Cybrary Pro Day is here!

0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Video Not Working?
By:
January 1, 2016

Only the video part is not working, I've sent the complain to the support department. Just thinking maybe anyone else have the same issue. Thanks Which course are you having video issues with? Or are you having issues with all of them? Do you use NoScript? If so you might be blocking the player from starting properly. My suggestion would also ...

Video Data Recovery
By:
January 1, 2016

hello, I did recover a file named 'temp\_video' from the flashcard. but the file is without any extension and vlc and media player classic arent being able to play the video giving error saying video format codec not recognised. how can i verify this file and play in the media. thanks You can open the file with an hex editor tool, ...

Vega Vs Nikto
By:
January 1, 2016

Best for Web Vulnerability Assessment...

Useful Links And Resources To Begin With
By:
January 1, 2016

i want to share with you what i have gathered for this cool subject : 1) Do You Want To Be A Malware Analyst ! you should read this Guide to Successful Malware Analyst 2) youtube channel full of reverse engineering courses and malware analysis videos : RCE channel 3) Malware Analyst without malware to analyse ! get them from ...

USB Password Recovery (STEALER)
By:
January 1, 2016

Copy the program exe's to a flash drive (NOTE: you con find them using google and this is for people who are already a working IT tech or pentester not the average person so don't ask where to get the files as you should already know) NEXT --> Copy all programs to a USB Drive (DO NOT INSTALL THEM TO ...

Up-to-Date ACFE Certified Fraud Examiner CFE Exam Questions For Guaranteed Success
By:
January 1, 2016

How To Pass ACFE CFE CFE Exam Test In First AttemptHave you registered for ACFE CFE CFE exam? If your answer is positive then you need to quickly start preparing for the exam. There is never enough time because the room of improvement is always there. Now you must be wondering how to prepare and what resources/preparatory material to choose ...

Unusual Experience With Honeypot
By:
January 1, 2016

Quite a while since my last post on cybrary but here it goes as it seems a relevant topic. I have run honeypots for quite a few years, on and off, but I have never before seen the intrusions attempts I am getting nowadays. This is on one of my current honeypot (Cowrie. a fork of Kippo), which is part ...

Unknown User Hitting Servers
By:
January 1, 2016

I wanted to ask a question in regards to a strange activity that we are noticing within our Domain Controllers and one of our servers, our SIEM is alerting in regards to an unknown user account with the name 1B9E3760. We have checked all of our servers for any local service accounts or scripts. We haven't found where this activity ...

Two Factor Authentication For Network Devices??
By:
January 1, 2016

Greetings: Nice to e-meet you all. I have a question regarding a new regulation that is addressed to financial institutions. Basically, this regulation establishes that all network devices in a corporate network, such as routers, switches, firewall, etc.. must have the capability to login into the admin console with a two-factor authentication technology. I know this sounds kind of weird ...

[Tutorial] How To Set-up Pentesting Lab - Part 1
By:
January 1, 2016

So, if you are new to Hacking and Pentesting and you want to practice your skills, you might have one or most of these issues : 1. Finding a target that is live and safe to penetrate. 2. Even when found, testing these targets is unethical and could put them in jail. 3. Thinking setting up a vulnerable lab is ...