0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Kali Linux Command Lines Part 4 – Man Pages
By: bjacharya
February 23, 2016

Welcome to Kali Linux Command Lines – Part 4. This part will explain the use of Man pages ( also called Manual Pages ) on your Unix or Linux computer. I'll talk about related commands like ' whereis ' & ' whatis '. Man pages can be used to know the use of tools or how to use tools. ...

FCC Rules May Prevent Installing Alternative Software
By: xyberdanpl
February 22, 2016

Where's the honesty? New FCC rules may prevent installing alternative software e.g. OpenWrt/Gargoyle, Tomato on some routers. In Europe, it does not apply. However, companies such as tp-link goes to the sitter and all the utensils for the global market will have this limitation.Many stock firmwares e.g. tp-link and others are insecure and do not allow the ...

Secure Your WiFi in 7 Steps
By: Hemang Doshi
February 22, 2016

Secure Your WiFi in 7 Steps If the first question that comes to mind after reading the topic of this post is ‘Why do I need to secure my WiFi?’, then read on...  What are the risks of using an unsecured wireless network? In simple language, it's like going for a trip without locking ...

Script: Install OpenVAS 8, DB Redis and Debian 8.1 (Jessie) x86_64
By: Mauro Risonho de Paula Assumpção
February 22, 2016

OpenVAS (Open Vulnerability Assessment System, the name of the fork originally known as GNessUs) is a framework of several services and tools offering a vulnerability scanning and vulnerability management solution. All OpenVAS products are Free Software. Most components are licensed under the GPL. The latest version is 8.0, released April 2015. - Source:Wikipedia  #Script install OpenVAS 8, DB Redis ...

A Few Tricks to Manually Pentest a Website (Without Any Tools)
By: Dr3AMCoDeR
February 22, 2016

Dear Cybrary Readers,First, I'd like to say "Thank you" for your enormous support in following and reading my articles. I'll be happy to continue writing new articles related to IT security.Many people have asked me to concisely explain what happens "under the hood" while a pentester is testing a website. You should know that many things happen, on many levels, over a ...

3 Steps to Turn Your Old Smartphone into a Security Camera
By: Adhisen Chiniven
February 22, 2016

Do you have an old Smartphone laying around? Turn it into a security camera.  Follow these 3 steps: Download IP Webcam from PlayStore onto your device Launch the application and adjust the settings (this depends on what you want). Navigate to the bottom and click Start Server. Next, you'll get ...

Security Breaches with NAT64?
By: Mario
February 17, 2016

I wrote this article to support all our colleagues around the world who are testing or deploying IPv6 on their networks. Recently, my team and I have been working on a lab to deploy IPv6 in our office. We finally succeed on getting an IPv6 network communicating with an IPv4 network and with the internet (it seems easy, ...

[podcast] "Moxie vs Mechanisms": The Over-Dependence on Tools and Automation
By: BrBr
February 11, 2016

This week starts with an apology to Michael Gough about comments I (Bryan) mangled on the "Anti-Virus... What is it good for?" podcast. Then we get into the meat of our topic... a person's "Moxie" vs. a mechanismMoxie: noun"force of character, determination, or nerve." Automation is a great thing. It allows us to do a lot more work with less personnel, ...

Same-Site Scripting: The Lesser-Known Vulnerability
By: vinothpkumar
February 9, 2016

Hi Readers,It's quite possible that a sub-domain has a "loop back" address, i.e. 127.0.0.1. Many security researchers and developers may not be aware of this lesser-known vulnerability.Imagine a scenario where a user has to access "subdomain.example.com". If the sub domain is configured with address 127.0.0.1 and, if the user is already running a service on their localhost (Eg. Xamp/Wamp ...

The Complete Alphabetical List of Kali Linux Commands
By: Harold Finch
February 9, 2016

The Complete Alphabetical List of Kali Linux Commands   a apropos Search Help manual pages (man -k) apt-get Search for and install software packages (Debian) aptitude Search for and install ...