0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

The First Line of Defense to Consider
By: prabesh8583
August 29, 2016

We all are living in this computer era where data has been everything in our life. So this is the time where we cannot trust anyone. Anyone can plan and attack our system in order to steal our data. So we must have to be alert all the time. In order to be ready from these attacks, ...

OSI Model Refresher
By: foxpro
August 29, 2016

I have met so many people in the software industry that don’t understand the OSI model. It's only when you understand the OSI model, you can say that you now understand how the Internet works. There are many examples and explanations on this topic, but none of them paint a simple picture that you can memorize and recall ...

CyDefe Cyber Security Podcast Mini Episode 4
By: CyDefe
August 28, 2016

On this episode Micheal and i talk about CVE-2016-5696 better known as the off path attack. You can listen to our podcast on our website cydefe.com or via our youtube channel below. If you enjoy our podcast please subscribe to our channel and follow us on twitter . [embed]https://youtu.be/zJiu7yg9QpM[/embed] Show Notes: in ...

"HEATHEN" IoT Pentesting Framework is Released
By: chiheb chebbi
August 25, 2016

Oxford defines the Internet of Things as: “A proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”Heathen IoT of Things Penetration Testing Framework developed as a research project, which automatically help developers and manufacturers build more secure products in the Internet of Things space based on the Open ...

Cyber Dust is the Messaging App to Have for Mobile Security
By: Brandyn
August 25, 2016

Cyber Dust (the current app name, which is soon to be just 'Dust') is truly 100% secure. Mobile messages are sent from your device to your associates device. Once it's read it disappears completely.According to one source: " Cyber Dust is simply a more natural way to communicate without leaving a trail of everything you say. Messages ...

PenBox: An Automated Pentesting Framework
By: xdrjokerx
August 24, 2016

PenBox – A Penetesting Framework The Penetration Testing Framework, PenBox, is in the last version. It will have every script that a hacker needs, including: Information Gathering Nmap Setoolkit Port Scanning Host To IP WordPress user enumeration ...

Advantages of SSD Discs
By: FastSystem
August 22, 2016

SSD (Solid State Drive) discs are used very commonly worldwide nowadays. Come with me to look at the advantages of these devices. Here's a quick summary of what you'll get with these SSD discs: Faster boot of OS's High stamina as you don't have any mechanical parts Low power consumption ...

Cryptography: Hiding Any File in Any Other File Without Losing Data
By: Babak Esmaeili
August 22, 2016

There are many ways of hiding data in cyber security, but one of the simplest and safest way is to use our: Hex editor, Notepad++ and a unique palmy key.  Tools Needed: HXD hex editor Notepad++ A unique key --> for instance, mine is : 3434k (it's totally desirable ...

Understanding How Botnets Work
By: Antr4ck
August 21, 2016

Introduction Botnets are computer botnets, which are programs connected to the Internet to communicate with other similar programs to perform certain tasks. An Internet bot is an automated or semiautomatic software agent that interacts with computer servers. A bot connects and interacts with the server as a client program used by ...

Windows Command Line Shutdown
By: Gov't Mule
August 19, 2016

This is particularly useful when you're connected to a Windows system via RDP or a VPN tunnel and need to shutdown or reboot the system. Using the "Start" button when using RDP, the only options offered are "Logoff", then Disconnect or Lock. Not very useful when you need to reboot or just shut the system down from a remote ...