0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Ethical Hacking with Kali Linux - Part 2: Finding Hidden SSIDS
By: bjacharya
March 29, 2016

Ethical Hacking with Kali Linux - Part 2:  Finding Hidden SSIDS >> Welcome all, to this series of Kali Linux for Ethical Hacking. This is second part and we’ll be seeing some of the techniques of uncovering hidden SSIDs.  # Process – Enabling Wireless Monitoring : airmon-ng– Discovering the APs (Access Points) : airodump-ng– Stay calm for Association ...

Steganography: Hide Data in Media Files (Mr. Robot Hack)
By: Z33MAX
March 29, 2016

Hello Cybrarians, If you've seen Mr.Robot TV Show about a guy who works as Cyber Security Engineer by day and a hacker by night, then you likely have seen what we're going to do in this tutorial. In the show, Eliot the hacker hides his data into innocent looking audio files and ...

Analyzing Major Cyber Security Attacks in Turkey
By: Motasem
March 29, 2016

Abstract This report aims to shed light the major cyber security attacks that have hit Turkey’s infrastructure. It's based on analyzing the vulnerabilities that opened the gateway for those attacks and how such an attacks could happen in the future if the appropriate security measures are not be implemented.The objective of this paper is to reach a consistent ...

Breaking the User 'Kill Chain'
By: Yaser vp
March 29, 2016

Today, we'll talk about breaking the user ' Kill Chain .'You've probably heard about the E-bay, Sony and Target breaches. The attackers took advantage of non-trained employees' credentials or used similar ways to break in. It's sad that 75% of attacks occur by using user credentials, which are the main road in for the attackers.  The User 'Kill Chain' Process ...

Ethical Hacking with Kali Linux – Part 1: Objective
By: bjacharya
March 29, 2016

Ethical Hacking with Kali Linux – Part 1: Objective >> Welcome all, to this series of Kali Linux for Ethical Hacking. This is first part and we’ll be seeing some of the intentions of this series.Kali Linux is a special OS for Hacking and Penetration Testing Tools (for “White Hat” use). # It's used for: – Improving system ...

Are You Offended by Offensive Security?
By: monroerl
March 28, 2016

A commonly held belief in the realm of digital security (cyber security for the new folks and the media) is the methods employed are strictly defensive in nature. Networks prepare for and wait for an attack, defend against the attack, respond as needed and maybe even report the attack to the authorities. If the attack was ...

Cybersecurity News Site Review: TechNewsWorld – Cybersecurity Section
By: ginasilvertree
March 25, 2016

Cybersecurity News Site Review: TechNewsWorld – Cybersecurity Section Relevance to the Readership: Potentially high. A Google search on “cybersecurity news sites,” returned this site as the second listing on the SERP. This site may likely have a devoted readership, who are comfortable with the format, content and other features. Main Feature(s): ...

A Quick Mathematical Formula for Subnetting
By: Fabien M.
March 24, 2016

Let's begin.Steps: Write powers of 2 left to right Write CIDR subnet masks from 1 to 32. This will take 4 lines, one for each octet in the IP addresses Write the subnet mask: add powers of 2 from left to current column  You can invert 2 and 3 if ...

Part 5: Create a Complete Virtual Environment for Penetration Testing
By: Z33MAX
March 24, 2016

Welcome back to the fifth part of the tutorial series. Today, we're going to learn how to compact a VDI into less disk space. I'm going to compact Windows Server VDI and then Sysprep it for ready-to-go imaging or future cloning. Tutorial Requirements: VirtualBox Windows Server R ...

Web Application Security Trends
By: monroerl
March 22, 2016

Application security is frequently found next to web application security in conversations, policies, news reports and annual cyber security trend articles. This word association can be attributed to our increasing reliance on mobile computing and use of Java-enabled content. Taking a page out of the web site content playbook, software applications are being built as needed, a technique known as ...