0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Tutorial: Evading Anti-Virus Software While Hacking
By: Akash Raghav M
June 22, 2015

Hello,When it comes to " hacking " into our target's system, where most of us all fail is evading their Anti-Virus (AV) .In this tutorial, I'll be teaching you various ways to actually by-pass the AV, so you can easily have a meterpreter session running into your target's system without the Anti-Virus flagging your software.AV software companies generally ...

CISSP Book Cross Reference Chapter Correspondence
By: DocGreenBanner
June 21, 2015

CISSP Book Domain Chapter Mapping Cross Reference.

A Comprehensive Look at Cyberterrorism, Hactivism and Cyber Espionage
By: Alan Raff
June 21, 2015

The Idea of Terrorism What images come to mind when someone says "terrorism"? Many people may think of bombs, hostages, and/or other conventional weapons. What people don’t consider might easily be the biggest and most harmful weapon of all: technology.Today, everything revolves around computers. Computers and computer systems were designed to work, but not necessarily with ...

Encryption Software and Combating Cyber Crime
By: smoke
June 19, 2015

Encryption Software and Combating Cyber Crime Abstract Encryption software has been a controversial topic in the legal world since its inception. There are differing views on the legalities of this type of software, each with their own valid viewpoints. There have been many cases decided on this matter in various courts but no ...

An Introduction to Linux File and Directory
By: HakTuts
June 19, 2015

Introduction LINUX is a Unix-like and mostly POSIX-compliant computer operating system assembled under the model of free and open-source software development and distribution. The defining component of Linux is the Linux kernel, an operating system kernel first released on 5 October 1991 by Linus Torvalds.The Free Software Foundation uses the name GNU/Linux to describe the operating system. Linux ...

Introduction to Cryptography
By: HakTuts
June 17, 2015

What is cryptography? Cryptography derives its name from the Greek word “Kryptos,” which means “Hidden Secrets.” Cryptography is the practice and study of hiding information. It's the Art or Science of converting a plain intelligible data into unintelligible data and again re-transforming that message into its original form. It provides: Confidentiality, Integrity, Accuracy. Encryption The process ...

Automatas Finitos
By: Kierc117
June 17, 2015

[udesigniconfont name="fa fa-user"] Contribution Credit: @kierc117  Automata FinitoUn automata finito es un vector de 3 elementosM=(I,S,DELTA,F)donde I es el conjunto finito de entradas (no vacio), S es el conjunto finito de estados, DELTA es la funcion de transicion de estados y F es el conjunto finito de estados finales (incluidos en S)el hecho de que todos los conjuntos sean ...

Education: the first line of defense in wireless network security
By: Rachel Laura M
June 16, 2015

Wireless networks are fast and convenient and allow for many devices to be connected on a network and communicate with each other. However, this technology presents a new set of issues that weren’t present in the wired world. Mainly, threats to security including but certainly not limited to: Information reaching unintended recipients Unauthorized users ...

The Limitations of Modern Cryptography
By: Rachel Laura M
June 16, 2015

Individuals now own multiple electronic devices - from Smartphones, to tablets, to laptops and more. They often bring these items into the workplace, or use them to work from a remote location. Increased threats to a company’s important and confidential information are more prevalent than ever.Protection of this information is crucial - as information can travel across the world ...

The Comprehensive Guide to Ethical Hacking
By: HakTuts
June 15, 2015

Introduction to Ethical Hacking When security experts offer "safety talks" to business groups, they share definitions for VPN's, encryption, laptop security, network security, online piracy and so on. Then, they explore instances when establishing security are ineffective: vulnerabilities are found and harmful components creep in. At this point, the security expert introduces the ...