0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

HPING3 Not Working
By:
January 1, 2016

I'm running Kali-Linux 2017.2 on a Windows 10 pro with HyperV with Bridged network over wireless, I can run the ping command to my laptop but when I try and do HPING3 it fails 100% of the time, I can however HPING my gateway (router) and it will return a result. Anyone else have this issue? The fact that it is ...

Hping3 Error
By:
January 1, 2016

whenever i use hping3 i get the following error \[open\_sockraw\] socket(): Operation not permitted \[main\] can't open raw socket please Help me Which distro are you using? Have you tried "sudo hping3"? Had the same error on OSX 10.10.5, hping installed within homebrew, sudo helped.

HOW TO WORK ON CRYBRAY IT
By:
January 1, 2016

PLEASE IF I FINISHED A COURSE AND GOT THE SAT ON CRYBRAY IT HOW CAN I GET EMPLOYED, WILL I BE WORKING FROM HOME AND HOW MUCH IN INVOLVE THANK YOU. I would suggest looking at the jobs section of this site and see what types of classes you would need for which jobs. You can go look at https://www.dice.com and ...

How To Use SETOOLKIT To Attack The Links With Sub-Domain And Folder ???
By:
January 1, 2016

Good evening everyone. I have a concern concernat using SET. On when using SETOOLKIT, I wonder how to use SET to Clone a kind of site where the user login form is on the kind of link https://subdomain.website.com/folder/. So tell me please, in such cases, that is to say, when it takes a clone site with SETOOLKIT, a site with ...

How To Use Burpsuite Pro For Free On Kali Linux
By:
January 1, 2016

hello viewers in this tutorial, i will show you how you can use burpsuite professional for free on your kali linux. download the burp cracked version here: now extract the file next navigate to the file you've extract via terminal cmd: cd Downloads/burpsuite\1.6\pro and run cmd: java -jar BurpLoader.jar and accept the prompt and do not update do you have the ...

How To Use 0day Exploit With Metasploit ???
By:
January 1, 2016

I would use this kind of exploit (https://www.exploit-db.com/exploits/19033/) to attack (in local course) II Microsoft Server 7.5 ??? I do not know if by Metasploit should I use this https://www.exploit-db.com/exploits/19033/ exploit ??? For I do not know exactly how to use it. So please please tell me how to use this type of exploit (https://www.exploit-db.com/exploits/19033/) ??? **In other words, How ...

HOW TO SUCCESSFULLY USE JOOMLA 1.5 < 3.4.5 RCE EXPLOIT ???
By:
January 1, 2016

HELLO. I want to know how to use the following feat: Joomla 1.5 `Traceback (most recent call last): File "joomla\_rce\_CVE-2015-8562.py", line 44, in print get\_url("https://localhost", pl) File "joomla\_rce\_CVE-2015-8562.py", line 14, in get\_url cookies = requests.get(url,headers=headers).cookies File "/usr/lib/python2.7/dist-packages/requests/api.py", line 69, in get return request('get', url, params=params, \\kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 50, in request response = session.request(method=method, url=url, \\kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", ...

How To Succeed A Pentesting Using SSH Keys (RSA And DSA) Of The Target ???
By:
January 1, 2016

Hello. I train to do a pentesting starting first with my scanner vulnerable web application installed locally (localhost). After scanned with NMAP, I notice a scan result that display "ssh-hostkey (DSA) and (RSA)" above: | ssh-hostkey: | 1024 26:87:9b:.........48:7e:83 (DSA) |_ 2048 08:76:66.......95:59:92:d0 (RSA) **1 - ...

How To Succeed A Pentest When All Ports Target System Are Filtered?
By:
January 1, 2016

Hello. I have very serious concerns. In fact, I scanned a site (my website) with NMAP and I get as a result of the analysis that "All Ports are Filtered on Target System". So then do you think it is impossible to penetrate this system because all ports are filtered ???If so, what other technical staff for my successful pentesting ...

How To Spoof Your Caller ID??
By:
January 1, 2016

Anyone Knows How To Spoof Your Caller Id In Android... I Have Been Searched It On Net But All Worst...All Want Money... Is There Any Way To Spoof Your Caller Id Free In Android...???? Please Reply.... if you're trying to convince the person you're calling, you're someone else... it's your network that sends your caller id, not your phone. You can disable ...