0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Ethical Hacking with Kali Linux – Part 4: Breaking WPA2 Wireless
By: bjacharya
April 4, 2016

Ethical Hacking with Kali Linux – Part 4: Breaking WPA2 Wireless >> Welcome all, to this series of Kali Linux for Ethical Hacking. This is fourth part and I’ll explain the process of Breaking Wireless WPA2.  #Tools used: airmon-ngairodump-ngaireplay-ngaircrack  #...Let's begin – Before starting, make sure you have  eth0, lo, wlan0 in action. (Go to ...

Procedures for Integrating BeEF and Armitage
By: rubins
April 1, 2016

For me, Armitage is one of the best ways to convince people about the threats in cyber space. Its GUI could be easily understand by ordinary users. It's unlike CLI, through which you'd have a hard time explaining what's happening to the audience, even if you've already had a meterpreter session.In the past, I tried to search the web ...

How Building Trust Can Change Your Life
By: Dr3AMCoDeR
April 1, 2016

 Hi Cybrary people! Thanks for your enormous support. I'm back with another inspiring article, because people were asking me: "What deeper value motivates developers and ethical hackers (more than money)?" Hopefully, this article will expand your views. Keep in mind these are solely my professional opinions and this post is for educational purposes only.  Fundamental Trust We live in a ...

Ethical Hacking with Kali Linux - Part 3: Bypassing the MAC Address Filter
By: bjacharya
April 1, 2016

Ethical Hacking with Kali Linux - Part 3: Bypassing the MAC Address Filter >> Welcome all, to this series of Kali Linux for Ethical Hacking. This is third part and I'll explain process of bypassing the MAC Address Filter on an AP (Access Point).  # 3 Basic Process: - Finding the AP: airmon-ng & airodump-ng - Finding ...

Shodan: The Hacker's Search Engine
By: LawrenceSF
March 29, 2016

What Is Shodan? A  web search engine  is a software system that's designed to search for information on the World Wide Web. As we all know, the information we usually get through search engines (like Google, Yahoo or Bing) is a mix of web pages, images and other types of files. Some search engines also mine data in databases or open directories. I will not ...

Ethical Hacking with Kali Linux - Part 2: Finding Hidden SSIDS
By: bjacharya
March 29, 2016

Ethical Hacking with Kali Linux - Part 2:  Finding Hidden SSIDS >> Welcome all, to this series of Kali Linux for Ethical Hacking. This is second part and we’ll be seeing some of the techniques of uncovering hidden SSIDs.  # Process – Enabling Wireless Monitoring : airmon-ng– Discovering the APs (Access Points) : airodump-ng– Stay calm for Association ...

Steganography: Hide Data in Media Files (Mr. Robot Hack)
By: Z33MAX
March 29, 2016

Hello Cybrarians, If you've seen Mr.Robot TV Show about a guy who works as Cyber Security Engineer by day and a hacker by night, then you likely have seen what we're going to do in this tutorial. In the show, Eliot the hacker hides his data into innocent looking audio files and ...

Analyzing Major Cyber Security Attacks in Turkey
By: Motasem
March 29, 2016

Abstract This report aims to shed light the major cyber security attacks that have hit Turkey’s infrastructure. It's based on analyzing the vulnerabilities that opened the gateway for those attacks and how such an attacks could happen in the future if the appropriate security measures are not be implemented.The objective of this paper is to reach a consistent ...

Breaking the User 'Kill Chain'
By: Yaser vp
March 29, 2016

Today, we'll talk about breaking the user ' Kill Chain .'You've probably heard about the E-bay, Sony and Target breaches. The attackers took advantage of non-trained employees' credentials or used similar ways to break in. It's sad that 75% of attacks occur by using user credentials, which are the main road in for the attackers.  The User 'Kill Chain' Process ...

Ethical Hacking with Kali Linux – Part 1: Objective
By: bjacharya
March 29, 2016

Ethical Hacking with Kali Linux – Part 1: Objective >> Welcome all, to this series of Kali Linux for Ethical Hacking. This is first part and we’ll be seeing some of the intentions of this series.Kali Linux is a special OS for Hacking and Penetration Testing Tools (for “White Hat” use). # It's used for: – Improving system ...