0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

[PODCAST] Episode 21 The 2015 Wrap Up
By: CyDefe
March 1, 2016

Hey hey everyone after a very long break due to work, education, and family circumstances we are finally back. On this weeks episode we are joined by Ben Miller and Jayson Street. We discuss three stories from 2015 and talk about our predicitons for 2016. Dont worry we have another episode right around the corner. You can listen to the newest ...

Data Security: Simple Steps to Block USB Ports
By: Hemang Doshi
February 29, 2016

Data Security: Simple Steps to Block USB Ports Needless to say, the most common method for data leakage is through USB/Pen drive/Mass storage devices. Leakage is also high through PCs/laptops that get infected by viruses/malware.Most corporations have centralized control for usage of such devices. However, such controls are desirable in the offices ...

Part 2: CHFI and DIGITAL FORENSICS - AutoSpy Case and MD5 Calculator
By: bjacharya
February 29, 2016

Well, welcome to Part 2 of CHFI and DIGITAL FORENSICS - AutoSpy Case and MD5 Calculator For the Video Demo/Lab for this part, please click here : https://www.youtube.com/watch?v=jO5WVh1q4   What will we cover in this part? - Calculating/Comparing MD5 Hash of files, disks and folders with the MD5 hash calculator- Creating Cases with the AutoSpy ...

Anonymous: Who Are They and What Do They Do?
By: Brandon H
February 25, 2016

As anyone who's into the field of cyber security knows, there are many applications of these skills. Some people use them for their careers, others use it for self gain, and there are others, called hacktivists, that use the skills to do what they believe is benefiting society. There are many hacktivist movements, a large one being Anonymous, and ...

GlibC Linux Bug or Why Am I Making a New OS?
By: Rattar
February 25, 2016

It's been made public by Google researchers that there's a severe bug in GlibC library (A GNU C Library). This is the most fundamental library used by almost every application and almost every Linux-based distribution.Many routers and other hardware devices that used this library could be exploited. Also, programming languages such as Python, PHP and Ruby are affected.The bug ...

Comprehensive PowerShell Tutorial
By: nginIzz
February 24, 2016

First, a look at some code: Add-PSSnapin Microsoft.Exchange.Management.Powershell.E2010 $header = "<style type='text/css'>n" + "td { width: 200px }n" + "th { text-align: left }n" + "</style>"$d = get-date$nondefault = Get-Mailbox -Database 'Mailbox Db0' | Where-Object {$_.UseDatabaseQuotaDefaults -ne $true} | Select-Object Name,  IssueWarningQuota, ProhibitSendQuota | ConvertTo-html -Title "Mailboxes in Mailbox DB2" -Head $header$emailFrom = ...

Two-Factor Authentication for Online Banking
By: Yash8878
February 24, 2016

This my first post, so I'll start with a serious issue in our day-to-day lives. I'm posting for the purpose of awareness.Millions of people use online services every day. It's crucial that systems prevent users from accessing each other's information. So, they need ways of uniquely identifying each user that prevent users from impersonating each other. This is called ...

How to Translate IP Addresses by Hand
By: Rattar
February 24, 2016

Hey Guys,As promised, I'll describe a way to translate IP's by hand. I'll continue to write more articles about this subject as long as people are interested. What will we learn? You'll learn how to translate IP's (original v4 format), which consists of 4 decimal octets to a 1 decimal octet.  What materials do you need? -1 Pencil-1 Paper-Google Chrome ...

PowerShell: Testing Connectivity of Multiple Workstations on Your Network
By: airmanlacy
February 24, 2016

If you're tasked with pinging a huge list of workstations, look no further. Gone are the days where we must keyboard cram in the command prompt to test connectivity.First off, let's get you started with PowerShell. PowerShell is a free program offered by Microsoft and it's basically a command prompt on steroids.It's easy to find and easy to download. ...

[podcast] Pentesting and Defending a Mainframe and Mainframe Security
By: BrBr
February 24, 2016

[embed]https://traffic.libsyn.com/brakeingsecurity/2016-008-mainframe_secruity.mp3[/embed]This week's super-sized episode is brought to us thanks to previous guest Cheryl Biswas. You might remember her from our "Shadow IT" ( http:/brakeingsecurity.com/2015-048-the-rise-of-the-shadow-it ) podcast a few months ago. She reached out to us to see if we were interested in doing a podcast on mainframe security with her and a couple of gentlemen that were not unknown to us.Of course ...