0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Friday morning October 21, 2016 didn’t get off to a good start for me. Shortly before 9 am EDT I was attempting to make an online purchase using PayPal as my payment processor of choice. When I clicked the “Submit” link (the button graphic wasn’t displaying), my browser spun its wheels for a few seconds and then ...


List was taken from the following website: https://ss64.com/nt/ A: ADDUSERS Add or list users to/from a CSV file ADmodcmd Active Directory Bulk Modify ARP Address Resolution Protocol ASSOC Change file extension associations• ASSOCIAT One step file association AT Schedule ...


Hello Cybrarians, Wazzup?! It's time to have some fun with Katana . Katana is a framework written in python for the pentesters, by pentesters. It is a very user-friendly and comprehensive platform. The project is open source. You can even add your own modules and update it, as well as clone it to your machine by following the ...


Elon Musk, CEO of Tesla Motors, recently announced that all the electric cars coming off Tesla’s assembly line will now be equipped to be full-on autonomous. It appears that the quest for truly self-driving cars – ones where you don’t have to sit in the driver’s seat anxiously hovering over the wheel in case human ...


What's inside: In this video, we will be learning more about TCP reverse shell. In next video, we are going to learn about how to create TCP reverse shell. Description:This lesson discusses Python for Hackers and covers the basic concepts of TCP reverse shell and teaches about various types of shells.[toggle_content title="Additional Materials & Information:"]Github ...


When it comes to IT certifications most would agree that the “Big-3” essentials are CompTIA A+ , CompTIA Network+ , and CompTIA Security+ . From there, a few specialized certs along the lines of Cisco CCNA, Linux and Microsoft certifications as well as a few other vendor and technology-specific certifications, are a good bet ...


What's Inside: In this video, we are going to configure the attacker's machine and we are going to install Kali Linux on it. This is the second video of the series. Description:This lesson is about Python for Hackers . Participants learn the following: Installing virtual box Installing Kali Linux ...


What's Inside: This is the first video of the 14 Part Course series. In this video, we will see what's in the course and how are we going to proceed. Description:This is designed for ethical hackers and is on a basic level. Participants learn how to set up a lab using python and learn about other tools. Github Repository ...


Introduction In this tutorial, I will show you how to create a super simple program to DDOS yourself. You heard that correctly, we are going to DDOS ourselves. This tutorial doesn't use any advanced methods and as such should only be used as a beginners tutorial. So let's create an infinite ping on a machine using Juliar. Who ...


Description: This tutorial is about "moving" through a network (from machine to machine). We use a compromised host as our pivot to move through the network. This tutorial has a lack of screenshots. You can create the screenshots yourself as you follow this tutorial ;-) Prerequisites: You need (at least) three machines for this tutorial. ...