0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Anatomy of a DDoS Attack
By: rcubed
October 28, 2016

Friday morning October 21, 2016 didn’t get off to a good start for me. Shortly before 9 am EDT I was attempting to make an online purchase using PayPal as my payment processor of choice. When I clicked the “Submit” link (the button graphic wasn’t displaying), my browser spun its wheels for a few seconds and then ...

An A-Z Index of the Windows CMD Command Lines
By: fkay2014
October 27, 2016

List was taken from the following website:  https://ss64.com/nt/ A: ADDUSERS Add or list users to/from a CSV file ADmodcmd Active Directory Bulk Modify ARP       Address Resolution Protocol ASSOC     Change file extension associations• ASSOCIAT One step file association AT        Schedule ...

KATANA Framework: The Hacker's Choice
By: bachan
October 27, 2016

Hello Cybrarians, Wazzup?! It's time to have some fun with Katana . Katana is a framework written in python for the pentesters, by pentesters. It is a very user-friendly and comprehensive platform. The project is open source. You can even add your own modules and update it, as well as clone it to your machine by following the ...

Self-driving Cars: An Introduction
By: rcubed
October 27, 2016

Elon Musk, CEO of Tesla Motors, recently announced that all the electric cars coming off Tesla’s assembly line will now be equipped to be full-on autonomous. It appears that the quest for truly self-driving cars – ones where you don’t have to sit in the driver’s seat anxiously hovering over the wheel in case human ...

4. Python for Hackers - Reverse TCP Shell
By: Priyank Gada
October 27, 2016

What's inside: In this video, we will be learning more about TCP reverse shell. In next video, we are going to learn about how to create TCP reverse shell. Description:This lesson discusses Python for Hackers and covers the basic concepts of TCP reverse shell and teaches about various types of shells.[toggle_content title="Additional Materials & Information:"]Github ...

Top In-Demand Cyber Security Certifications
By: rcubed
October 26, 2016

When it comes to IT certifications most would agree that the “Big-3” essentials are CompTIA A+ , CompTIA Network+ , and CompTIA Security+ . From there, a few specialized certs along the lines of Cisco CCNA, Linux and Microsoft certifications as well as a few other vendor and technology-specific certifications, are a good bet ...

2. Python For Hackers - Attacker's Machine
By: Priyank Gada
October 25, 2016

What's Inside: In this video, we are going to configure the attacker's machine and we are going to install Kali Linux on it.  This is the second video of the series. Description:This lesson is about Python for Hackers . Participants learn the following: Installing virtual box Installing Kali Linux ...

1. Python For Hackers - Introduction
By: Priyank Gada
October 25, 2016

What's Inside: This is the first video of the 14 Part Course series. In this video, we will see what's in the course and how are we going to proceed. Description:This is designed for ethical hackers and is on a basic level. Participants learn how to set up a lab using python and learn about other tools. Github Repository ...

DDOS: Infinite Pinging Yourself in *Juliar *
By: Rattar
October 25, 2016

Introduction In this tutorial, I will show you how to create a super simple program to DDOS yourself. You heard that correctly, we are going to DDOS ourselves. This tutorial doesn't use any advanced methods and as such should only be used as a beginners tutorial. So let's create an infinite ping on a machine using Juliar. Who ...

How to Pivot the Network (Port-Forwarding/Redirection) - A Hands-On Look
By: breuermar
October 25, 2016

Description: This tutorial is about "moving" through a network (from machine to machine). We use a compromised host as our pivot to move through the network.  This tutorial has a lack of screenshots. You can create the screenshots yourself as you follow this tutorial ;-) Prerequisites: You need (at least) three machines for this tutorial. ...