0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

MAC Address Numbers And Letters
By:
January 1, 2016

Correct me if I'm wrong but MAC addresses start with 0-9 and A-F. Not always. MAC addresses are made up of 6 hexadecimal numbers, so they can start with any permutation on 0-9 and A-F. Sorry, I should have rephrased to say "can start with.." Either way you answered my question. I knew it was correct but one of the CCNA videos ...

Lists Of Linux Command
By:
January 1, 2016

I was looking around for a list of command and what they do and found these 2 to be useful. I am sure there are other if anyone else has to share. https://www.latesthackingnews.com/linux-basic-commands/ http://lifehacker.com/learn-basic-linux-commands-with-this-downloadable-cheat-1552019180 I was looking around for a list of command and what they do and found these 2 to be useful. I am sure there are other if ...

Linux - Unix Security Auditing Tools
By:
January 1, 2016

LUNARLockdown UNix Auditing and Reporting Introduction This scripts generates a scored audit report of a Unix host's security. It is based on the CIS and other frameworks. Where possible there are references to the CIS and other benchmarks in the code documentation. Why a shell script? I wanted a tool that was able to run on locked down systems where ...

Linux (Kali Or Any Other) On The Mobile Device
By:
January 1, 2016

Hi Cybrarians :) I have a rather weird question which I cant find an answer to, is it possible to install a Linux distribution (Kali or whichever) on a mobile device like android phone or windows phone? I know there is a Ubuntu phone and Android is based on Linux kernel so I presume it should be possible. Thank you ...

Linux Equivalent Of PsTools
By:
January 1, 2016

I just got to the video where Leo shows all the cool things you can do with PsTools from command prompt in windows. I wanted to know if there was an equivalent tool or way to perform the same attacks from Kali Linux which is debian based??? Have a look in this links may be you fine something similar. https://steronius.blogspot.com/2013/05/psexec-via-linux.html

Linux Command Line Cheat Sheet
By:
January 1, 2016

https://overapi.com/linux This is an excellent command reference. This is definitely recommended for someone who is new to Linux. I knew the majority of these, but it is always useful to keep a reference close at hand. For instance, I haven't used the 'screen' command recently and probably couldn't remember the details without a quick refresher. @prouk Enjoy!

LFCS Exam
By:
January 1, 2016

Hello everybody, I would like to know your opinions about linux foundation certification LFCS. Is there any better linux titulation a part from LFCE? thanks If you want a basic understanding of Linux, you can go down the LPI / LFCS or Linux+ path, but if you want a certification that Enterprises respect and will employ you for, you're better off ...

[ANSWERED] Less Command Not Working
By:
January 1, 2016

I'm not sure what I am doing wrong, but I have not been successful in using the less command to show the contents of a log file. I've tried both as a standard user and with elevated permissions. No luck. I am running 14.04.2 in my lab My alternate was to use the MORE command which appears to produce the ...

Laptop Or Pc For Hacking And Pentesting Practice? What Specifics Do I Look For?
By:
January 1, 2016

hi, i'm a beginner i want to set up a lab for practice . Which is better pc or laptop to practice on(both affordable and good) ?? and what specifications should it have such that i have no problem in future??? may I know how to set up a lab for hacking or pentesting......... Penetration Testing LaptopFor your basic penetration laptop requirements, ...

Kill Point For Phase And Review
By:
January 1, 2016

A ‎project‬ has come to an end of the design phase . You decide to call a "phase end review" for obtaining authorization to close the design phase and initiate the next phase (i.e., execution phase) of your project. Your manager disagrees with your suggestion. He wants a "kill point" to formally end the design phase of the project. In ...