0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Program Language On Kali Linux
By:
January 1, 2016

what is the program language that i need to learn so as to be able to work on kali linux ? Ah well lets see... Bash command line - This is a must. Hard to point and clicky your way hacker leetness C - Most everything in the operating system is written in it lua - if you want to write/modify ...

ProctorU
By:
January 1, 2016

Anybody take an exam with ProctorU before? I have my CEH exam on Friday and i'm just wondering about the procedure. I did my CEH through ProctorU. It's pretty straightforward; just make sure your camera works etc before hand. I didn't have access to a 360 degree cam so I just picked the laptop up and showed the proctor the room. ...

Problem With Man-In-The-Middle (dnsspoof And Ettercap) Attack On This Course
By:
January 1, 2016

Hi guys, Its an amazing course thanks to @Georgia. However I having trouble with dnsspoof and ettercap tools. I do everything as Georgia shows but my targets are still able to get to www.gmail.com for example, even though they suppose to see "my site" on apache server on my Kali. I have ip forwarding set to 1(/proc/sys/bla bla bla). I ...

Problem With Dnsspoofing
By:
January 1, 2016

I have a problem with dnsspoof. I used exploit ms10\002\aurora so i can get a sessions when someone with IE clicks on it. I did everything well there and then I wanted to do dnsspoofing so if he goes to google.com, it redirects him to that link that will open a session. I opened two consoles and typed arpspoof -i ...

Prerequisite For Being An Ethical Hacker?
By:
January 1, 2016

Hello Everyone! I have just grew interest in cyber security, mainly in security offensive. I wanted to know that what is the prerequisites to be an ethical hacker? I already know C# and C++ programming languages, Do you understand how networks work? Ports, OSI model etc? Understanding networks is important for hacking. Cybrary do have a Network+ course which I do ...

Prerequisite
By:
January 1, 2016

what are the prerequisites for web application pentesting course in cybrary ?? The only prerequisite is to be keen to learn. However it does help if you have used things like Kali Linux before. There are none. It would help though if you know basic networking(TCP/IP, OSI model, HTTP/HTTPS) and play around with Kali and it's tools. And if you really want ...

POST Card
By:
January 1, 2016

Can the Post card be used to diagnose things in a laptop or is it strictly for towers As far as the BIOS is concerned, it has no idea if it is on a Laptop or a Tower. You can get Post Cards for use with laptops. Often they connect into the miniPCI or miniPCIe slot. In practice this usually means ...

Player.vimeo.com Sent An Invalid Response
By:
January 1, 2016

video is not shows this type of error "player.vimeo.com sent an invalid response." plz help me

Pka File
By:
January 1, 2016

Hi guys is it possible get the file of configuration scheme used it this videos? Hi @Spyx, I'd like to assist you with your question but I'm not quite sure what you are referring to. Can you be a little more specific please? Junaid use one topology in packet tracer.It is possible to download these topology? I'm not sure we have the configuration ...

Penetration Testing For Banking Applications
By:
January 1, 2016

Hi All, As you all know the importance of penetration testing in banking industry. Banking applications are used for financial transactions and to secure their data is more important. Can you guys tell me how can we secure banking applications from hacking. In the world of Cyber security and hacking , A risk Assessment plan abreast with information security program is ...