0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Nslookup, meaning "name server lookup," is a popular built-in command tool that comes with most versions of the Windows operating system. It's a handy tool you can use to diagnose the DNS infrastructure of the requested domain name.By default, the Nslookup command translates word-based domain names to numerical IP addresses (and vice versa).Other more powerful variants of Nslookup can ...
![[podcast] Carbon Black's Ben Johnson: EDR and threat intel](https://www.cybrary.it/wp-content/uploads/2016/05/avatar.jpg)

[embed]https://www.youtube.com/watch?v=I10R3BeGDs4[/embed]Ben Johnson (@chicagoben on Twitter) has spent a good deal of time working on protecting client's endpoints. From his work at the NSA, to being the co-founder of Carbon Black (@carbonblack_inc). Ben is co-founder and chief security strategist for Carbon Black. In that role, he uses his experience as a cofounder and chief technology officer for Carbon Black, which merged ...


Here's a "done for you" list of Cybrary's Malware Training Videos. Enjoy! Incident responders (or Malware Analysts) perform appropriate malware analysis in order to fix the current infections and prevent future ones. Malware Analysis Introduction (Part 1 )Length: 23:33 Malware Analysis Introduction (Part 2 )Length: 09:48 Malware Analysis Introduction (Part 3 )Length: 08:07 Malware Analysis Lab Setup (Part 1 )Length: ...


Hello Awesome Geeks on Cybrary.it!Today, I'm going to write about VPN's as part of my series on different security services including Proxies , VPN's and TOR.You guys can read my previous article, What They Never Told You About Proxies to know my views on proxies and more.I'll try to write this article in non-geeky vocabulary (again), so that ...


Welcome Cybrarians, Phishing is one of the important things that attackers carefully plan for - compromising one device on the network can help attack the whole connected network. It's also stealthy way of gathering more information about certain users or companies As you know, they are many ways of ...
![CISCO ASA Firewall Commands Cheat Sheet [Part 5-A]](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

This part is divided into two sections: A an B. This part is the most important part, regarding packet inspection and filtering. Section A will explain and list commands used to configure inspection for packets belonging to the OSI 3-4 layer. Defining a Service Policy, Policy Map and Class Map ...


Despite almost daily reports revealing the contrary, 44% of organizations still believe they can keep attackers off their network entirely. - CyberArk's 2015 Global Advanced Threat Landscape Survey


CyberPop tests your knowledge and builds your strength as an Infosec pro. Today’s Question: Define Code Injection Answer: An attack or pentest that introduces malicious code into a software application, which executes the code when the application is opened. Examples include SQL injection , which can compromise or modify information in a ...


Hello Great Geeks on Cybrary.it!Today, I must write an OP3N contribution about a serious problem that makes me a little bit worried about what's going to happen in the future. Everyone here knows that we use services like Proxies, TOR or VPN's to secure our online activities from prying eyes. This year, I did some research about these services ...


Let's begin... TCP .IP Internet Protocol Length: 15:48 TCP/IP Configurations (part 1) Length: 07:30 TCP/IP Configurations (part 2) Length: 11:33 TCP/IP Configurations (part 3) Length: 13:14 TCP/IP Configurations (part 4) Length: 08:03 TCP/IP Configurations (part 5) Length: 07:04 TCP/IP Configurations (part 6) Length: ...