0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Part 1: CHFI and DIGITAL FORENSICS – Acquiring Disk Image with FTK IMAGER
By: bjacharya
January 16, 2016

Hello and welcome to this new series of Student Video Tutorial. This series is basically related Digital Forensics. I'll cover wide range of Digital Forensics together with Computer Hacking Forensic Investigator, CHFI.Video Demo/Lab :   CHFI & Digital Forensics [Part 1] – FTK IMAGER   or ( https://youtu.be/3z3Iau04gt8 ) Ok now, let’s get started. We'll cover: Digital Forensics: We'll ...

Building Threat Analyst Centaurs Using Artificial Intelligence
By: klowe
January 14, 2016

When you think of a centaur, thoughts of a mythical creature that can perform threat analysis doesn't exactly come to mind, does it? Enter Recorded Future's artificial intelligence system - poised to provide both intelligence and strength to uncover hidden threat actors upon our systems. In this way, Recorded Future's  use of AI techniques in the security realm ...

Basic Hacking with Firefox (Part 1): Information Gathering
By: Hacker542
January 14, 2016

Basic Hacking with Firefox (Part 1): Information Gathering Hacking itself consist of different phases. All steps are necessary to perform. The first and most important step is information gathering about a site. During information gathering, information about the HOST and Name servers, IPs, URLs and hidden URLs, HTTP Headers, Cookies, methods and technologies used ...

It's 2016...and Recorded Future is Naming the 3 Hottest Security Trends for the New Year
By: klowe
January 13, 2016

 As every security professional knows, for every 'Happy New Year!' shout, hoot and holler, there's a heck of a lot additional commotion going on surrounding another issue---a new year of new security threats.And while it's no secret that 2016 will bring along a hoard of headline-grabbing security incidents, it's important to know what the experts think will be the ...

Part 2: Protecting Your Data in Linux - A Deeper Look at Disk Encryption
By: zhak
January 12, 2016

Creating initramfs These steps are to be performed in chroot environment during installation of Linux distribution of your choice. Finally, comes the most exciting (and complicated) part – creation of initramfs!Initramfs is a root filesystem that's embedded into the kernel and loaded at an early stage of the boot process. It provides early userspace, which ...

[podcast] Cryptonite - or how to not have your apps turn to crap
By: BrBr
January 11, 2016

This week, we find ourselves understanding the#Cryptonite that can weaken devs and software creators when dealing with #cryptographic #algorithms and #passwords. Lack of proper crypto controls and hardcoded passwords can quickly turn your app into crap.Remember the last time you heard about a hardcoded#SSH private key, or have you been at work when a developer left the #API keys in ...

Part 1: Protecting Your Data in Linux - A Deeper Look at Disk Encryption
By: zhak
January 8, 2016

This article is not for complete newbies, but for juniors who already know a bit about Linux,. They can install a new system themselves and have at least basic knowledge about cryptography in general and methods of encrypting data/block devices in Linux (in particular).We'll speak about: How to do complete full disk (/dev/sda) encryption with dm-crypt ...

Python Programming for Hackers (Part 3) – Writing Scripts for Opening Multiple Websites at Once
By: bjacharya
January 8, 2016

(Note: For Video Demo/Lab, on this part, you can follow this link:  https://youtu.be/iAXbbIGG6l0. In the video, I mention Part 5 FYI.)Hello all and welcome to Part 3 of Python Programming For Hackers . Here, I'll show you the script of Python, which can be used to open multiple websites at once. Run one script and open ...

[#podcast]: Jay Schulmann explains how to use BSIMM to enhance your security program
By: BrBr
January 7, 2016

#Jay#Schulman is a consultant with 15+ years of experience in helping organizations implementing #BSIMM and other compliance frameworks.  For our first #podcast of 2016, we invited him on to further discuss BSIMMv6 and how he has found is the best way to implement it into a company's #security #program. Jay Schulman's#website:  https://www.jayschulman.com/ Jay's Podcast "Building a Life and Career in Security" ...

Python Programming for Hackers (Part 2) - All About Variables and Arithmetic Expressions
By: bjacharya
January 6, 2016

Welcome again to Python Programming for Hackers. This is Part 2. In this part, we'll see some information on Python 2 and Python 3. We'll see video links on printing "Hello World," Arithmetic Expressions and Variables in Python. There are two major Python versions, Python 2 and Python 3. Python 2 and 3 are quite different. ...