0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

February is #SecureCodingMonth at Cybrary!
By: ryan c
February 1, 2016

The team at Cybrary has officially named February:#SecureCodingMonthGiven that secure coding principles are often so overlooked in most CS programs and coding classes, we feel the obligation to fill the coding security void. There are many courses on Cybrary which coders / programmers can benefit from already, such as the Advanced Penetration Testing and the CompTIA CASP ...

Protecting Your Data in Linux: A Deeper Look at Disk Encryption (Part 4/4)
By: zhak
January 26, 2016

In the previous three parts ( one , two , and three ) of the article we discussed hard drive encryption with LUKS. Today we will speak about plain mode encryption. This mode is considered advanced and a little bit more complicated. But you'll see that this is actually not true, and, what is more, has its ...

[podcast] Infosec Author Bill Gardner
By: BrBr
January 24, 2016

BrakeSec Podcast welcomes Bill Gardner this week!#Author, #InfoSec Convention Speaker, and fellow podcaster...We break a bit from our usual rigid methods, and have a good ol' jam session with Bill this week. We talk about#vulnerability #management, #google #dorking, #career management, the troubles of putting together a #podcast and more! Bill's Twitter: https://www.twitter.com/oncee Bill's books he's authored or co-authored:  https://www.amazon.com/Bill-Gardner/e/B00MZ9P0IG/ref=srnttsrchlnk2?qid=1453607145&sr=1-2 (non-sponsored ...

Part 3: Protecting Your Data in Linux - A Deeper Look at Disk Encryption
By: zhak
January 20, 2016

We've already prepared UEFI bootable USB stick and root partition for DM_CRYPT + LUKS encryption, as well as installed Linux distribution of choice in Part 1 . We've also prepared initramfs sources for embedding into kernel in Part 2 . Now, it's time to configure kernel itself. There are a lot of good tutorials about kernel configuration ...

Infosec Professional's Guide to Managing Smartphone Apps
By: RoninSmurf
January 20, 2016

[caption id="attachment_56548" align="aligncenter" width="800"] Smartphones make our lives easier and keep us entertained with a wonderful array of apps.[/caption]  Testing Apps Given how much information is on our phones, it's of little surprise to see the rise of malware, spyware and viruses. Even though each of the major vendors verifies uploaded apps, it's pretty easy to sneak in malicious ...

9 Cloud Security Threats You Should Know
By: bluemonk12
January 20, 2016

NOTE: The following is the research paper I did for the Cloud Essentials class at school.  It's mostly an overview of basic security concepts and attacks.  If you need clarification on any point or would like to help clarify any point, please contact me.    Cloud Security Threats and Preventions   ...

[podcast] Anti-virus (...what is it good for... absolutely nothing?)
By: BrBr
January 17, 2016

Anti-virus products... they have been around for as long as many of us have been alive. The first anti-virus program, "The Reaper" was designed to get rid of the first virus 'The Creeper' by Ray Tomlinson in 1971.This week, we discuss the efficacy of anti-virus. Is it still needed? What should blue teamers be looking for to make their#anti-virus work ...

Part 1: CHFI and DIGITAL FORENSICS – Acquiring Disk Image with FTK IMAGER
By: bjacharya
January 16, 2016

Hello and welcome to this new series of Student Video Tutorial. This series is basically related Digital Forensics. I'll cover wide range of Digital Forensics together with Computer Hacking Forensic Investigator, CHFI.Video Demo/Lab :   CHFI & Digital Forensics [Part 1] – FTK IMAGER   or ( https://youtu.be/3z3Iau04gt8 ) Ok now, let’s get started. We'll cover: Digital Forensics: We'll ...

Building Threat Analyst Centaurs Using Artificial Intelligence
By: klowe
January 14, 2016

When you think of a centaur, thoughts of a mythical creature that can perform threat analysis doesn't exactly come to mind, does it? Enter Recorded Future's artificial intelligence system - poised to provide both intelligence and strength to uncover hidden threat actors upon our systems. In this way, Recorded Future's  use of AI techniques in the security realm ...

Basic Hacking with Firefox (Part 1): Information Gathering
By: Hacker542
January 14, 2016

Basic Hacking with Firefox (Part 1): Information Gathering Hacking itself consist of different phases. All steps are necessary to perform. The first and most important step is information gathering about a site. During information gathering, information about the HOST and Name servers, IPs, URLs and hidden URLs, HTTP Headers, Cookies, methods and technologies used ...