0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How To Set Up Pentesterlab
By:
January 1, 2016

Hi, I was going through the part 12 - environment setup of web application pentesting course and I tried to setup the web for pentesters lab from pentesterlab.com. I downloaded it, boot it with virtualbox but in the video the lecturer tells something about configuring the ip but I couldn't do it. As a result of it I couldn't connect ...

How To Restart Or Clean Up XSS And BEEF On The Lab Site?
By:
January 1, 2016

So we've made a mess of comments for testing XSS and BEEF hooks are everywhere? What are the steps to restart the lab to test again?

How To Read SQLite Database File In Windows 10 Manually?
By:
January 1, 2016

I have some SQLite database file of Android, Google Chrome. I would like to access SQLite data on my Windows 10 Platform. Is there any method available to open SQLite database file on Windows 10. There are multiple solutions available to open, view and read SQLite database file in Windows 10, 8, 7. You can use SQLite data browser free utility ...

How To Put Any Android Smartphone Into Monitor ModeWithout Bcmon
By:
January 1, 2016

How To Put Any Android Smartphone Into Monitor Mode Using Custom Script Without bcmon which helps to hack wifi using android smartphone. How To Put Any Android Smartphone Into Monitor Mode

How To Prepare OSCP?
By:
January 1, 2016

Hello folks, Have u guys did the OSCP certification? Please tell me your journey here. I want to prepare before the Kali Linux training (OSCP training). How did u prepare? pls guide me Thanks. When I was getting ready to take the PWK course to get my OSCP I read through the following books: - Metasploit: The Penetration Tester's Guide - ...

How To Pass Netsuite Foundation Exam
By:
January 1, 2016

https://certmagic.net/Exam/SuiteFoundation NetSuite SuiteFoundation Certification Exam SuiteFoundation Total Questions 137 Last Updated 6/29/2018 Do you want to pass SuiteFoundation exam in first attempt? Buy our NetSuite SuiteFoundation Certification Exam SuiteFoundation dumps and pass your SuiteFoundation Certification certification exam. We are top seller in certification exam industry to provide NETSUITE SuiteFoundation exam questions answers and practice exams. Download and prepare our supplied ...

How To Make Hyperion Exe Work In Kali?
By:
January 1, 2016

Downloaded Hyperion 1.2 from https://nullsecurity.net/tools/binary.html. Anyone know how to make it executable so it can work with wine in order to encrypt payload? (No exe is included in downloaded files like in previous version 1.0) How does MinGW works in Kali to compile? OS: Kali 2.0 Hyperion Version 1.2 Any help would be great. You want to run a PE-Crypter that ...

How To Make A USB Hacking Tool?
By:
January 1, 2016

How to make a USB hacking tool? and use it to hack anyone just by inserting the tool and creating a backdoor with it to steal privacy of it? Dear Hrishikesh follow the link https://www.instructables.com/id/How-to-Make-an-Auto-Hacking-USB-Drive/ @Hrishikesh I think this is what you're looking for: https://www.offensive-security.com/kali-linux/kali-linux-unattended-network-install-pxe/ https://www.offensive-security.com/kali-linux/kali-linux-iso-of-doom/ You can modify the Autorun configuration of the drive or put the files not on a ...

How To Insert A PHP Backdoor In A Web Application That Uploads JPEG Files Only ?
By:
January 1, 2016

Hello. To begin, I would like to say thank you to the entire community of Cybrary including @Motasem helping me enough to integrate into the world of computer security. Now I have one concern: To insert a backdoor into a PHP web application that requires only the JPEG image on his page upload.php, How to insert the backdoor PHP if ...

How To Hack Pc By Mac Id
By:
January 1, 2016

how to hack a pc which is on different network and is there any way to trace and hack pc if mac id is known?? There's lots of ways but each involve a level of knowledge to vulnerabilities of your target. If this is for malicious purposes though you won't get any help. You could reverse the IP from the MAC ...