0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Evil Twin Access Point | WiFI Pumpkin
By: fr4nc1stein
October 6, 2016

Hello Everyone:I would like to share how to setup an Evil Twin Access Point. Pre-requisite: Operating System: Kali 2.0/WifiSlax 4.11.1/Parrot 3.0.1/2.0.5In other Linux like UBUNTU you need to install the following dependencies:      Python 2.7     hostapd     isc-dhcp-server ...

How to Reverse Engineering an Android Application Package (APK)
By: Divya Lakshmanan
October 5, 2016

Have you wanted to look inside the code of your Android application to see how it works?Here is a technique for you. I have done this on Kali. You can also perform this procedure on other Linux distros as well as Windows also (you need to download the required tools). Prerequisites: 1) Basic knowledge of Android Programming Tools required: 1) adb ...

Women in Tech – Smashing Myths and Prejudice
By: rcubed
October 5, 2016

What if I were to tell you that during the stone age of computing (1940s) women dominated the programming profession? You might have a difficult time believing me if you were to look around and observe the gender imbalance of women in tech today, but during WWII, it was women that “manned” the frontlines in the computer programming arms ...

Don't Get Scammed by An e-mail about A Parcel
By: prezzio
October 5, 2016

During last few months you might have observed an  increase in phishing and scam attacks. So… read the guidelines below and don’t get caught. Be a little skeptical of the following: Treat outlandish email offers as junk mail.  If they look too good to be true, then they probably are. ...

Personnel Security – Adjudication of the Human Resource and the “Whole Person” rule.
By: J.
October 3, 2016

     Personnel Security is of course concerned with the people that have access or management is considering for access to the company, government or other institutions resources. It is therefore important that, like any other security consideration, a risk based approach be taken to the determination of hiring or retaining employees, contractors, vendors or others (including visitors) ...

National Cybersecurity Awareness Month 2016
By: rcubed
October 3, 2016

The National Cybersecurity Awareness Month 2016 is entering its 13 th year this October. Founded in 2004, it is co-sponsored by the United States Department of Homeland Security (DHS) and the National Cyber Security Alliance (NCSA) to put the focus on the threats that exist online and the vigilance we all must assume to protect ...

Practical Web Application Penetration Testing Series - Chapter 3a
By: Babak Esmaeili
September 30, 2016

Burpsuite Scanner Tutorial Hello Cybrarians, We are gonna divide this chapter into 3 sections: A brief intro of burp scanner,configuration and installing add-ons and plugins to it and engaging it with explorer  Keep going on pentesting ...

Practical Web Application Penetration Testing Series - Chapter 2
By: Babak Esmaeili
September 29, 2016

In the first chapter we saw how to detect and recon the technology of a website. Now, in chapter 2 we are going to use https://viewdns.info/ website or google.com for detecting the sub-domains of a website and information gathering. In Google, we use the query site:*.targetsite.com ...

How to Create a Mobile Pentesting Environment
September 28, 2016

Smartphone users are exposed to numerous threats after they use their phone. These threats can disrupt the operation of the smartphone, and transmit or modify user information. For these reasons, the applications deployed there must guarantee privacy and integrity of the data they handle. Mobile security involves protecting each personal and business data keep on and ...

Basic DHCP Configuration
By: cybern4
September 28, 2016

DHCP is the dominant way of providing end user devices with the information required to connect to your network.In small or midsize environments DHCP is usually provided through the ISR Router. Steps needed to deploy DHCP   Define which addresses are going to be excluded.  Statically configure addresses on Servers ...