0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

PowerShell Reference Guide
By: Bl4CksPId3r
June 8, 2016

Here's a guide for PowerShell. Hope that you enjoy it! PowerShell is very powerful. If you have any questions about it, just send me a message here on Cybrary. Save

IPv4 + IPv6 NAT64 Information and Setup Guide
By: Bl4CksPId3r
June 8, 2016

Hope that you enjoy this guide on Nat64 and how to set it up! How can you access an IPv4 ONLY Website from an IPv6 ONLY Host? Technically, IPv6 and IPv4 are two different and incompatible protocols. IPv6 ONLY machines can speak IPv6 language and IPv4 ONLY machines know only the IPv4 language.How do they talk to each other? ...

"Done for You" - The Complete List of Kali Linux and Linux Training Videos on Cybrary
By: ginasilvertree
June 8, 2016

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing . It is maintained and funded by Offensive Security Ltd. Mati Aharoni, Devon Kearns and Raphaël Hertzog are the core developers. (f rom Wikipedia ) Exploit Development (part 10) Creating Shell Code in Kali Linux Length: 16:33 ...

Simple Script in Linux "Bash"
By: mrNayaNi
June 8, 2016

Introduction: Bash is the scripting language used in Linux - it stands for Bourne Again Shell.You can perform several tasks with this scripting language. It can make your lives easy using simple words. There are some tasks you have to do every day; you can write a script to do them for you instead of repeating ...

[podcast] Earl Carter dissects the Angler Exploit Kit
By: BrBr
June 7, 2016

[embed]https://youtu.be/WOvzLaQDHEA[/embed]Earl Carter (@kungchiu) spends all day researching exploit kits and using that information to protect customers from various malware payloads that spread ransomware.  This week we sit down with him to understand the#Angler EK.He starts us off with a history or where it came from and how it gained so much popularity, evolving from earlier EKs, like#BlackHole, or WebAttacker. We ...

Standard Network Ports Chart
By: Bl4CksPId3r
June 7, 2016

This is a chart of Standard Network Ports. Hope that you enjoy this chart. Information you might want to know for the Network+ or A+ Exam! Save

IPv4 vs IPv6 Chart
By: Bl4CksPId3r
June 7, 2016

Use and share this chart that compares IPv4 to IPv6 . Thanks and I hope it's useful to you!     Save

What You Should Know About Spear Phishing Attacks
By: Willian
June 7, 2016

In the past few months, we've heard about a range of business email compromises. Spear phishing, the method used in these attacks, represents consistent threats that have companies on high alert.These attacks are growing in number and are getting more sophisticated in nature - targeting individuals and employees in various organizations to gain entry into a corporate network. Traditional ...

3 Reasons Why EVERY OS Fails as an OS
By: Daelphinux
June 7, 2016

3 Reasons Why EVERY OS Fails as an OS I recently read a post regarding Windows’ failings as an operating system and decided to call out some issues with every OS in the same format. I’m only going to focus on the three biggies: Windows, OSX, and Linux .Moreover, I’m going to focus Linux on ...

[Product Update] Introducing the New Course Catalog
By: TREVORH
June 6, 2016

Today, we're introducing the new course catalog on Cybrary. To date, Users have had limited flexibility when it comes to sorting through our course catalog. Taking into account some great User feedback, we've included the ability to filter classes by difficulty, vendor, and added Learning Paths.Learning Paths are designed to provide Users with recommended course paths for careers they may ...