0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Got Burgeoning Hacking Skills? Consider a Degree in Cyber Security
By: ginasilvertree
June 29, 2016

Got burgeoning hacking skills? Growing cyber security talents? A compelling mission to join or continue working in the cyber security industry? A cyber security degree is something to seriously consider: Cybercrime continues to grow into more of a global threat – just read the news. Small, medium and large companies desperately ...

How to Hide Your IP Address (Change IP Address)
By: Genius
June 29, 2016

Changing or hiding your IP address is one of the biggest concerns of all hackers. The IP Address can reveal your identity; it's your online address.If anyone can find your actual online address (IP Address), tracing it back to you wouldn't be that difficult. Thus, it's very important to hide or change your IP address before doing any kind ...

[Product Update] New Cybrary Certificate of Completion
June 28, 2016

We love feedback from our Userbase. We have thousands of Users taking Cybrary classes on a daily basis and wanted to ensure that a Cybrary Certificate of Completion is a valuable measure of achievement. It should be something you're proud to show your friends, family and employers.Upon 100% completion of a course on Cybrary, Users will continue to be ...

MITMF-1: Sniffing Passwords Using Man in the Middle Framework
By: Ajay Kulal
June 28, 2016

Hello Friends!!This is my first article for a Man-In-The-Middle Attack series.In this article, we'll see how to sniff passwords using a MITMF framework. I use a framework tool for Man-In-The-Middle attacks and you can read more about it here.   So, let's get started... 1. It's good habit to first read the Man Page or Help Page about ...

Find Juicy Data on Your Targets Using the OSINT Framework
By: Denny Gonzalez
June 28, 2016

Greetings to all, Let's talk about the OSINT Framework. It's quite interesting to search sources on an open information resource. The classification of themes and objectives is vast and offers many ideas on different investigations, based on the OSINT field. Besides knowing the different resources proposed in the OSINT Framework, it's an important tool for a ...

Tradecraft Tuesday - Mastering Cyber Attribution
By: kylehanslovan
June 28, 2016

What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each week in a LIVE video chat . These unrehearsed conversations allow anyone to learn, ask ...

Federal Information Processing Standards (FIPS) 199 – Categorization of Information and Information Systems
By: Eric
June 27, 2016

FIPS 199 – Categorization of Information and Information Systems   Introduction The Federal Information Security Management Act (FISMA) tasked the National Institute of Standards and Technology (NIST) to develop standards and guidelines that all federal agencies must follow. Federal Information Processing Standards Publications (FIPS PUBS) ...

Passwords (Those Things Your Users Tape to Their Monitors)
By: RoninSmurf
June 27, 2016

The intention of this guide is to help educate users on the importance of strong passwords and password practices. Passwords tend to be our first line of defense in securing our personal accounts, information, and livelihood. Ok, to be fair sometimes it's under their keyboards if they are trying to be sneaky about ...

Sunday's Cyber Security Fact - Operation “Get Rich or Die Trying” (June 26, 2016)
By: ginasilvertree
June 26, 2016

Operation “Get Rich or Die Trying” — Beginning in 2005 and for a more than a three year period, American hacker Albert Gonzalez, along with accomplices in Russia and the Ukraine, pulled off what has been called the largest cyber crime of all time, stealing more than 170 million credit card and ATM numbers. Total losses were ...

CyberPop - What Does 'Kill Chain' Mean?
By: ginasilvertree
June 24, 2016

CyberPop is a quick way to learn definitions, terms and facts about cyber security.  Today's Question: What does 'Kill Chain' mean? Kill Chain is a "military-inspired term encompassing the various stages of a cyber attack—reconnaissance, weaponization, delivery, exploitation, installation, command and control, and action. Applies mainly to malware attacks, and was popularized by Lockheed Martin." Never. Stop. Learning. >> Browse ...