0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Have You Seen These 3 SonicWALL Functions?
By: huntincj
July 7, 2016

Recently, I took another SonicWALL clas and was shocked to see some of the functionality that's available to the smaller business with devices such as the NSA 220.Here are 3 functions you may find surprising:  1. Regular Expression (REGEX) Matching (5.9 and Up) This is particularly powerful for DLP if you host your own email server. You can set ...

Privacy Matters
By: Antifuse
July 6, 2016

Is Privacy Worth Protecting? Absolutely. Although, some people would say otherwise, claiming things like, "People don't care about their own privacy", and "Why should they care if they have nothing to hide?" This way of thinking implies people don't care about their "rights" to privacy. Privacy should be protected, even if we don't care about our own right to ...

"Done for You" - The Complete List of Python Training Classes (Plus a Bonus)
By: ginasilvertree
July 6, 2016

Advanced Activities in Python Length: 39:47 Basic Python Commands and Functions Length: 29:47 Ctypes in Python Length: 31:32 Data Structures in Python Length: 31:36 Exceptions and Classes in Python Length: 28:05 Exploit Development (part 5) Python Length: 08:28 How to Install Python Length: 11:03 ...

Cyber Workforce Solution: Hire More Veterans
By: ginasilvertree
July 6, 2016

By Kathleen Smith For the last several years, cyber security leaders and business owners have been lamenting the worldwide hiring crisis for cyber security professionals [1] . From building new educational programs, to discussing the relaxation of immigration regulations, every corner of the cyber security community has looked for an answer to this crisis. At the same time, ...

Roadmap for Routine Administration Manpower Requirements
By: Wookie
July 6, 2016

For the system administrators out there, and the managers of those teams, taking care of an enterprise often boils down to a fiscal year's hardware and software costs and whether those assets are being properly managed. Rarely, are IT teams prepared to justify their own existence to the CIO.In most cases, manpower is lucky to be an afterthought, when ...

Email Spoofing with Python Tools
By: Denny Gonzalez
July 5, 2016

Greetings to all, Email spoofing is a very old technique. It's still widely used in the schemes Spear Phishing or Spear Apps to trick a user into believing they're receiving an email from a specific person. That is, a user impersonates another and try to make a credible message as possible. In many ...

How to Sandbag Against IP Target Acquisition for Reverse Proxied/Obfuscated Services
By: V
July 5, 2016

This article is the counter to my article about finding the obfuscated IPs of a server. In the pentesting scene and security scenes, one of the more popular methods of securing servers and websites is by obfuscation and/or misinformation. If you can't find the real IP of a backend server, it's harder to accurately test it for: ...

Sunday’s Cyber Security Fact: Cyber Security Standards (July 3, 2016)
By: ginasilvertree
July 3, 2016

What are Cyber Security Standards?   "Cyber security standards are various forms of security standards which enable entities and organizations to practice security techniques to help minimize the number of cyber security attacks. In essence, the cyber security standards are fundamental guides which provide a general outline as ...

"Done for You" - Collection of Content on How to Prevent Ransomware
By: ginasilvertree
July 2, 2016

Today, most companies are deeply concerned about how to prevent ransomware. News stories abound and Infosec professionals are scrambling to keep themselves and their users out of the fire.Below, you'll find a compilation of content to understand this important topic - from a 360 perspective.But, first a quick definition. According to Wikipedia: "Ransomware is a type of malware that ...

CyberPop - What's Penetration Testing or Pentesting?
By: ginasilvertree
July 1, 2016

CyberPop is a quick way to learn more definitions and facts about cyber security.  Today’s Question: What's Penetration Testing or Pentesting?   Answer: “Penetration Testing or Pentesting refers to techniques for actively testing an organization’s computer or network security, usually by identifying potential vulnerabilities and weak spots and trying to exploit those and/or break in.” Browse courses and topics ...