0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

[podcast] Guardrails vs. Speedbumps
By: BrBr
October 12, 2015

When we wanted to have Martin Fisher on, it was to discuss 'Security Mandate vs. Security Influence'. We wanted to discuss why companies treat compliance as more important, and if it's only because business requires it to be done. And if infosec is a red-headed stepchild because they often don't have the guidance of a compliance framework.But it ended up ...

To Cloud or Not to Cloud with SharePoint
By: Hollywood27kt
October 12, 2015

One of the most frequent questions I get when working with clients who are currently using SharePoint Server is what the advantages and disadvantages of moving to the cloud, or mainly SharePoint Online/Office 365. SharePoint Online has been a technological forefront when it comes to web content management, and for good reason, too. I've seen a lot of ...

Tutorial: Hacking/Troubleshooting VoIP and ISDN
By: Kouzelnik
October 12, 2015

Phone hacking has been around since creation of the phone line. Now, with VoIP technology, we face new issues. Let's take a closer look at Cisco connections and troubleshooting of basic problems. Much depends on the connection and hardware you're working with. Cisco phones are connected to the switch and managed via CME or CUCM. Below, ...

Examining the IoT from a Cyber Security Point of View
By: GodSpeed
October 12, 2015

Before we start, here’s a fun fact: It wasn’t a researcher or an analyst to first use the term ‘Cyberspace,’ it was a science fiction author named William Gibson. It was used in 1982 in a short story; he later elaborated on the term in his novel ‘Neuromancer.’  Ironically, whatever he wrote as a fiction, is anything ...

CyDefe Podcast Episode 18
By: CyDefe
October 8, 2015

Hey hey everyone. We at CyDefe have released another awesome episode of our cyber security podcast. On this week’s episode we discuss fake blue screen of death, ad blocking, a critcal WinRAR vulnerability, and a shortage of cyber professionals.You can check out the episode on iTunes or check it out on our website . Have a listen and enjoy.

Stop ISP Espionage and Transparent Proxies Using DNS Cryptography
By: Krintoxi
October 8, 2015

Stop ISP Espionage and Transparent Proxies Using DNS Cryptography Hello,Today, I'll show you how to properly setup a DNSCrypt to prevent monitoring and logging on your DNS by your default provider. We'll do this by changing our DNS provider to an off-shore or other DNS service that does NOT log our requests, and encrypts DNS queries and responses. Before we explore ...

Programming with Juliar
By: Rattar
October 7, 2015

Have you ever wanted to have a webtool that can help with security?I created a simple language written in JavaScript that can be used to get you started with programming. One of the features of the language is its support for modules. There are two modules that I will go into: l33t.juliar and security.juliar, which are made specifically for ...

The Twisted Security Honey Pot Network
By: klowe
October 6, 2015

Sure, maybe you'd like to think you possess the manpower to monitor your computer networks 24/7, but we all know that's simply impossible.  Thus, threats come as they may, and you might be sleeping when one attempts to overthrow your data system.So what can you do to prevent this from happening? Enter the Honeypot---a security mechanism that detects and deflects threats ...

Java Programmers Competition IPPC: Show Me Your Speed
By: ryan c
October 6, 2015

Cybrary would like to announce a really cool Java programming competition by our friends at NextHacker. Check it out:   Java Programmers Competition IPPC: SHOW ME YOUR SPEED!  We are already convinced that there are many gifted programmers and ingenious hackers.Now we want to know who the fastest and most ...

Q and A: What are DOS and DDOS Attacks?
By: KaalBhairav
October 5, 2015

Q and A: What are DOS and DDOS Attacks?   Q1. What is a DOS attack? Ans: DOS attack is short for Denial of Service attack. An attacker sends a lot of garbage traffic to a server, such that it consumes all the resources on the server, rendering it unusable to the legitimate users. In the ...