0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


What programming languages should a hacker learn? and to become a C|EH. I've read a lot of hackers learn python, javascript and HTML, javascript and HTML for web attacks and python for scripting I'm personally learning Python first because its a good intro language CEH is a multiple choice test. I do not have the certification, but I think that you do ...


I just finished the Security+ class, but I still need about 15 more credits to renew my Sec+. Which classes would be best to take? I really liked the Cybrary Cryptography course. In fact, I used that course as part of my studies for passing the Security+ exam. The Cryptography course here is about 3 hours long and good for 3 ...


A career in cyber security and ethical hacking requires a structured methodology and just like any career, it will require some blood and sweat and time. According to one report, there is a huge demand of cyber security professionals and it is to be growing in coming years 3.5 times faster than the demand for other technology jobs. These reports ...


Hello. Here are below the result received after scanning the web application: [*] Nmap: 21/tcp ...


Hello, everyone! I am currently working through Georgia Weidman's book Penetration Testing - A Hands-On Introduction to Hacking. I have run into some small issues with the book being a few years old, but have been able to google/forum/puzzle them out thus far. I have hit a wall on this however and could use a hand. I loaded Windows 7 ...


I am stuck with webDAV. I am trying to use webDAV on XP VM. and connecting through cadaver from kali. but receiving this error. Could not access /webdav/ (not WebDAV-enabled?): 405 Method Not Allowed Connection to `192.168.56.101' closed. its enabled from httpd.conf. Remote connection is allowed from XP and local policies. Hmm interesting you can use a few other ways as ...
![Web Server Hacking (Simulation) [help]](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

i have set up a testing environment using VMs. The server is win8 running WAMP server with some sample websites that my friend created. one site is purely informational ie with no user input whatsoever the second site has sql server and user input etc. The Questions:1. Attack Vectors?? ( I did a nmap and nikto scan, all i was ...


Can someone tell me how can i see what answers I got right and wrong on my tests? I cant find that option anywhere. Im baffled because I got 73% TWICE on two different tests, and I am pretty sure I didn't miss any answers on the second one. So if someone can point me to the right place to ...


On Monday June 8, 2015, I took and passed the CISSP exam. Had my endorsement and resume showing many CBK domains worth of experience submitted on Thursday June 18, 2015. At the time, (ISC)2's web site had the wait time listed as up to 5 weeks. The e-mail confirming receipt of my information stated that "due to high volume, wait ...


Hello, can anyone recommend me a VPN or VPN tunnel (i still dont know the difference) for linux system. Please I'm looking for something other than Tor (the VPN will be used along-side tor to channel tor's traffic). Yes I want to go deep underground :P :D Regards. You can start with one of these --> https://www.top10bestvpn.com/ Linux or Windows doesn´t ...