0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Backtrack 5 R3 VS Kali Linux
By:
January 1, 2016

write everybody what is better Backtrack 5 r3 or Kali Linux i think Backtrack 5 r3 old good classic :) cyborg is better :D cyborg is based on ubunto and it has 3x more tools than kali While I do prefer Ubuntu for everday use ( Backtrack) I find the tools in Kali more up to date and usefull Also really like ...

Average Salary For Certification: Offensive Security Certified Professional (OSC
By:
January 1, 2016

https://www.payscale.com/research/US/Certification=Offensive\Security\Certified\Professional\%28OSCP%29/Salary Difficult exam with great rewards! Thanks for sharing. YW! Interesting. Thank You With prep time and cost, hopefully it's a good return on investment for those who pursue it! Good information to know! Something to keep in mind when you read these average salary reports is that they only account for the people who have the cert and a job. It doesn't take into consideration ...

Availability Of PKT Lab Files. Placed Onilne In The Resources Section?
By:
January 1, 2016

Hello Group: In the interest of time and for those who have glasses, can the lab PKT files be placed online somewhere or zipped up and included in the resources section on the CCNA page? Thank you. (I know I can play with the interface and create the model myself. However, some of us do not have an abundance of ...

Assembly Who?
By:
January 1, 2016

Assembly language is the most commonly used when analyzing malware. why is that? because malwares are usually designed in C or C++, and after the code was compiled it is almost impossible to get an access to the source code. what we do have, thanks to brilliant tools like IDA Pro, is an access to the low level assembly language. ...

ARP Spoofing Vs. MAC Spoofing Definition
By:
January 1, 2016

Hi everyone! I wanted to ask if anyone could clarify the difference between ARP and MAC spoofing. I only have a surface level understanding of both these terms and they sound very similar. Correct me if I am wrong, but both cases result in a MAC address that ends up compromised where an attack 'impersonates' a stolen MAC address to ...

[SOLVED] Are HUBs Layer 1 Or Layer 2 Devices
By:
January 1, 2016

I understand that a switch is a layer 2 device, but don't understand why a Hub is stated as layer 2 device in the Networking class console. They are a layer 2 device - they also transmit based on MAC-adresses - like switches. The difference is, that they send out the packets to all connections not just the one with the ...

Apps To Cut-off People's Internet In Your Network!
By:
January 1, 2016

here are some of the apps that can help you manage your work or home network!!!! WiFiKill:cut-off someone's wifi in your network NetCut: Same as above Fing:All network Admin tools LanDroid:Network Admin tools Home WIfi Alert: Admin tools and Netcut I will absolutely check these tools out. Thank you thanks !! :) Haven't looked at these but will check them out... Thnx for ...

APICS Certified In Production And Inventory Management CPIM Questions
By:
January 1, 2016

Are You Want To Pass The APICS CPIM Exam?CertificationsBuzz would love to help you out. At APICS CPIM CPIM Exam, we value your hard-earned cash. APICS CPIM Certification exams could be quite expensive, and we know you don’t want your money to go to waste. Making use of our CPIM exam product will save you time and money. Oh, and ...

Any One Used Fork Bomb On A Network?
By:
January 1, 2016

how to attack on a network with forkbombs? You could go to jail ;) Nope,Mr.KappaG, as I'm doing master's in CyberSecurity Systems and Networks -- I hav to understand abt this fork bomb and I tried on my pc(using VM wares)--I got hw it works practicully than I tried to stop attacking these fork bombs on my PC anyway(bcoz we use to ...

Anonymous Noob Guide
By:
January 1, 2016

Anyone have a copy of the noob guide and the other guides that were posted today by Anonymous. I'm not planning on using it, I just heard about it in the news and am curious as to what it says and how the mind of a hacker works. Unfortunately I believe you need to use IRC and possibly TOR to ...