0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


How do i refer my friend from here? Hello On Cybrary's Home Page, there is a big button that says "Invite a Friend" under where it lists your login streak and your current amount of cybytes. Then just follow the instructions :) https://www.cybrary.it/invite/


Hi everyone, I'm sorry to be asking about this but the email support hasn't responded in days. Also sorry for the fact that this is a totally noob question. I recently spent $287 to purchase the voucher to take the CompTIA+ test (I do have the code). However, I see nowhere the instructions on how to redeem said voucher. Can ...


Here is a puzzle! In 1999, a new algorithm was supposed to be released "Sloot Digital Coding System" which was never released. Let's try to re-create it! What can it potentially do? It can take an 8GB movie and compress it to only several hundreds of kb. What do we actually know? An average DVD movie is 4GB. With a ...


Hello I'm watching the Information Gathering videotutorials and I have a problem with recon-ng. When I run a module from pwnedlist, the program shows the following error message: "FrameworkException: API key 'pwnedlist\api' not found. Add API keys with the 'keys add' command. I have found the next solution in the recon-ng wiki: "PwnedList API Key (pwnedlist\api) - Contact PwnedList directly ...


I have been looking around and I see there are many vulnerable web applications such as UltmateLAMP, DVWA, WebGoat, etc. However with so many to try there is no time to test them all. So my question is for those who are more experienced, which vulnerable web application would you recommend to quickly get a person from a novice to ...


Hello. I was just trying to test Path Analyzer Pro on Win 10 but I keep getting the raw socket error meggage. I disabled the firewall but that didnt help either. Does anyone know how I can bypass this error? Thanks a lot. pimonit Hello. I was just trying to test Path Analyzer Pro on Win 10 but I keep getting ...


Hey guys, hope you're all staying busy. I know I am. After the OSCP continuing with eLearnSecurity Practical Network Defense and Web Application Pentesting, Cybrary, Udemy and a lot more other stuff. During my studies a question came up about staying anonymous on the Internet. So I know that an IP address has to be given to the client/customer, which ...


When you calculate risk by using the SLE and ALE values, is this qualitative or quantitative? According to Shon Harris it is qualitative but I am not 100% sure if I understand correctly. Qualitative is based on opinions and with using the formula's to calculate looks more like quantitative? Please give me your thoughts on this. Well Sir..u right ..Going purely ...


when we compare python and java which one is more secure???????????? depends on what you write with it :) In python everyone can see your code In java they can't (or not as easily) so in that sense java might keep you safer from some people, but if your program is well written, it shouldn't matter that they can see the ...


Hello all cybrarians. :) Most cool site ever. - Here, under this topic we will be dealing with features of python for Ethical Hacking.- I have my post approved for Cybrary Op3n too. You can get all from there. If missed, then you can follow, and participate actively here. - Python Programming for Hackers. Part 1 – Getting Started**Hi, & ...