0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

HOW TO SUCCESSFULLY USE JOOMLA 1.5 < 3.4.5 RCE EXPLOIT ???
By:
January 1, 2016

HELLO. I want to know how to use the following feat: Joomla 1.5 `Traceback (most recent call last): File "joomla\_rce\_CVE-2015-8562.py", line 44, in print get\_url("https://localhost", pl) File "joomla\_rce\_CVE-2015-8562.py", line 14, in get\_url cookies = requests.get(url,headers=headers).cookies File "/usr/lib/python2.7/dist-packages/requests/api.py", line 69, in get return request('get', url, params=params, \\kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 50, in request response = session.request(method=method, url=url, \\kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", ...

How To Succeed A Pentesting Using SSH Keys (RSA And DSA) Of The Target ???
By:
January 1, 2016

Hello. I train to do a pentesting starting first with my scanner vulnerable web application installed locally (localhost). After scanned with NMAP, I notice a scan result that display "ssh-hostkey (DSA) and (RSA)" above: | ssh-hostkey: | 1024 26:87:9b:.........48:7e:83 (DSA) |_ 2048 08:76:66.......95:59:92:d0 (RSA) **1 - ...

How To Succeed A Pentest When All Ports Target System Are Filtered?
By:
January 1, 2016

Hello. I have very serious concerns. In fact, I scanned a site (my website) with NMAP and I get as a result of the analysis that "All Ports are Filtered on Target System". So then do you think it is impossible to penetrate this system because all ports are filtered ???If so, what other technical staff for my successful pentesting ...

How To Spoof Your Caller ID??
By:
January 1, 2016

Anyone Knows How To Spoof Your Caller Id In Android... I Have Been Searched It On Net But All Worst...All Want Money... Is There Any Way To Spoof Your Caller Id Free In Android...???? Please Reply.... if you're trying to convince the person you're calling, you're someone else... it's your network that sends your caller id, not your phone. You can disable ...

How To Setup Web Server With Static IP
By:
January 1, 2016

Hi, Please help me or guide to create Web server for Small Organization using Static IP. TIA Regards, Hemant That is a lot to learn just on a forum. Please share me the links I can't find them I'd recommend you to install ubuntu server, you can download the .iso from the ubuntu forum. Then install LAMP, there are a bunch of tutorials ...

How To Set Up Pentesterlab
By:
January 1, 2016

Hi, I was going through the part 12 - environment setup of web application pentesting course and I tried to setup the web for pentesters lab from pentesterlab.com. I downloaded it, boot it with virtualbox but in the video the lecturer tells something about configuring the ip but I couldn't do it. As a result of it I couldn't connect ...

How To Restart Or Clean Up XSS And BEEF On The Lab Site?
By:
January 1, 2016

So we've made a mess of comments for testing XSS and BEEF hooks are everywhere? What are the steps to restart the lab to test again?

How To Read SQLite Database File In Windows 10 Manually?
By:
January 1, 2016

I have some SQLite database file of Android, Google Chrome. I would like to access SQLite data on my Windows 10 Platform. Is there any method available to open SQLite database file on Windows 10. There are multiple solutions available to open, view and read SQLite database file in Windows 10, 8, 7. You can use SQLite data browser free utility ...

How To Put Any Android Smartphone Into Monitor ModeWithout Bcmon
By:
January 1, 2016

How To Put Any Android Smartphone Into Monitor Mode Using Custom Script Without bcmon which helps to hack wifi using android smartphone. How To Put Any Android Smartphone Into Monitor Mode

How To Prepare OSCP?
By:
January 1, 2016

Hello folks, Have u guys did the OSCP certification? Please tell me your journey here. I want to prepare before the Kali Linux training (OSCP training). How did u prepare? pls guide me Thanks. When I was getting ready to take the PWK course to get my OSCP I read through the following books: - Metasploit: The Penetration Tester's Guide - ...