0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Ethical Hacking with Kali Linux – Part 5: Rogue Wireless Access Points
By: bjacharya
April 7, 2016

Ethical Hacking with Kali Linux – Part 5: Rogue Wireless Access Points Got free WiFi in the airport? At college? In motels? Or anywhere else?... Before connecting, we must make sure the access points are really broadcasted bycompanies/offices/colleges themselves. Maybe the AP is fake (and not really associated with airport/college/motels). Someone might have created a fake AP, ...

[Part 1] - Networking Sniffing and How to Defend Against It
By: Antr4ck
April 7, 2016

One of the first dangers on networks is that some people can "play" content that's not intended for them. In a network in broadcast mode (WiFi or Ethernet using a hub), anyone can read the packets of all. As with Ethernet, promiscuous mode for the network card does not filter packets that do not match the ...

Protect Servers with 'Entire Drive Encryption' via BitLocker
By: Yaser vp
April 6, 2016

Protect Servers with 'Entire Drive Encryption' Via BitLocker Windows BitLocker Drive Encryption is a new security feature that provides better data protection for your computer, by encrypting all data stored on the Windows operating system volume. (In this version of Windows, a volume consists of one or more partitions on one or more hard disks. ...

Create Your Own Kali Linux ISO
By: Z33MAX
April 6, 2016

Welcome back, Cybrarians, Today, we're going to create a custom Kali Linux distribution. We'll go through the steps of building a customized ISO that can be run Live or on VirtualBox machine. First, you might wonder why we're going to create our own distro when there is an existing one already? The answer ...

The Real Science Behind Cracking Passwords
By: True Demon
April 6, 2016

Introduction A lot of ordinary computer users understand what a password is. It protects their sensitive data and it's all they need to get access to a majority of accounts. It's also that all-important word that will allow them to access their significant other's Facebook profile while they're away to make sure they haven't ...

[podcast] Michael Gough, the ISSM model, and the 5 P's
By: BrBr
April 6, 2016

[embed]https://traffic.libsyn.com/brakeingsecurity/2016-013-michaelgough-the5Ps.mp3[/embed]Direct Link: http://traffic.libsyn.com/brakeingsecurity/2016-013-michaelgough-the5Ps.mp3 iTunes: https://itunes.apple.com/us/podcast/brakeing-down-security-podcast/id799131292?mt=2 (look for the episode starting with "2016-013") We discuss a model that Michael Gough used while he was at HP. The Information Security and Service Management (ISSM) Reference model can be used to help companies align their IS and IT goals with the businesses goals... If you've been a listener ...

[podcast] Ben Caudill on App Logic Flaws, and Responsible Disclosure"
By: BrBr
April 6, 2016

[embed]https://traffic.libsyn.com/brakeingsecurity/2016-012-BenCaudill-ApplicationLogic_Flaws.mp3[/embed]Ever bought "-1" of an item on a retail site? Or was able to bypass key areas of an application and get it bypass authentication, or you were able to bypass a paywall on a site? This is only one example of a class of vulnerabilities called "logic flaws".Application logic flaws are often insidious and not easy to find. they ...

CISCO Configuration Commands You Should Know
By: Humberto Hilario
April 6, 2016

Navigation Router Configuration Show Commands Configuration Management Debug and Troubleshooting ~ Hope this is useful to you ~

S3SS10N Wednesday - These 4 Steps Will Prevent You From Ransomware Destruction
By: Tatianna
April 6, 2016

What is S3SS10N Wednesday? S3SS10N Wednesdays are weekly 15 minute (or less) white board lessons by Cybrary Instructors and SME’s. They are designed to provide you with a quick dose of cyber security learning. We publish a new episode every Wednesday morning (Eastern Time). Now, check out our newest episode belowinsertverticalspace thepixels="10"ifloggedinshow] [/ifloggedin_show ...

Cyber Resilience [A Primer]
By: ginasilvertree
April 4, 2016

In 1903, “Magician and inventor Nevil Maskelyne disrupted John Ambrose Fleming's public demonstration of Guglielmo Marconi's purportedly secure wireless telegraphy technology, sending insulting Morse code messages through the auditorium's projector,” according to the Wikipedia entry “Timeline of computer security hacker history." (I believe this may be the first recorded cyber attack.)After considering this attack, I ...