0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Hacking Hobby Or Skill?
By:
January 1, 2016

I am not in an IT career, I work from home doing medical coding. What lead me here was the show Mr. Robot, and reading the Kevin Mitnick books. I was looking around, found Cybrary, found this course, and also found social engineering. I also found the compTIA+, which I added to my courses. But I'm learning alot. I'll never ...

[H12-211 English Version] HCNA H12-211 Study Material
By:
January 1, 2016

If you want to buy Huawei H12-211-ENU exam information, Passcert will provide the best service and the best quality products. Our HCNA-HNTD certification H12-211 study material have been authorized by the manufacturers and third-party. And has a large number of IT industry professionals and technology experts, based on customer demand, according to the the outline developed a range of products ...

Group Chat (example : Whatsapp)
By:
January 1, 2016

Did you have a group like a whatsapp or other application? I think everybody always hold their handphone than their PC. Just for suggest :) If you are interested, I'm Willing to be an admin group:) Cheers! Poppy Calvina Indonesia Interested Yup me too That is true. If it's possible, I would be interested. Thanks if you are interested, you can contact me through ...

Got Latest Reviews Of Killtest SY0-501 Questions
By:
January 1, 2016

Today, we Killtest got the latest reviews of Killtest SY0-501 questions. One of our customers has passed his SY0-501 exam with new version, which updated on May 15, 2018. So, here I would like to share some demo questions for practicing: A high-security defense installation recently began utilizing large guard dogs that bark very loudly and excitedly at the slightest ...

GetAcct
By:
January 1, 2016

So I watched the video using GetAcct to grab all major info of a target and I noticed that it's an old program for Xp, NT, Server 2003 machines. My question is, are all of these machines vulnerable to this program? GetAcct is now protected against post Windows 2000. It retrieved usernames by sidestepping the "RestrictAnonymous=1" functionality in NT/2000. I think ...

Get Printed Certificate
By:
January 1, 2016

is there any possibility that cybrary send us the printed certificate? Hi mradil, you can download and print the certificate into any paper type you want only if you need to print it. Remember we need to keep the green around us. Print only when it is necessary. Ciao! No, Cybrary itself does not send certificates directly to you. Instead, you're allowed ...

Get IP For A Website URL
By:
January 1, 2016

Most of the examples on Cybrary include targeting a specific IP address. I know that to get an IP from a URL we use >nslookup command. So, typing the IP in the browser should redirect to the same web page. But this is not the case with me. Any ideas what I might be doing wrong? NOTE: The following IPs ...

Get A Job Without Certificates?
By:
January 1, 2016

Given that certificates such as CompTIA, CCNA, MCSA, CEH etc. are only valid for 3 years, and have to be paid for each and every time, I was wondering if one can get a job without them. Are they really necessary? I've heard that some employers test you on the spot if you do not have them. Also, would it ...

Georgia Weidman, Install SLMail 5.5
By:
January 1, 2016

Hi , my English knowledge is very poor.... so my question.. I will install SLMail 5.5 in my windows xp 64 bit ,the problem is that Microsoft Windows XP 64 Bit , have only service pack 2 , and because this problem , i can't install voll SLMail 5.5 , i can install it , but when come this step ...

Georgia Weidman Chapter 8 - Php/meterpreter/reverse_tcp With Kali 2016
By:
January 1, 2016

I was wondering how many of you have tried to run the exploit php/meterpreter/reverse\_tcp lately with the new Kali 2016 rolling. First off, to problem solve I did make sure the machine was completely dist-upgrade/update/upgrade and restarted the machine. In the chapter of Weidman's book we are trying to take advantage of the Windows XP vm which is vulnerable to ...