0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

The Ultimate Guide to Installing Kali Linux 2.0
By: chiheb chebbi
December 22, 2015

Set Up Your Machine  Kali Linux is the most advanced penetration testing distribution. It comes from the Offensive Security team. It's a Debian-based distribution that comes with a various penetration testing tools (John the Ripper, Namp, Wireshark, Burp Suite etc...). Offensive Security (who are also the funders, founders and developers of backtrack ...

3 Major Concepts of Cryptography
By: HamzaMegahed
December 21, 2015

3 Major Concepts of CryptographyLet's talk in detail about 3 major concepts: Computer Security OSI Security Architecture Cryptography   1. Computer Security A definition of computer security consists of 3 points. We can name this as the CIA security concept (Confidentiality, Integrity and Availability): 1- Confidentiality: assure that confidential information ...

Bytes Omelette: Discovering Hidden Messages
By: andresBello
December 21, 2015

Sometimes, we have to face cases and investigations against people who know how to cover their tracks, and have knowledge on how to avoid forensic discovery. Nowadays, there's lots of people making illicit attacks, using tactics to make things in anti-forensic way. One of those tactics is using low-level encryption programs to change the ...

How Symmetric Encryption Works
By: HamzaMegahed
December 21, 2015

Symmetric Encryption Symmetric encryption or symmetric key or single-key encryption is an encryption system where the encryption and the decryption processes are preformed using the same key.  Symmetric Encryption Model:   1- Plaintext (P):  The original message or data. The plaintext is an input to the encryption algorithm. 2- Encryption Algorithm (E):  This algorithm preforms various ...

E-Mail Crime Investigation- A Case Study
By: Amrit Chhetri
December 18, 2015

E-Mail Crime Investigation- A Case Study Researched and Authorized by:Amrit Chhetri, Principal IT Security Consultant, Certified Computer Forensics Investigator/Consultant, Chief Penetration Tester, Social Media Consultant/Strategist 1. Case Summary: Mr. Raja Chhetri worked as a Team Leader in an international BPO firm. He was a social media freak, smart and well performing entry-level management executive and had good taste ...

METASPLOIT ADVANCED PART III
By: S-Connect
December 18, 2015

Welcome Back Readers! In my past Metasploit articles, we have discussed about Metasploit Framework including; how payload works? Today we will dive into Second Stage (Stage 1) Meterpreter and the process involved in exploitation with staged payloads. We are giving instruction to Metasploit for the two staged payload preparation whenever we use the following; msf> ...

[podcast] Interview with ISC2 board member Wim Remes...
By: BrBr
December 17, 2015

I got a hold of Mr. Wim Remes, because he was elected to the ISC board in November 2015.  Recent changes to the CISSP included changing the long-standing 10 domains down to 8 domains, plus a major revamp to all of them.I wanted to know what Mr. Remes' plans were for the coming term, how the board works, ...

Cybrary's 2016 Cyber Security Job Trends Report [Infographic]
By: ryan c
December 16, 2015

Recently, we surveyed 435 senior-level cyber security professionals on topics surrounding the cyber security job market , and discussed the directions the market may be heading.As we've discussed many times, cyber security's skills gap is massive, incomparable to anything in the world's recent labor market. We packaged the results of the survey into the infographic below.We present data on ...

Password Management Solutions: Are They Really Worth It?
By: rotsap
December 15, 2015

As I clicked reply to a comment recently, relating to the worth or value of using a Password Manager, I saw my own "product" shall we say, go right to work, logging me in to do so...And, it was a good feeling using it...Excellent.So, I'll provide a view on the topic, based on the only password manager I've had ...

Tell us what you think about the new course pages!
By: Tatianna
December 14, 2015

We've realized that it might have been confusing for some people on where to start a class since all of the "good stuff" was buried under hundreds of page scrolls. Well now we've re-arranged the main course pages. The information you wanted is now on top (go figure)! Faster access to the course lessons without all the scrolling. ...