0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Why is “C” the Default Drive on Your Computer (Instead of A or B)?
By: doctorX
July 26, 2016

Have you ever wondered why the names of hard drives start from “C”? Where have the A and B drives gone? Here's the answer: Hard disk drives have been standard since 1980 Before hard disk drives, Floppy disk drives were used as data storage devices ...

Free Firewalls for Small and Medium Networks
By: ADIL BOUZIANI
July 26, 2016

Today, I'll share personal experience about the most important free firewalls that can be used in small and medium-sized networks. Most of these firewalls work in the Linux environment, including FreeBSD, or OpenBSD, which work with different techniques such as (Packet Filter), (IPFilter), (IPFirewall), and iptables.We'll talk about the firewalls that are fast and good for small networks working ...

Learn to be a Hacker with Cybrary
By: KnightsCode
July 25, 2016

Where do you start with this? At the moment, you may have far too many people sharing their own ideas about being a hacker. I'm not here to sugar coat it for you. I'm not going to tell you that you need to be "creative," "adaptive," or "persistant". If you're choosing to be an ethical hacker, then you should ...

Part 2: XSS Code Analysis and Exploitation
By: Chilico
July 24, 2016

Hello Cybrarians, once again,In this article, we continue our code analysis and exploitation of XSS from Part 1 . If you haven't already read it, please do .  Let's begin... Example 6: As we see, our code is now completely different for the previous examples. In this one, our code running inside JavaScript so in ...

Sunday's Cyber Security Fact - Collaboration is Key (July 24, 2016)
By: ginasilvertree
July 24, 2016

According to a 2016 survey by PwC: 65% of businesses surveyed are "embracing a more collaborative approach to cybersecurity, one in which intelligence on threats and response techniques is shared with external partners. Internally, organizations are rethinking the roles of key executives and the Board of Directors to help create more resilient and proactive security ...

The Integrated Guide to Network Security 1.5
By: ram
July 22, 2016

Network Security 1.5 Given a scenario, troubleshoot security issues related to wireless networking... As you read about each of these methods and protocols, realize that there are security implications and weaknesses to each, and diligence and vigilance are your two most powerful attributes. Anyone with the right gear can see all of the ...

Report: Healthcare Under Attack – Cybercriminals Target Medical Institutions
By: ginasilvertree
July 22, 2016

InfoArmor has identified a group of bad actors performing targeted cyberattacks on healthcare institutions and their IT infrastructure, including connected medical devices such as Magnetic Resonance Imaging systems (MRI), X-ray machines and mobile computing healthcare workstations.This group of bad actors has performed at least four successful attacks against US-based organizations of varying size, compromising a significant number ...

Hacking and Hackers: "See What Others See and What They Hardly See"
By: abmmhasan
July 22, 2016

Introduction A good question that’s asked all around these days is, "What is hacking?" In my opinion, hacking is finding brilliant solutions to interesting problems. Well, that shows how broad the term “hacking” is. Real life hacking is trying all the ways possible to exploit your targets' weak links and/or to get him/her motivated. It's ...

Part 1: Bypass a Web Application Firewall (WAF)
By: S-Connect
July 22, 2016

Methods to Reduce the Threats Directive Approach Software Development Life Cycle (SDLC); «paper security»; organization of high-level processes Detective Approach Black/white-box testing of functions; fuzzing; static/dynamic/manual analysis of program code Preventive Approach Intrusion Detection/Prevention Systems (IDS/IPS), Web Application Firewall (WAF) ...

"Done for You" - Complete List of DNS Training Videos
By: ginasilvertree
July 21, 2016

Here's a complete list of DNS Training Videos on Cybrary (in alphabetical order by first letter). Explore additional classes and modules here ... Configuring DNS Zone Transfers Length: 12:12 Configuring DNS Zones Length: 21:27 DNS Enumeration Lab Length: 03:58 DNS Overview and Zone Transfers Length: 18:44 DNS ...