0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Where To Find Cisco Packet Tracer Sample Used To CCNA Course?
By:
January 1, 2016

I wonder if it is possible to downloaded Cisco Packet Tracer sample of network used for CCNA course? hii You would have to download Packet Tracer, then create the network as you see it in the course. Will give you plenty of practice in setting it up and troubleshooting any issues. You can download in link: https://getintopc.com/softwares/network/cisco-packet-tracer-6-1-free-download/ there's a newer version on the cisco ...

Where Can I Find - Cyber Security Project Ideas?
By:
January 1, 2016

I am posting this question here because it is one of the open source website for giving free and lot of security people keep in touch.I would like to know or find out for doing projects in cyber security field.So I would like to know where can I find project ideas/or based on some problems - solving stuff....How can I ...

What's The Difference Between Implicit Deny And ACL ?
By:
January 1, 2016

In the 5.5 Firewall course, both Implicit Deny rules and ACL were described as a way to filter traffic, but what's the difference between them ? The ACL is the entire list of rules. The Implicit Deny is just one rule in the ACL that blocks all traffic that is not explicitly allowed. If your firewall rules looked like this: Action\\\\\\Source\\\\\\\\\\\\\Destination\\\\\\_Port ...

What Programming Languages Should A Hacker Learn?
By:
January 1, 2016

What programming languages should a hacker learn? and to become a C|EH. I've read a lot of hackers learn python, javascript and HTML, javascript and HTML for web attacks and python for scripting I'm personally learning Python first because its a good intro language CEH is a multiple choice test. I do not have the certification, but I think that you do ...

What Other Courses To Take For Sec+ CE Credits?
By:
January 1, 2016

I just finished the Security+ class, but I still need about 15 more credits to renew my Sec+. Which classes would be best to take? I really liked the Cybrary Cryptography course. In fact, I used that course as part of my studies for passing the Security+ exam. The Cryptography course here is about 3 hours long and good for 3 ...

What Is The Scope Of Cyber Security And Ethical Hacking?
By:
January 1, 2016

A career in cyber security and ethical hacking requires a structured methodology and just like any career, it will require some blood and sweat and time. According to one report, there is a huge demand of cyber security professionals and it is to be growing in coming years 3.5 times faster than the demand for other technology jobs. These reports ...

What Is Ideal Exploit To Exploit Pure-FTPd FTP Server?
By:
January 1, 2016

Hello. Here are below the result received after scanning the web application: [*] Nmap: 21/tcp ...

Weidman Penetration Test Book Error At Http://localhost/bookservice/ - Win 7
By:
January 1, 2016

Hello, everyone! I am currently working through Georgia Weidman's book Penetration Testing - A Hands-On Introduction to Hacking. I have run into some small issues with the book being a few years old, but have been able to google/forum/puzzle them out thus far. I have hit a wall on this however and could use a hand. I loaded Windows 7 ...

WebDAV - 405 Method Not Allowed
By:
January 1, 2016

I am stuck with webDAV. I am trying to use webDAV on XP VM. and connecting through cadaver from kali. but receiving this error. Could not access /webdav/ (not WebDAV-enabled?): 405 Method Not Allowed Connection to `192.168.56.101' closed. its enabled from httpd.conf. Remote connection is allowed from XP and local policies. Hmm interesting you can use a few other ways as ...

Web Server Hacking (Simulation) [help]
By:
January 1, 2016

i have set up a testing environment using VMs. The server is win8 running WAMP server with some sample websites that my friend created. one site is purely informational ie with no user input whatsoever the second site has sql server and user input etc. The Questions:1. Attack Vectors?? ( I did a nmap and nikto scan, all i was ...