0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Greetings: Nice to e-meet you all. I have a question regarding a new regulation that is addressed to financial institutions. Basically, this regulation establishes that all network devices in a corporate network, such as routers, switches, firewall, etc.. must have the capability to login into the admin console with a two-factor authentication technology. I know this sounds kind of weird ...
![[Tutorial] How To Set-up Pentesting Lab - Part 1](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

So, if you are new to Hacking and Pentesting and you want to practice your skills, you might have one or most of these issues : 1. Finding a target that is live and safe to penetrate. 2. Even when found, testing these targets is unethical and could put them in jail. 3. Thinking setting up a vulnerable lab is ...
![[Tutorial] How To EXPLOIT HEARTBLEED (0day Vulnerable)](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

Hello ..today am gonna show you that how to exploit hearbleed vulnerability on web server 1) Kali linux 1.5 or above 2)setup apache2 server 3)using python script(for exploitation) step 1 : download the exploitation script from here https://gist.github.com/sh1n0b1/10100394 step 2: copy it to the leafpad and save it with .py eg : hb.py step 3: start apache server ( You ...


root@Kali:~# apt-get update Hit:1 https://ftp.ne.jp/Linux/packages/kali/kali kali-rolling InRelease Traceback (most recent call last): File "/usr/bin/debtags", line 694, in main() File "/usr/bin/debtags", line 688, in main sys.exit(action.main(args)) File "/usr/bin/debtags", line 632, in main for pkg, tags in self.tags\from\apt(): File "/usr/bin/debtags", line 256, in tags\from\apt cache = self.apt\cache File "/usr/bin/debtags", line 241, in apt\cache res = self.\apt\cache = apt.Cache() File "/usr/lib/python3/dist-packages/apt/cache.py", line 113, ...


Hey everyone, Just a potential helpful mnemonic device if anyone is having trouble remembering the CompTIA A+ order of operations for troubleshooting (Link to the lesson here - Troubleshooting Theory). I Emailed The President Via Desktop Identify problem Establish a theory of probable cause Test theory Plan of action Verify full functionality/preventative maintenance Document findings, actions, and outcomes Hope this ...


Hi community, I was wondering what ages people started their IT careers? According to what I read about the instructors here on Cybrary and from coursebooks I purchase most people seem to start early within IT ( 20-26). I am definately not within that age bracket through I am under 40. I did meet a guy who got into IT ...


Where to fine tini.exe https://lmgtfy.com/?q=download+tini.exe -- xMidnightSnowx thanks :) I have tried downloading it from ntsecurity but it gives error that "File not found in server". http://ntsecurity.nu/toolbox/tini/ Now also it's showing not found error only... I told you.... Try this, its the same thing different name. http://seclists.org/pen-test/2001/Mar/184 it is not a good link, an other idee to download tini None of the links work I'm trying to make it ...


Hello, what does TIA acronym mean??? CompTIA is short for Computing Technology Industry Association, https://en.wikipedia.org/wiki/CompTIA Thanks! I am real rookie here :-)


Hey guys, Regarding the course Intro to Malware Analysis n RE, I want to download the malware samples from https://github.com/ytisf/theZoo to my Kali VM, but not sure if these is still "safe" or even in Kali there is some risk with all those samples. Does anyone knows? Regards! While you can download the malware samples from theZoo for study, you must ...


There's any free tutorials availabale for learning about SIEM solutions ? Good question -- I've been gathering resources on all areas of IT security and that is the only area where I haven't been able to find anything substantial yet. SIEM solutions are very proprietary in nature and they want you to go through the entire sales pitch in order to get ...