0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Jobs are coming!
By: Tatianna
October 5, 2015

caption id="" align="alignleft" width="275"] Employers Want YOU!  [/captionIf you are searching for a job or looking to change to a career in IT or Cyber Security, our developer has created something special for you. Cybrary’s job platform was created for employers, recruiters – and yes – YOU! To help build ...

Configure a Debian Firewall Gateway
By: scilley
October 5, 2015

I am presenting to you, the Cybrary members, a Firewall/gateway configuration that's used here in my home/HQ for Twisted Security.It's recommended that you learn the basic Linux Command Line operations and know how to use the tools provided to scan and monitor your firewall.  1. Install Latest Debian Distro a. Absolute minimal install b. ...

An Introduction to DNS HiJacking
By: Jafar Hasan
October 2, 2015

Hello Readers... DNS Hijacking (sometimes referred to as DNS Redirection ) is a type of malicious attack that overrides a computer’s TCP/IP settings to point it to a rogue DNS server, invalidating the default DNS settings. When an attacker takes control of a computer to alter its DNS settings, the system has been DNS Hijacked.The “Domain Name ...

12 Practice Drills for the Linux Command Line
By: Homer
October 1, 2015

After watching the "The Linux Command Line Interface" Cybrary module, it's important to practice the commands introduced in the module. What follows is a simple listing of commands you can run through on your own system(s) to build familiarity for the test and confidence on the command line. Down the road, it can be helpful to return ...

“Man in the Middle” Attacks Explained Through ARP Cache Poisoning
By: Anon.D
October 1, 2015

In a "Man in the Middle" (MITM) attack, an attacker intercepts the communication between a client (victim, in this case) and a server. Interception of communication allows an attacker to read, insert and modify the data in the MITM attack. If the communication is not encrypted, then passwords can also be captured. Thus, an attacker is acting as a ...

Tutorial: Setting Up a Virtual Web Server for Safe Penetration Testing at Home
By: KaalBhairav
October 1, 2015

Hi Cybrarians!!!I hope you are doing well and studying hard. While pursuing the Penetration Testing course, we often feel the need for our own Web servers, where we can test our skill-sets without worrying about permissions and the law.To this end, I started to gather some information and found out that we can create our own virtual web servers and ...

What is Doxing?
By: Jafar Hasan
September 28, 2015

I'd like to clarify what Doxing is. Doxing is the procedure of picking up data about somebody or something by utilizing sources on the Internet and utilizing essential reasoning abilities. Its name comes from "Documents" - in short it's the recovery of "Documents" on a person or organization.You may be thinking: "So, it's essentially getting data from looking up ...

Using Steganography and Cryptography to Bypass Censorship in Third World Countries
By: Krintoxi
September 25, 2015

Hello - Today I'll be providing a set-by-step guide to Steganography and its crypto. We'll look at its uses in third world countries and oppressive regimes that have complete control over the Net, including Cuba, Venezuela, North Korea, China, Syria etc. Oppressive systems are known to shut down secure ways of communicating, especially for activists and those who ...

Prevent Communications Spying with O.T.R. Encryption and TOR in XMPP
By: Krintoxi
September 23, 2015

With the growing concern of online privacy, this is by far the best way I've found to keep your communications private using a combination of O.T.R., TOR, Linux and a trustworthy VPN service. Note - This guide can be used by the following communities of people and others: Activists: ...

Testing Your Linux Firewall Configuration
By: Falko
September 23, 2015

At Cybrary.it, it's all about security and penetrating. I've decided to write this little guide for testing your own firewall configuration. We're going to use Firewall Tester (FTester) tool. Important: this tool is now outdated. However, I find it still useful and nice to use for beginners. The Firewall Tester ...