0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

What You Should Know About the OSI Reference Model and Layers
By: uknin35
April 13, 2016

The OSI Reference Model is not a physical model. It is a logical model. It has seven different layers, divided into two groups. The top three layers define how the applications within the end stations will communicate with each other and with users. The bottom four  define how data is transmitted, end-to-end. Layer 7 Application – Provides a user ...

Python Programming for Hackers (Part 4) – Dictionaries Concept
By: bjacharya
April 12, 2016

Python Programming for Hackers (Part 4) – Dictionaries Concept Well, Welcome All to Part 4. Here, I'll give you the basic concepts on Dictionaries when it comes to programming in Python.[For the Video Lecture on this part, check out this link:  https://youtu.be/6LFot8r4fCY  ] - The Python dictionary data structure provides a hash table that can ...

Search Leaks and Lack of User Privacy
By: GREYART
April 11, 2016

In today’s world, by using search engines we can find any information we want just by pressing few keys. The search engine is a great invention and we're all quite used to it. It's become a part of our daily lives as we search for many things we need to know.People mostly use the search engine to seek out ...

Exposition on the "Hacker Ethic"
By: True Demon
April 9, 2016

The modern understanding of computer science is a constantly mutating beast. The individuals who've been driving the Information Age's technological innovation are known as "hackers." Most people understand a hacker as someone who breaks into computers and commits data-theft. This is a gross misconception that I intend to ebb and erode away, slowly, like waves ...

[Part 2] - Networking Sniffing and How to Defend Against It
By: Antr4ck
April 8, 2016

Let's continue with more information on Networking Sniffing and How to Defend Against It...  UDP Scanning [-u] UDP is connectionless. Open ports may not respond to connections - ports and farms may not respond, either. But most systems respond with a ICMPPORTUNREACH when sending a packet on port closeure. ...

Ethical Hacking with Kali Linux – Part 5: Rogue Wireless Access Points
By: bjacharya
April 7, 2016

Ethical Hacking with Kali Linux – Part 5: Rogue Wireless Access Points Got free WiFi in the airport? At college? In motels? Or anywhere else?... Before connecting, we must make sure the access points are really broadcasted bycompanies/offices/colleges themselves. Maybe the AP is fake (and not really associated with airport/college/motels). Someone might have created a fake AP, ...

[Part 1] - Networking Sniffing and How to Defend Against It
By: Antr4ck
April 7, 2016

One of the first dangers on networks is that some people can "play" content that's not intended for them. In a network in broadcast mode (WiFi or Ethernet using a hub), anyone can read the packets of all. As with Ethernet, promiscuous mode for the network card does not filter packets that do not match the ...

Protect Servers with 'Entire Drive Encryption' via BitLocker
By: Yaser vp
April 6, 2016

Protect Servers with 'Entire Drive Encryption' Via BitLocker Windows BitLocker Drive Encryption is a new security feature that provides better data protection for your computer, by encrypting all data stored on the Windows operating system volume. (In this version of Windows, a volume consists of one or more partitions on one or more hard disks. ...

Create Your Own Kali Linux ISO
By: Z33MAX
April 6, 2016

Welcome back, Cybrarians, Today, we're going to create a custom Kali Linux distribution. We'll go through the steps of building a customized ISO that can be run Live or on VirtualBox machine. First, you might wonder why we're going to create our own distro when there is an existing one already? The answer ...

The Real Science Behind Cracking Passwords
By: True Demon
April 6, 2016

Introduction A lot of ordinary computer users understand what a password is. It protects their sensitive data and it's all they need to get access to a majority of accounts. It's also that all-important word that will allow them to access their significant other's Facebook profile while they're away to make sure they haven't ...