0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Ethical Hacking with Kali Linux – Part 6: Nmap (Network Mapper) > > ‘Nmap’, basically Network Mapper, is a port scanning utility/tool. It helps determine whether ports are open or closed. It also helps find out the operating system running on the host or target machine (along with services of ports).> > We can ...


What's a Man in the Middle Attack (MITM)? A MITM is a kind of cyber attack where a Hacker/ Penetration tester compromises your network and starts redirecting all the network traffic through his own device (Laptop, Phone, Raspberry Pi, etc.).What's bad in these attacks is that the hacker, between ...


In the pentesting and security scenes, one of the more popular methods of securing servers and websites is by obfuscation and/or mis-information. If you can't find the real IP of a backend server, it's harder to accurately test for vulnerabilities, brute force resistance, bandwidth limits or the impact of a DDoS.This is becoming more and more common with services ...


Got burgeoning hacking skills? Growing cyber security talents? A compelling mission to join or continue working in the cyber security industry? A cyber security degree is something to seriously consider: Cybercrime continues to grow into more of a global threat – just read the news. Small, medium and large companies desperately ...


Changing or hiding your IP address is one of the biggest concerns of all hackers. The IP Address can reveal your identity; it's your online address.If anyone can find your actual online address (IP Address), tracing it back to you wouldn't be that difficult. Thus, it's very important to hide or change your IP address before doing any kind ...
![[Product Update] New Cybrary Certificate of Completion](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

We love feedback from our Userbase. We have thousands of Users taking Cybrary classes on a daily basis and wanted to ensure that a Cybrary Certificate of Completion is a valuable measure of achievement. It should be something you're proud to show your friends, family and employers.Upon 100% completion of a course on Cybrary, Users will continue to be ...


Hello Friends!!This is my first article for a Man-In-The-Middle Attack series.In this article, we'll see how to sniff passwords using a MITMF framework. I use a framework tool for Man-In-The-Middle attacks and you can read more about it here. So, let's get started... 1. It's good habit to first read the Man Page or Help Page about ...


Greetings to all, Let's talk about the OSINT Framework. It's quite interesting to search sources on an open information resource. The classification of themes and objectives is vast and offers many ideas on different investigations, based on the OSINT field. Besides knowing the different resources proposed in the OSINT Framework, it's an important tool for a ...


What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each week in a LIVE video chat . These unrehearsed conversations allow anyone to learn, ask ...


FIPS 199 – Categorization of Information and Information Systems Introduction The Federal Information Security Management Act (FISMA) tasked the National Institute of Standards and Technology (NIST) to develop standards and guidelines that all federal agencies must follow. Federal Information Processing Standards Publications (FIPS PUBS) ...