0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Ethical Hacking with Kali Linux – Part 6: Nmap (Network Mapper)
By: bjacharya
July 1, 2016

Ethical Hacking with Kali Linux – Part 6: Nmap (Network Mapper) > > ‘Nmap’, basically Network Mapper, is a port scanning utility/tool. It helps determine whether ports are open or closed. It also helps find out the operating system running on the host or target machine (along with services of ports).> > We can ...

How to Use Ettercap and SSLstrip for a Man in the Middle Attack
June 30, 2016

What's a Man in the Middle Attack (MITM)? A MITM is a kind of cyber attack where a Hacker/ Penetration tester compromises your network and starts redirecting all the network traffic through his own device (Laptop, Phone, Raspberry Pi, etc.).What's bad in these attacks is that the hacker, between ...

What You Should Know About Target Acquisition for Pentesting
By: V
June 30, 2016

In the pentesting and security scenes, one of the more popular methods of securing servers and websites is by obfuscation and/or mis-information. If you can't find the real IP of a backend server, it's harder to accurately test for vulnerabilities, brute force resistance, bandwidth limits or the impact of a DDoS.This is becoming more and more common with services ...

Got Burgeoning Hacking Skills? Consider a Degree in Cyber Security
By: ginasilvertree
June 29, 2016

Got burgeoning hacking skills? Growing cyber security talents? A compelling mission to join or continue working in the cyber security industry? A cyber security degree is something to seriously consider: Cybercrime continues to grow into more of a global threat – just read the news. Small, medium and large companies desperately ...

How to Hide Your IP Address (Change IP Address)
By: Genius
June 29, 2016

Changing or hiding your IP address is one of the biggest concerns of all hackers. The IP Address can reveal your identity; it's your online address.If anyone can find your actual online address (IP Address), tracing it back to you wouldn't be that difficult. Thus, it's very important to hide or change your IP address before doing any kind ...

[Product Update] New Cybrary Certificate of Completion
June 28, 2016

We love feedback from our Userbase. We have thousands of Users taking Cybrary classes on a daily basis and wanted to ensure that a Cybrary Certificate of Completion is a valuable measure of achievement. It should be something you're proud to show your friends, family and employers.Upon 100% completion of a course on Cybrary, Users will continue to be ...

MITMF-1: Sniffing Passwords Using Man in the Middle Framework
By: Ajay Kulal
June 28, 2016

Hello Friends!!This is my first article for a Man-In-The-Middle Attack series.In this article, we'll see how to sniff passwords using a MITMF framework. I use a framework tool for Man-In-The-Middle attacks and you can read more about it here.   So, let's get started... 1. It's good habit to first read the Man Page or Help Page about ...

Find Juicy Data on Your Targets Using the OSINT Framework
By: Denny Gonzalez
June 28, 2016

Greetings to all, Let's talk about the OSINT Framework. It's quite interesting to search sources on an open information resource. The classification of themes and objectives is vast and offers many ideas on different investigations, based on the OSINT field. Besides knowing the different resources proposed in the OSINT Framework, it's an important tool for a ...

Tradecraft Tuesday - Mastering Cyber Attribution
By: kylehanslovan
June 28, 2016

What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each week in a LIVE video chat . These unrehearsed conversations allow anyone to learn, ask ...

Federal Information Processing Standards (FIPS) 199 – Categorization of Information and Information Systems
By: Eric
June 27, 2016

FIPS 199 – Categorization of Information and Information Systems   Introduction The Federal Information Security Management Act (FISMA) tasked the National Institute of Standards and Technology (NIST) to develop standards and guidelines that all federal agencies must follow. Federal Information Processing Standards Publications (FIPS PUBS) ...