Cybrary Pro Day is here!

0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Examining the IoT from a Cyber Security Point of View
By: GodSpeed
October 12, 2015

Before we start, here’s a fun fact: It wasn’t a researcher or an analyst to first use the term ‘Cyberspace,’ it was a science fiction author named William Gibson. It was used in 1982 in a short story; he later elaborated on the term in his novel ‘Neuromancer.’  Ironically, whatever he wrote as a fiction, is anything ...

CyDefe Podcast Episode 18
By: CyDefe
October 8, 2015

Hey hey everyone. We at CyDefe have released another awesome episode of our cyber security podcast. On this week’s episode we discuss fake blue screen of death, ad blocking, a critcal WinRAR vulnerability, and a shortage of cyber professionals.You can check out the episode on iTunes or check it out on our website . Have a listen and enjoy.

Stop ISP Espionage and Transparent Proxies Using DNS Cryptography
By: Krintoxi
October 8, 2015

Stop ISP Espionage and Transparent Proxies Using DNS Cryptography Hello,Today, I'll show you how to properly setup a DNSCrypt to prevent monitoring and logging on your DNS by your default provider. We'll do this by changing our DNS provider to an off-shore or other DNS service that does NOT log our requests, and encrypts DNS queries and responses. Before we explore ...

Programming with Juliar
By: Rattar
October 7, 2015

Have you ever wanted to have a webtool that can help with security?I created a simple language written in JavaScript that can be used to get you started with programming. One of the features of the language is its support for modules. There are two modules that I will go into: l33t.juliar and security.juliar, which are made specifically for ...

The Twisted Security Honey Pot Network
By: klowe
October 6, 2015

Sure, maybe you'd like to think you possess the manpower to monitor your computer networks 24/7, but we all know that's simply impossible.  Thus, threats come as they may, and you might be sleeping when one attempts to overthrow your data system.So what can you do to prevent this from happening? Enter the Honeypot---a security mechanism that detects and deflects threats ...

Java Programmers Competition IPPC: Show Me Your Speed
By: ryan c
October 6, 2015

Cybrary would like to announce a really cool Java programming competition by our friends at NextHacker. Check it out:   Java Programmers Competition IPPC: SHOW ME YOUR SPEED!  We are already convinced that there are many gifted programmers and ingenious hackers.Now we want to know who the fastest and most ...

Q and A: What are DOS and DDOS Attacks?
By: KaalBhairav
October 5, 2015

Q and A: What are DOS and DDOS Attacks?   Q1. What is a DOS attack? Ans: DOS attack is short for Denial of Service attack. An attacker sends a lot of garbage traffic to a server, such that it consumes all the resources on the server, rendering it unusable to the legitimate users. In the ...

Jobs are coming!
By: Tatianna
October 5, 2015

caption id="" align="alignleft" width="275"] Employers Want YOU!  [/captionIf you are searching for a job or looking to change to a career in IT or Cyber Security, our developer has created something special for you. Cybrary’s job platform was created for employers, recruiters – and yes – YOU! To help build ...

Configure a Debian Firewall Gateway
By: scilley
October 5, 2015

I am presenting to you, the Cybrary members, a Firewall/gateway configuration that's used here in my home/HQ for Twisted Security.It's recommended that you learn the basic Linux Command Line operations and know how to use the tools provided to scan and monitor your firewall.  1. Install Latest Debian Distro a. Absolute minimal install b. ...

An Introduction to DNS HiJacking
By: Jafar Hasan
October 2, 2015

Hello Readers... DNS Hijacking (sometimes referred to as DNS Redirection ) is a type of malicious attack that overrides a computer’s TCP/IP settings to point it to a rogue DNS server, invalidating the default DNS settings. When an attacker takes control of a computer to alter its DNS settings, the system has been DNS Hijacked.The “Domain Name ...