0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

CyberPop - Define Code Injection
By: ginasilvertree
May 27, 2016

CyberPop tests your knowledge and builds your strength as an Infosec pro. Today’s Question: Define Code Injection Answer: An attack or pentest that introduces malicious code into a software application, which executes the code when the application is opened. Examples include SQL injection , which can compromise or modify information in a ...

What They Never Told You About Proxies
By: usman47
May 25, 2016

Hello Great Geeks on Cybrary.it!Today, I must write an OP3N contribution about a serious problem that makes me a little bit worried about what's going to happen in the future. Everyone here knows that we use services like Proxies, TOR or VPN's to secure our online activities from prying eyes. This year, I did some research about these services ...

"Done for You" - List of TCP/IP Training Videos
By: ginasilvertree
May 25, 2016

Let's begin...  TCP .IP Internet Protocol Length: 15:48  TCP/IP Configurations (part 1) Length: 07:30  TCP/IP Configurations (part 2) Length: 11:33  TCP/IP Configurations (part 3) Length: 13:14  TCP/IP Configurations (part 4) Length: 08:03  TCP/IP Configurations (part 5) Length: 07:04  TCP/IP Configurations (part 6) Length: ...

Your Web Browsing Habits are Building a Billion Dollar Industry
By: foxpro
May 24, 2016

Do you realize that behind the scenes of your web browser and apps, data about you and me is being gathered and shared for profit?  Companies like Amazon, Facebook, Google, Microsoft and hundreds and thousands of other companies doing online business, gather and share information about your mouse movements, clicked hyperlinks, scrolled or viewed web page ...

[podcast] Software Restriction Policies and Applocker
By: BrBr
May 24, 2016

[embed]https://traffic.libsyn.com/brakeingsecurity/2016-018-softwarerestrictionpolicy-applocker.mp3[/embed]Windows has all the tools you need to secure an OS, but we rarely use them.  One example of this is 'Software restriction policies' or the use of Windows Applocker. It assists IT organizations by allowing you to block certain files from being saved anywhere, what file types can be executed in a directory, and can even whether or not ...

CISCO ASA Firewall Commands Cheat Sheet [Part 4]
By: Motasem
May 24, 2016

CCNP Security Firewall CISCO ASA Firewall Commands Cheat Sheet – Part 4 The sheet, and its previous parts, assumes you have the required knowledge of CCNA, CCNA Security, CCNP and it could be handy if you’re already enrolled in CCNP Security pathway. Let’s begin…   ...

Pentesting Routers - Dictionary Attack with Burp Suite
By: Z33MAX
May 23, 2016

  Welcome Back Cybrarians!!! Today, we're going to talk about pentesting a home router's web interface. When you break into a network (as pentester/hacker), you need to know how to access the web interface to gather more information about how to escalate your privileges within the system. But, ...

Updated Tutorial: Using Juliar's Encryption Module
By: Rattar
May 20, 2016

Welcome to the second version of my Juliar Encryption Module tutorial... The Juliar language has matured a lot since my last tutorial, so I decided to update it.In this tutorial, we'll be learning several new security commands recently introduced to the Juliar Encryption Module. In order to follow this tutorial, you must have the latest version ...

"Done for You" - List of Hacker Training Videos
By: ginasilvertree
May 20, 2016

Here's a concise list of offensive Hacker Training Videos on Cybrary (in alphabetical order by first letter). Enjoy!   Google Hacking Length: 3:24 Google Hacking Lab Length: 25:40 Hacking Web Servers (Whiteboard) Length: 19:36 Info Gather (part 1) – An Activity in Post Exploitation Hacking ...

CyberPop - Name the 7 Stages of an APT Attack
By: ginasilvertree
May 20, 2016

CyberPop from Cybrary aims adds to your knowledge as an Infosec pro.  Today's Question: Name the 7 Stages of an APT Attack  According to Wired.com, the 7 stages are:1. Reconnaissance2. Intrusion into the network3. Establishing a backdoor4. Obtaining user credentials5. Installing multiple utilities6. Privilege escalation7. Maintaining persistence Read more...