0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

BEST IDE FOR PYTHON
By:
January 1, 2016

please tell me that which is the best IDE for python to get started with? I like PyCharm by JetBrains a lot) it has a free community edition, and a pro edition trial. https://www.jetbrains.com/pycharm/ I always use VIM, which isn't really and IDE but a really great text editor. It has a bit of a learning curve though. I second VIM, and pythons ...

Best Courses For Security+ CEUs?
By:
January 1, 2016

Hello, Relatively new to Cybrary and I'm trying to gain some CEUs to renew my Security+ certification. What are some of the most relevant courses that you would recommend to start out with that would help meaningfully improve my cybersecurity knowledge and skills while also earning some CEUs? Thanks! Hi, This is CompTIA's listing of approved courses for earning CEUs for ...

BeEF With Meterpreter
By:
January 1, 2016

Hi, I want to know if i can get a meterpreter session with BeEF yeppers! https://blog.beefproject.com/2012/06/beef-in-real-world-pen-test-part-3-hot.html "Finally, to expand our exploitation, the Metasploit integration makes perfect sense. BeEF allows almost full Metasploit integration where you can see Metasploit modules inside BeEF’s module branches under “metasploit/\*”. Now we can run a multi-handler and execute any of the the juicy metasploit modules suitable ...

[SOLVED] Because Of It's Privacy Settings, This Video Cannot Be Viewed Here.
By:
January 1, 2016

Hi there, I've been trying to access videos on this site, however I keep getting this error and I can't seem to figure out why. I'm using Comodo Dragon as my browser with high security settings, but I've tried it at minimal settings and on IE and still no luck. Any advice? Thanks Hi @dannylad, The 'privacy settings' error typically occurs ...

Bash: Netdiscover: Command Not Found
By:
January 1, 2016

Hi All, I am hoping that someone can point me in the right direction. For some reason netdiscover is not working on my VM the error that I am getting is bash: netdiscover: command not found. I've done an: sudo apt-get install netdiscover and it appears to have worked. But just no luck getting things to kick. Thanks, Hi @mkuhn, Try ...

Backtrack 5 R3 VS Kali Linux
By:
January 1, 2016

write everybody what is better Backtrack 5 r3 or Kali Linux i think Backtrack 5 r3 old good classic :) cyborg is better :D cyborg is based on ubunto and it has 3x more tools than kali While I do prefer Ubuntu for everday use ( Backtrack) I find the tools in Kali more up to date and usefull Also really like ...

Average Salary For Certification: Offensive Security Certified Professional (OSC
By:
January 1, 2016

https://www.payscale.com/research/US/Certification=Offensive\Security\Certified\Professional\%28OSCP%29/Salary Difficult exam with great rewards! Thanks for sharing. YW! Interesting. Thank You With prep time and cost, hopefully it's a good return on investment for those who pursue it! Good information to know! Something to keep in mind when you read these average salary reports is that they only account for the people who have the cert and a job. It doesn't take into consideration ...

Availability Of PKT Lab Files. Placed Onilne In The Resources Section?
By:
January 1, 2016

Hello Group: In the interest of time and for those who have glasses, can the lab PKT files be placed online somewhere or zipped up and included in the resources section on the CCNA page? Thank you. (I know I can play with the interface and create the model myself. However, some of us do not have an abundance of ...

Assembly Who?
By:
January 1, 2016

Assembly language is the most commonly used when analyzing malware. why is that? because malwares are usually designed in C or C++, and after the code was compiled it is almost impossible to get an access to the source code. what we do have, thanks to brilliant tools like IDA Pro, is an access to the low level assembly language. ...

ARP Spoofing Vs. MAC Spoofing Definition
By:
January 1, 2016

Hi everyone! I wanted to ask if anyone could clarify the difference between ARP and MAC spoofing. I only have a surface level understanding of both these terms and they sound very similar. Correct me if I am wrong, but both cases result in a MAC address that ends up compromised where an attack 'impersonates' a stolen MAC address to ...