0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Tutorial: Setting Up a Virtual Web Server for Safe Penetration Testing at Home
By: KaalBhairav
October 1, 2015

Hi Cybrarians!!!I hope you are doing well and studying hard. While pursuing the Penetration Testing course, we often feel the need for our own Web servers, where we can test our skill-sets without worrying about permissions and the law.To this end, I started to gather some information and found out that we can create our own virtual web servers and ...

What is Doxing?
By: Jafar Hasan
September 28, 2015

I'd like to clarify what Doxing is. Doxing is the procedure of picking up data about somebody or something by utilizing sources on the Internet and utilizing essential reasoning abilities. Its name comes from "Documents" - in short it's the recovery of "Documents" on a person or organization.You may be thinking: "So, it's essentially getting data from looking up ...

Using Steganography and Cryptography to Bypass Censorship in Third World Countries
By: Krintoxi
September 25, 2015

Hello - Today I'll be providing a set-by-step guide to Steganography and its crypto. We'll look at its uses in third world countries and oppressive regimes that have complete control over the Net, including Cuba, Venezuela, North Korea, China, Syria etc. Oppressive systems are known to shut down secure ways of communicating, especially for activists and those who ...

Prevent Communications Spying with O.T.R. Encryption and TOR in XMPP
By: Krintoxi
September 23, 2015

With the growing concern of online privacy, this is by far the best way I've found to keep your communications private using a combination of O.T.R., TOR, Linux and a trustworthy VPN service. Note - This guide can be used by the following communities of people and others: Activists: ...

Testing Your Linux Firewall Configuration
By: Falko
September 23, 2015

At Cybrary.it, it's all about security and penetrating. I've decided to write this little guide for testing your own firewall configuration. We're going to use Firewall Tester (FTester) tool. Important: this tool is now outdated. However, I find it still useful and nice to use for beginners. The Firewall Tester ...

Take the Right Roads Toward Your Infosec Career
By: Rafik
September 21, 2015

It's hard to administer systems nowadays without security. Managing and administering systems almost always includes a security component, if not an outright security focus. Are you interested in moving from a systems administration position into a more security-focused role? And, do you want to design your career in information systems? As an example, consider that ...

Internet Protocols: Versions 4 and 6 Analysis and Comparison of IPv4 and IPv6
By: Wushi09
September 21, 2015

Internet Protocols: Versions 4 and 6 Analysis and Comparison of IPv4 and IPv6   Usman Jibril Department of Management Information Systems Cyprus International University Lefkosa, North Cyprus. wushi09@outlook.com Akintoye Oluwasegun Ogundiya Department of Management Information Systems Cyprus International University Lefkosa, North Cyprus. ...

Hacking a WiFi Network with MAC Filtering Enabled
By: Rana Daniyal Khan
September 21, 2015

Don't try this on networks on which you lack permission for penetration testing.   Intro: MAC: "MAC is a 42 bit address used to uniquely identify a device. " "MAC filtering is a way in which the network administrator allows only specific mac address to connect to the router." ...

Anatomy of Error-Based SQL Injection
By: nullvyte
September 21, 2015

What is SQL Injection? SQL injection is a subset of the "code injection" attack method. SQL stands for Structured Query Language and is used by databases to store and retrieve information. Many websites require this capability web developers use a server-side scripting language - often PHP or ASP - to pass user input to a ...

Tutorial: Setting up a Virtual Pentesting Lab at Home
By: KaalBhairav
September 21, 2015

Hi Pentesters, while pursuing the course on Ethical Hacking and Penetration Testing , we often feel the need to have our own pentesting lab to practice all the stuff we're learning during the course. I am no exception, so I began searching for a way I could do this. After gathering some info, I found a way and wanted ...