0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Do I want to be a Hacker? Sort of...
By: infosectdk
August 18, 2016

“How do I become a hacker?” This is a recurring theme/question that's cropping up more and more. I will be frank and honest: I get a bit bored seeing this. And, if that's your first and initial focus as a path into InfoSec, then it's a bit narrow.I will say hats off to KnightsCode for their ...

The First PC Virus: Brain Virus
By: usman47
August 18, 2016

Hello my Geeky Hackers,Today, I'm going to tell you about the first PC virus ever written that comes from my own country, Pakistan. Hopefully you guys will love the story (..) .  Who , When, Why  and How? Brain Virus is considered to be the first virus written for PC's. It was written in 1986 by two brothers: Basit ...

29 Useful Commands in Nmap (Plus a Bonus)
By: cardangi
August 17, 2016

#1: Scan a single host or an IP address (IPv4) ### Scan a single ip address### nmap ## Scan a host name### nmap server1.cyberciti.biz ## Scan a host name with more info### nmap -v server1.cyberciti.biz Sample ...

How to Write a Script in Kali Linux Used to Identify Hashes
By: junkwerks
August 17, 2016

[caption id="attachment_70042" align="aligncenter" width="1024"] Linux Password File [/caption]I was planning to move on from my series on hashing, but after spending some time digging around /usr/bin on my Kali VM, I decided that a little more fun could be had. So, let's say you are on a pentest job and come across some hashes. These will ...

A Beginner's Guide to Entropy
By: maggiee
August 16, 2016

Recently on Cybrary OP3N, I read this article  on Distributed Random Bit Generators. While the article was informative, I thought that readers unfamiliar with the concept of entropy might not be able to grasp some of its contents. I was thus inspired to write the this complete beginner’s guide to Shannon entropy, including a use case ...

Identity Secret: How to Become a Ghost Hacker with Proxychains
By: Z33MAX
August 16, 2016

Welcome Back, Cybrarians!!!! When it comes to hacking remotely, the number one priority that comes to a hacker’s mind is how to stay anonymous and operate under the radar in order to be safe. Anonymity is a big topic in the digital world that becomes complicated as technology advances. However, achieving a complete anonymity ...

Tradecraft Tuesday - Mobile Exploitation
By: kylehanslovan
August 16, 2016

What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each week in a LIVE video chat . These unrehearsed conversations allow anyone to learn, ask questions, ...

Python Programming For Hackers (Part 6) - Creating SSH Botnet
By: bjacharya
August 16, 2016

And again, Hello Cybrarians ! Python Programming For Hackers (Part 6) - Creating SSH Botnet In this part, I'll talk some theory on Botnet and then we'll see a basic SSH Botnet (including Python scripts and coding). > Before going to SSH Botnet, let's see the definition of Bot/Botnet first. Bot   Actually, ...

Hashing Using the OpenSSL Toolkit
By: junkwerks
August 15, 2016

In part 1 of this series discussing hashing, we explored how to run hashing commands from the command-line in Linux, OSX, and Windows 10. Part 2 took a more global overview of hashing and its uses. In this, part 3, we'll look at one more way to produce a hash via the command-line in most variations of opensource *nix ...

Understanding ISO 27001 - An Information Security Standard
By: saki76
August 15, 2016

Over the last few months, I have been reading about various IT and InfoSec frameworks such as COBIT , NIST CyberSecurity framework and ISO 27001 as well as CIS Critical Security Controls to find a suitable framework to implement in my organization. ISO 27001 is one of ...