0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Windows 8/8.1 Password Reset with a Windows 8/8.1 DVD and CMD
By: Pieter J.
February 4, 2016

Today I'd like to share what I have learned in a in a sticky situation. I was busy with a customer's laptop and it turned off due to a low battery. When I turned it back on after connecting the charger, I discovered the laptop had a password, which I forgot to ask the customer for. So, following ...

[podcast] Dropbox Chief of Trust and Security Patrick Heim!
By: BrBr
February 1, 2016

[caption id="" align="alignnone" width="478"] Patrick Heim, Chief of Security and Trust at Dropbox[/caption]Brakeing Down#Security had the pleasure of having Patrick Heim join us to discuss a number of topics. What stops many traditional#companies from moving into #cloud based operations? What hurdles do they face, and what are some pitfalls that can hamper a successful #migration?We touched briefly on#BYOD ...

Encrypting the Net: Use "Let’s Encrypt" SSL to Set Up Secure Website Traffic
By: Krintoxi
February 1, 2016

Hello,This guide comes out of inspiration from the Course offered here not too long ago: SSL Traffic: The Cyber Criminal’s Best Friend Instructed By Darrin Coulson. I'll start with a bit of basic background knowledge you should have on what SSL (Secure Sockets Layer) Encryption is, and how it benefits us. SSL (Secure Sockets Layer) is ...

Kali Linux Command Lines Part 3 – Working with Files
By: bjacharya
February 1, 2016

Welcome to Kali Linux Command Lines - Part 3. Here, I'll show you the commands for files to work in Kali Linux. This article is absolutely for BEGINNERS, but as we move on with upcoming parts, we'll see much more complex and advanced commands to work in Kali. Note : Video Demo/Lab for this part is available here ...

Brute Force Attacks and Why You Should Have a Complex Password
By: Daelphinux
February 1, 2016

The standard brute force attack is fairly simple. An attacker, in an attempt to discern a password, simply guesses every possible password until they stumble upon the right one. Although this is considered a weak form of attack, it's still a plausible one in many situations.To really understand how it works, however, one has to have a grasp of the ...

February is #SecureCodingMonth at Cybrary!
By: ryan c
February 1, 2016

The team at Cybrary has officially named February:#SecureCodingMonthGiven that secure coding principles are often so overlooked in most CS programs and coding classes, we feel the obligation to fill the coding security void. There are many courses on Cybrary which coders / programmers can benefit from already, such as the Advanced Penetration Testing and the CompTIA CASP ...

Protecting Your Data in Linux: A Deeper Look at Disk Encryption (Part 4/4)
By: zhak
January 26, 2016

In the previous three parts ( one , two , and three ) of the article we discussed hard drive encryption with LUKS. Today we will speak about plain mode encryption. This mode is considered advanced and a little bit more complicated. But you'll see that this is actually not true, and, what is more, has its ...

[podcast] Infosec Author Bill Gardner
By: BrBr
January 24, 2016

BrakeSec Podcast welcomes Bill Gardner this week!#Author, #InfoSec Convention Speaker, and fellow podcaster...We break a bit from our usual rigid methods, and have a good ol' jam session with Bill this week. We talk about#vulnerability #management, #google #dorking, #career management, the troubles of putting together a #podcast and more! Bill's Twitter: https://www.twitter.com/oncee Bill's books he's authored or co-authored:  https://www.amazon.com/Bill-Gardner/e/B00MZ9P0IG/ref=srnttsrchlnk2?qid=1453607145&sr=1-2 (non-sponsored ...

Part 3: Protecting Your Data in Linux - A Deeper Look at Disk Encryption
By: zhak
January 20, 2016

We've already prepared UEFI bootable USB stick and root partition for DM_CRYPT + LUKS encryption, as well as installed Linux distribution of choice in Part 1 . We've also prepared initramfs sources for embedding into kernel in Part 2 . Now, it's time to configure kernel itself. There are a lot of good tutorials about kernel configuration ...

Infosec Professional's Guide to Managing Smartphone Apps
By: RoninSmurf
January 20, 2016

[caption id="attachment_56548" align="aligncenter" width="800"] Smartphones make our lives easier and keep us entertained with a wonderful array of apps.[/caption]  Testing Apps Given how much information is on our phones, it's of little surprise to see the rise of malware, spyware and viruses. Even though each of the major vendors verifies uploaded apps, it's pretty easy to sneak in malicious ...