0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Angler Manages to Infect more than One Million Workstations a Year "There is a common misconception that a user explicitly needs to download a malicious file in order to get his PC infected. Exploit kits use a technique called drive-by-downloads. With this technique, malicious software can be ran just by opening a website in your ...


Here's something that I learned from my CISCO class that makes things a lot easier.You're given an IP range of 192.168.0.0 and must create a domain that has five subnets - pockets of devices on the network that are separate from each other so that no one can interfere with another departments data or devices. You know ...


Assets are categorized as information, systems, devices, facilities and personnel. Any entity, whether it's an individual, a group of individuals or a corporation wants to protect these assets from failures, accidents and bad actors by using Identity and Access Management (IAM). In any given IAM situation, there's the concept of subject and object. The subject ...


Hello my great geeks on Cybrary. Before anything else, I'd like to thank all of you for the feedback you guys have given. This keeps me motivated and helps me write better content every day.This article about TOR is the last article in my series on different security technologies like Proxies and VPN's. If you want to check my previous ...


In this guide, I'll walk you through setting up a pentesting USB drive that also works well for other IT professionals.Fortunately, the days of carrying around a CD binder full of your various tools are long gone. With the lower prices of USB drives and their increased capacity, you can easily keep a large number of tools ...


Hello there,This is my first OP3N submission and we'll talk about post exploitation hacking techniques you can use after having a meterpreter shell on a remote system. You'll see things like: Privilege Escalation Maintaining Access Data Harvesting Weak Password Cracking NOTE: Don't take this ...


Hi Cybrarians,Have you ever come across the "Shortcut Virus" on your device while connecting it to a computer? Did you get scared? Of course, it's scary.Follow these steps to remove the virus and use your files again: Go to Start and search for "cmd" Right-click on cmd Click ...


Information Security Governance and Risk Management professionals maintain and enforce policies to ensure the preservation of information security and build plans to account for applicable risks. Watch these videos to learn more! Information Security Governance & Risk Management (part 1) Length: 06:03 Information Security Governance & Risk Management (part 2.1) Length: 10:59 Information Security Governance & Risk Management (part ...
![CISCO ASA Firewall Commands Cheat Sheet [Part 5-B]](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

Welcome to the latest installment of the CISCO ASA Firewall Commands Cheat Sheet. In this part, we'll explain Packet inspection and filtering on 5-7 OSI layer in addition to ICMP inspection. This part depends on the previous part to be easily understood.Let's begin... Configuring ICMP Inspection policy-map globalpolicyclass inspectiondefaultinspect icmpinspect icmp errorexit ...
![[Product Update] Introducing My Notes](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

We're very excited to launch My Notes on Cybrary. My Notes was developed after spending a good deal of time speaking with Users and learning what we could provide to help improve the experience on the site. Researchers found that if important information was contained in notes, it had a 34 percent chance of being remembered. Information not ...