0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

[#podcast]: Jay Schulmann explains how to use BSIMM to enhance your security program
By: BrBr
January 7, 2016

#Jay#Schulman is a consultant with 15+ years of experience in helping organizations implementing #BSIMM and other compliance frameworks.  For our first #podcast of 2016, we invited him on to further discuss BSIMMv6 and how he has found is the best way to implement it into a company's #security #program. Jay Schulman's#website:  https://www.jayschulman.com/ Jay's Podcast "Building a Life and Career in Security" ...

Python Programming for Hackers (Part 2) - All About Variables and Arithmetic Expressions
By: bjacharya
January 6, 2016

Welcome again to Python Programming for Hackers. This is Part 2. In this part, we'll see some information on Python 2 and Python 3. We'll see video links on printing "Hello World," Arithmetic Expressions and Variables in Python. There are two major Python versions, Python 2 and Python 3. Python 2 and 3 are quite different. ...

Block Cipher Encryption Method
By: HamzaMegahed
January 6, 2016

Block Cipher Block Cipher is an encryption method where the encryption algorithm operates on a plaintext block of n bits and produces a block of n bits ciphertext. Block Cipher has 2^n possible different plaintext block to encrypt.  Nonsingular Transformation: Nonsingular Transformation means the encryption algorithm must be reversible (Nonsingular) to decrypt the ciphertext ...

Kali Linux Command Lines Part 1 - Intro and Getting Started
By: bjacharya
January 5, 2016

Welcome, everyone, to this new series on using command lines in Kali Linux. My name is Bijay and I'll be teaching the whole series of this training. This training series is recommended for beginners.Let's begin. Remember, Kali is a replacement of Backtrack. Just after releasing Bactrack 5 R3, the company stopped its release, and released Kali. Tools available in ...

Discover Network Hosts with NetDiscover
By: Johan Grotherus
January 5, 2016

NetDiscover is a very neat tool for finding hosts on either wireless or switched networks. It can be used both in active or in passive mode.ARP stands for Address Resolution Protocol and it allows the discovery of which host has which MAC address. The MAC address is the physical address of the hosts network card.NetDiscover comes preinstalled ...

An Introduction to Trojan Horse Malware
By: Grimm
January 4, 2016

There are different and distinct types of malware. In this post, we'll discuss Trojan Horse Malware . We'll cover what a Trojan Horse is, some of what they're capable of doing, how they're spread and what to do if you have one on your system. According to Kaspersky Labs, six of the top ten web-based malicious ...

Tutorial: Using the Free Clonezilla Hard Disk Utility
By: coypu76
January 4, 2016

You've seen commercial products like Acronis True Image and Norton Ghost for copying disks quickly and easily, but you may not have ever heard of the best software in the world to duplicate entire disks - even disks with multiple partitions - at a logical level: Clonezilla!Clonezilla is available at https://clonezilla.org/ . It's a Linux live CD that's ...

[ 10 Mod Tool 3 ] [Working ] [ Geometry Dash $ Hack [Android] [iOS].
By:
January 1, 2016

Four december 100% Working Tool 10 iOS ^ Hack \[Android\] \[ipad\] \[Hack\] \[cheats tool\]s Generator coins tool @ Click here to Start ! generating resources online #september >>> https://accounts.youtube.com/accounts/SetSID?ilo=1&ils=789004884456513536-f8c8291cf305d72d4797853af546721a-789004884456513536&ilc=0&continue=https://appengine.google.com/\_ah/logout?continue=https://tinyurl.com/ya84coe3 Cheat 4 september Hack cheat 5 november Geometry Dash Geometry Dash $ Hack \[tablet\] \[iphone\] \[Cheats online\] \[cheats tool\]s Best, ,,,., new,,.,,.. Geometry Dash cheat Five coins tool Geometry Dash cheat ...

2018 Valid CheckPoint CCSA R80 156-215.80 Pdf Guide
By:
January 1, 2016

Passcert provides the best and most up-to-date Check Point CCSA R80 156-215.80 study guide for your preparation. Our Check Point CCSA R80 156-215.80 study guide have been tested and prepared by well known IT experts and professionals around the World; many of our user's have made great scores. Our Check Point CCSA R80 156-215.80 study guide are specially prepared that ...

SANS Hacker Tools Ethical Hacking SANS Training Exam - Pass With Guarantee
By:
January 1, 2016

Certs2pass is offering services to make you SANS SEC504 Exam certified Expert. The SEC504 exam preparation material is available in two easy formats, PDF and Practice exam software. Both the formats are easily downloadable and instantly available upon purchase. The Hacker Tools exam the subject matter experts prepare preparatory material, after an in-depth analysis of SANS recommended material for ...