, specifically macOS Sierra. NOTE: This guide will probably work with older version of MacOS X, its just not been tested on it.In order to take a full advantage of the Juliar web server capabilities, we are going to disable the server that comes with MacOS and enable ...


The ITT Technical Institute (ITT Tech for short) announced on September 6, 2016 that it was immediately ceasing operations and closing all of its campuses. Less than two weeks later, on September 16, 2016, ITT Tech filed for bankruptcy protection and so ended the run of the oldest for-profit educational companies in the United States. ...


Question: Who is the most important person in an organization? Is it the CEO? Is it the Finance director? Is it Bob in Sales? Is it you? We are all cogs in the machine, but sometimes there are some key components a company can not do without.A few years ago I read a quote from the book Solider by ...


Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools aimed at various information security tasks, such as Penetration Testing, Forensics and Reverse Engineering. Kali Linux is developed, funded and maintained by Offensive Security , a leading information security training company. Kali ...


Hello Everyone:I would like to share how to setup an Evil Twin Access Point. Pre-requisite: Operating System: Kali 2.0/WifiSlax 4.11.1/Parrot 3.0.1/2.0.5In other Linux like UBUNTU you need to install the following dependencies: Python 2.7 hostapd isc-dhcp-server ...


Have you wanted to look inside the code of your Android application to see how it works?Here is a technique for you. I have done this on Kali. You can also perform this procedure on other Linux distros as well as Windows also (you need to download the required tools). Prerequisites: 1) Basic knowledge of Android Programming Tools required: 1) adb ...


What if I were to tell you that during the stone age of computing (1940s) women dominated the programming profession? You might have a difficult time believing me if you were to look around and observe the gender imbalance of women in tech today, but during WWII, it was women that “manned” the frontlines in the computer programming arms ...