0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


[caption id="attachment_56548" align="aligncenter" width="800"] Smartphones make our lives easier and keep us entertained with a wonderful array of apps.[/caption] Testing Apps Given how much information is on our phones, it's of little surprise to see the rise of malware, spyware and viruses. Even though each of the major vendors verifies uploaded apps, it's pretty easy to sneak in malicious ...


NOTE: The following is the research paper I did for the Cloud Essentials class at school. It's mostly an overview of basic security concepts and attacks. If you need clarification on any point or would like to help clarify any point, please contact me. Cloud Security Threats and Preventions ...
![[podcast] Anti-virus (...what is it good for... absolutely nothing?)](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

Anti-virus products... they have been around for as long as many of us have been alive. The first anti-virus program, "The Reaper" was designed to get rid of the first virus 'The Creeper' by Ray Tomlinson in 1971.This week, we discuss the efficacy of anti-virus. Is it still needed? What should blue teamers be looking for to make their#anti-virus work ...


Hello and welcome to this new series of Student Video Tutorial. This series is basically related Digital Forensics. I'll cover wide range of Digital Forensics together with Computer Hacking Forensic Investigator, CHFI.Video Demo/Lab : CHFI & Digital Forensics [Part 1] – FTK IMAGER or ( https://youtu.be/3z3Iau04gt8 ) Ok now, let’s get started. We'll cover: Digital Forensics: We'll ...


When you think of a centaur, thoughts of a mythical creature that can perform threat analysis doesn't exactly come to mind, does it? Enter Recorded Future's artificial intelligence system - poised to provide both intelligence and strength to uncover hidden threat actors upon our systems. In this way, Recorded Future's use of AI techniques in the security realm ...


Basic Hacking with Firefox (Part 1): Information Gathering Hacking itself consist of different phases. All steps are necessary to perform. The first and most important step is information gathering about a site. During information gathering, information about the HOST and Name servers, IPs, URLs and hidden URLs, HTTP Headers, Cookies, methods and technologies used ...


As every security professional knows, for every 'Happy New Year!' shout, hoot and holler, there's a heck of a lot additional commotion going on surrounding another issue---a new year of new security threats.And while it's no secret that 2016 will bring along a hoard of headline-grabbing security incidents, it's important to know what the experts think will be the ...


Creating initramfs These steps are to be performed in chroot environment during installation of Linux distribution of your choice. Finally, comes the most exciting (and complicated) part – creation of initramfs!Initramfs is a root filesystem that's embedded into the kernel and loaded at an early stage of the boot process. It provides early userspace, which ...
![[podcast] Cryptonite - or how to not have your apps turn to crap](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

This week, we find ourselves understanding the#Cryptonite that can weaken devs and software creators when dealing with #cryptographic #algorithms and #passwords. Lack of proper crypto controls and hardcoded passwords can quickly turn your app into crap.Remember the last time you heard about a hardcoded#SSH private key, or have you been at work when a developer left the #API keys in ...


This article is not for complete newbies, but for juniors who already know a bit about Linux,. They can install a new system themselves and have at least basic knowledge about cryptography in general and methods of encrypting data/block devices in Linux (in particular).We'll speak about: How to do complete full disk (/dev/sda) encryption with dm-crypt ...