0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Refer A Friend
By:
January 1, 2016

How do i refer my friend from here? Hello On Cybrary's Home Page, there is a big button that says "Invite a Friend" under where it lists your login streak and your current amount of cybytes. Then just follow the instructions :) https://www.cybrary.it/invite/

Redeeming A Voucher
By:
January 1, 2016

Hi everyone, I'm sorry to be asking about this but the email support hasn't responded in days. Also sorry for the fact that this is a totally noob question. I recently spent $287 to purchase the voucher to take the CompTIA+ test (I do have the code). However, I see nowhere the instructions on how to redeem said voucher. Can ...

Recreating Sloot Digital Coding System
By:
January 1, 2016

Here is a puzzle! In 1999, a new algorithm was supposed to be released "Sloot Digital Coding System" which was never released. Let's try to re-create it! What can it potentially do? It can take an 8GB movie and compress it to only several hundreds of kb. What do we actually know? An average DVD movie is 4GB. With a ...

Recon-ng: Pwnedlist_api Not Found
By:
January 1, 2016

Hello I'm watching the Information Gathering videotutorials and I have a problem with recon-ng. When I run a module from pwnedlist, the program shows the following error message: "FrameworkException: API key 'pwnedlist\api' not found. Add API keys with the 'keys add' command. I have found the next solution in the recon-ng wiki: "PwnedList API Key (pwnedlist\api) - Contact PwnedList directly ...

Recommended Vulnerable Web App
By:
January 1, 2016

I have been looking around and I see there are many vulnerable web applications such as UltmateLAMP, DVWA, WebGoat, etc. However with so many to try there is no time to test them all. So my question is for those who are more experienced, which vulnerable web application would you recommend to quickly get a person from a novice to ...

Raw Socket Error Path Analyzer Pro
By:
January 1, 2016

Hello. I was just trying to test Path Analyzer Pro on Win 10 but I keep getting the raw socket error meggage. I disabled the firewall but that didnt help either. Does anyone know how I can bypass this error? Thanks a lot. pimonit Hello. I was just trying to test Path Analyzer Pro on Win 10 but I keep getting ...

Question About Being Anonymous Online During A Pentest
By:
January 1, 2016

Hey guys, hope you're all staying busy. I know I am. After the OSCP continuing with eLearnSecurity Practical Network Defense and Web Application Pentesting, Cybrary, Udemy and a lot more other stuff. During my studies a question came up about staying anonymous on the Internet. So I know that an IP address has to be given to the client/customer, which ...

Qualitative Vs Quantitative
By:
January 1, 2016

When you calculate risk by using the SLE and ALE values, is this qualitative or quantitative? According to Shon Harris it is qualitative but I am not 100% sure if I understand correctly. Qualitative is based on opinions and with using the formula's to calculate looks more like quantitative? Please give me your thoughts on this. Well Sir..u right ..Going purely ...

Python Security Vs. Java Security
By:
January 1, 2016

when we compare python and java which one is more secure???????????? depends on what you write with it :) In python everyone can see your code In java they can't (or not as easily) so in that sense java might keep you safer from some people, but if your program is well written, it shouldn't matter that they can see the ...

Python Programming For Hackers (Tutorial Series)
By:
January 1, 2016

Hello all cybrarians. :) Most cool site ever. - Here, under this topic we will be dealing with features of python for Ethical Hacking.- I have my post approved for Cybrary Op3n too. You can get all from there. If missed, then you can follow, and participate actively here. - Python Programming for Hackers. Part 1 – Getting Started**Hi, & ...