0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Hello Everyone:I would like to share how to setup an Evil Twin Access Point. Pre-requisite: Operating System: Kali 2.0/WifiSlax 4.11.1/Parrot 3.0.1/2.0.5In other Linux like UBUNTU you need to install the following dependencies: Python 2.7 hostapd isc-dhcp-server ...


Have you wanted to look inside the code of your Android application to see how it works?Here is a technique for you. I have done this on Kali. You can also perform this procedure on other Linux distros as well as Windows also (you need to download the required tools). Prerequisites: 1) Basic knowledge of Android Programming Tools required: 1) adb ...


What if I were to tell you that during the stone age of computing (1940s) women dominated the programming profession? You might have a difficult time believing me if you were to look around and observe the gender imbalance of women in tech today, but during WWII, it was women that “manned” the frontlines in the computer programming arms ...


During last few months you might have observed an increase in phishing and scam attacks. So… read the guidelines below and don’t get caught. Be a little skeptical of the following: Treat outlandish email offers as junk mail. If they look too good to be true, then they probably are. ...


Personnel Security is of course concerned with the people that have access or management is considering for access to the company, government or other institutions resources. It is therefore important that, like any other security consideration, a risk based approach be taken to the determination of hiring or retaining employees, contractors, vendors or others (including visitors) ...


The National Cybersecurity Awareness Month 2016 is entering its 13 th year this October. Founded in 2004, it is co-sponsored by the United States Department of Homeland Security (DHS) and the National Cyber Security Alliance (NCSA) to put the focus on the threats that exist online and the vigilance we all must assume to protect ...


Burpsuite Scanner Tutorial Hello Cybrarians, We are gonna divide this chapter into 3 sections: A brief intro of burp scanner,configuration and installing add-ons and plugins to it and engaging it with explorer Keep going on pentesting ...


In the first chapter we saw how to detect and recon the technology of a website. Now, in chapter 2 we are going to use https://viewdns.info/ website or google.com for detecting the sub-domains of a website and information gathering. In Google, we use the query site:*.targetsite.com ...


Smartphone users are exposed to numerous threats after they use their phone. These threats can disrupt the operation of the smartphone, and transmit or modify user information. For these reasons, the applications deployed there must guarantee privacy and integrity of the data they handle. Mobile security involves protecting each personal and business data keep on and ...


DHCP is the dominant way of providing end user devices with the information required to connect to your network.In small or midsize environments DHCP is usually provided through the ISR Router. Steps needed to deploy DHCP Define which addresses are going to be excluded. Statically configure addresses on Servers ...