0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Do you have an old Smartphone laying around? Turn it into a security camera. Follow these 3 steps: Download IP Webcam from PlayStore onto your device Launch the application and adjust the settings (this depends on what you want). Navigate to the bottom and click Start Server. Next, you'll get ...


I wrote this article to support all our colleagues around the world who are testing or deploying IPv6 on their networks. Recently, my team and I have been working on a lab to deploy IPv6 in our office. We finally succeed on getting an IPv6 network communicating with an IPv4 network and with the internet (it seems easy, ...
![[podcast] "Moxie vs Mechanisms": The Over-Dependence on Tools and Automation](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

This week starts with an apology to Michael Gough about comments I (Bryan) mangled on the "Anti-Virus... What is it good for?" podcast. Then we get into the meat of our topic... a person's "Moxie" vs. a mechanismMoxie: noun"force of character, determination, or nerve." Automation is a great thing. It allows us to do a lot more work with less personnel, ...


Hi Readers,It's quite possible that a sub-domain has a "loop back" address, i.e. 127.0.0.1. Many security researchers and developers may not be aware of this lesser-known vulnerability.Imagine a scenario where a user has to access "subdomain.example.com". If the sub domain is configured with address 127.0.0.1 and, if the user is already running a service on their localhost (Eg. Xamp/Wamp ...


The Complete Alphabetical List of Kali Linux Commands a apropos Search Help manual pages (man -k) apt-get Search for and install software packages (Debian) aptitude Search for and install ...


In Part 1 , we saw how to view and collect different information about websites using HttpFox, User-Agent Switcher, RefControl. In this session, we'll learn how to use this information to exploit and perform a simple hack of a website.The basic aim is to intercept the data to hack the websites using different tools and extensions of the ...


Today, social engineering attacks can happen through electronic means such as email, websites etc. and in person (the old-fashioned way). In-Person Approaches In-person social engineering attacks could include an attacker impersonating co-workers, police, financial authorities, insurance investigators etc. The social engineer might ask the target for important information, like passwords. "The finance manager asked ...


Open System Interconnection (OSI) is a protocol and set of rules for communication.In order to get data over the network - such as an email from your computer to some computer at the other end of the world - lots of different hardware and software needs to work together.All these pieces of hardware and the different software programs speak ...


Recently I've checked out the "Intro to Malware Analysis and Reverse Engineering" course by Sean Pierce. Inspired by his contribution and taking a rest from my current activities, I also decided to share something with you. What I noticed is that Sean references rather outdated tools in his videos. Windows XP? Really? Well, it's a pretty good debugger, I can't ...


Today I'd like to share what I have learned in a in a sticky situation. I was busy with a customer's laptop and it turned off due to a low battery. When I turned it back on after connecting the charger, I discovered the laptop had a password, which I forgot to ask the customer for. So, following ...