0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Problem With Man-In-The-Middle (dnsspoof And Ettercap) Attack On This Course
By:
January 1, 2016

Hi guys, Its an amazing course thanks to @Georgia. However I having trouble with dnsspoof and ettercap tools. I do everything as Georgia shows but my targets are still able to get to www.gmail.com for example, even though they suppose to see "my site" on apache server on my Kali. I have ip forwarding set to 1(/proc/sys/bla bla bla). I ...

Problem With Dnsspoofing
By:
January 1, 2016

I have a problem with dnsspoof. I used exploit ms10\002\aurora so i can get a sessions when someone with IE clicks on it. I did everything well there and then I wanted to do dnsspoofing so if he goes to google.com, it redirects him to that link that will open a session. I opened two consoles and typed arpspoof -i ...

Prerequisite For Being An Ethical Hacker?
By:
January 1, 2016

Hello Everyone! I have just grew interest in cyber security, mainly in security offensive. I wanted to know that what is the prerequisites to be an ethical hacker? I already know C# and C++ programming languages, Do you understand how networks work? Ports, OSI model etc? Understanding networks is important for hacking. Cybrary do have a Network+ course which I do ...

Prerequisite
By:
January 1, 2016

what are the prerequisites for web application pentesting course in cybrary ?? The only prerequisite is to be keen to learn. However it does help if you have used things like Kali Linux before. There are none. It would help though if you know basic networking(TCP/IP, OSI model, HTTP/HTTPS) and play around with Kali and it's tools. And if you really want ...

POST Card
By:
January 1, 2016

Can the Post card be used to diagnose things in a laptop or is it strictly for towers As far as the BIOS is concerned, it has no idea if it is on a Laptop or a Tower. You can get Post Cards for use with laptops. Often they connect into the miniPCI or miniPCIe slot. In practice this usually means ...

Player.vimeo.com Sent An Invalid Response
By:
January 1, 2016

video is not shows this type of error "player.vimeo.com sent an invalid response." plz help me

Pka File
By:
January 1, 2016

Hi guys is it possible get the file of configuration scheme used it this videos? Hi @Spyx, I'd like to assist you with your question but I'm not quite sure what you are referring to. Can you be a little more specific please? Junaid use one topology in packet tracer.It is possible to download these topology? I'm not sure we have the configuration ...

Penetration Testing For Banking Applications
By:
January 1, 2016

Hi All, As you all know the importance of penetration testing in banking industry. Banking applications are used for financial transactions and to secure their data is more important. Can you guys tell me how can we secure banking applications from hacking. In the world of Cyber security and hacking , A risk Assessment plan abreast with information security program is ...

Reply To: PATH ANALYZER PRO LAB
By:
January 1, 2016

when ever i press TRACE button or ENTER button i receive an error "RAW TARGET" plz tell its solution when ever i press TRACE button or ENTER button i receive an error "RAW TARGET" plz tell its solution

Passed The CRISC Exam!
By:
January 1, 2016

Today I passed the CRISC exam! I found it more difficult than the CISM exam, but easier than the CISSP exam. I just used Cybrary, simplilearn, and the aiotestking.com site - although this time aiotestking.com wasn't as quality controlled as the other times (questions and answers didn't match up to the explanations). 😀 Are you going for it? Congrats! I was thinking on ...