0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

"Done for You" - The Complete List of Kali Linux and Linux Training Videos on Cybrary
By: ginasilvertree
June 8, 2016

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing . It is maintained and funded by Offensive Security Ltd. Mati Aharoni, Devon Kearns and Raphaël Hertzog are the core developers. (f rom Wikipedia ) Exploit Development (part 10) Creating Shell Code in Kali Linux Length: 16:33 ...

Simple Script in Linux "Bash"
By: mrNayaNi
June 8, 2016

Introduction: Bash is the scripting language used in Linux - it stands for Bourne Again Shell.You can perform several tasks with this scripting language. It can make your lives easy using simple words. There are some tasks you have to do every day; you can write a script to do them for you instead of repeating ...

[podcast] Earl Carter dissects the Angler Exploit Kit
By: BrBr
June 7, 2016

[embed]https://youtu.be/WOvzLaQDHEA[/embed]Earl Carter (@kungchiu) spends all day researching exploit kits and using that information to protect customers from various malware payloads that spread ransomware.  This week we sit down with him to understand the#Angler EK.He starts us off with a history or where it came from and how it gained so much popularity, evolving from earlier EKs, like#BlackHole, or WebAttacker. We ...

Standard Network Ports Chart
By: Bl4CksPId3r
June 7, 2016

This is a chart of Standard Network Ports. Hope that you enjoy this chart. Information you might want to know for the Network+ or A+ Exam! Save

IPv4 vs IPv6 Chart
By: Bl4CksPId3r
June 7, 2016

Use and share this chart that compares IPv4 to IPv6 . Thanks and I hope it's useful to you!     Save

What You Should Know About Spear Phishing Attacks
By: Willian
June 7, 2016

In the past few months, we've heard about a range of business email compromises. Spear phishing, the method used in these attacks, represents consistent threats that have companies on high alert.These attacks are growing in number and are getting more sophisticated in nature - targeting individuals and employees in various organizations to gain entry into a corporate network. Traditional ...

3 Reasons Why EVERY OS Fails as an OS
By: Daelphinux
June 7, 2016

3 Reasons Why EVERY OS Fails as an OS I recently read a post regarding Windows’ failings as an operating system and decided to call out some issues with every OS in the same format. I’m only going to focus on the three biggies: Windows, OSX, and Linux .Moreover, I’m going to focus Linux on ...

[Product Update] Introducing the New Course Catalog
By: TREVORH
June 6, 2016

Today, we're introducing the new course catalog on Cybrary. To date, Users have had limited flexibility when it comes to sorting through our course catalog. Taking into account some great User feedback, we've included the ability to filter classes by difficulty, vendor, and added Learning Paths.Learning Paths are designed to provide Users with recommended course paths for careers they may ...

Tutorial: An Introduction to Software Defined Radio
By: The Rapture
June 6, 2016

Introduction: Hey Cybrarians!  I bought a USB Software Defined Radio (SDR) dongle last year at DerbyCon and hadn't really had the chance to play with it until the other day. It was a lot of fun to explore all of the different signals that you can pick up with one of these dongles, so I thought ...

ISP's Connect You to the World
By: Dr3AMCoDeR
June 6, 2016

Hello there Cybrarians,As always, I appreciate your huge support and comments. That's why I've decided to write another article today which might be useful for you. I'm going to discuss everything about ISP's (Internet Service Providers) because many people have asked me, "How does an ISP work and what do they know about us (the clients)?".My discussion will be ...