0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Firewall Tunneling Using SSH and Putty
By: HEGA GEOFFROY
September 17, 2015

SSH (Secure Shell) is a protocol that allows two devices exchange data with each other security in an encrypted format, hence protecting the data being transmitted. It usually uses Port 22 for all communications. For example, if you were to connect to a remote server, then there's no guarantee that your username and password would be transmitted in secure ...

Understand These 4 Network Traffic Capture Tools
By: AliceA
September 16, 2015

Traffic capture, which also is referred to as packet capture, is one activity of Penetration Testing (pentesting)*. Pentesting allows the pinpointing of vulnerabilities on a network and provides identification of suspicious packets moving across the network. Being able to Identify routine network traffic is also valuable because it provides a look at how ...

Why Using Study Guides Make a Big Difference
By: klowe
September 16, 2015

You know those times where you took an exam without studying, and still did well? We hate to break it to you, but those times don't exist in the Infosec world.  Sure, you may have one or two baby Einsteins who can sit through a five-day bootcamp ...

Python Hashcracker (Dictionary Attack)
By: CameToLearn
September 16, 2015

This is a good example of a simple Python script, which you can create in less than 30 minutes.Python is really useful for creating security tools. You can create many tools like Port Scanners, Hashcrackers, Servers and Clients...and many more.A good book I recommend reading that focuses on Python security tools is "Black Hat Python" by Justin Seitz.Without further ...

Understanding Linux Input, Output and Pipes
By: The Steve
September 16, 2015

Linux uses 3 standard channels of communication: Standard input (channel 0), standard output (channel 1) and standard error (channel 2). Understanding how these channels work can allow you to perform very complex tasks at the command line.  Channel 0 Our standard input channel will generally take input from the keyboard. A lot of times we don't notice this because ...

Cryptography Outline
By: cdoyle
September 14, 2015

(outline as of 9/13/2015)   Course Title:Cryptography Section 1-1 Topic:Introduction To Cryptography Learning Objectives:This introduction video provides an outline of the curriculum covered in Cybrary's in-depth Cryptography course. Confidentiality, Integrity, Availability and Authentication How companies use cryptography How penetration testers can ...

An Introduction to Cross Site Scripting
By: nullvyte
September 14, 2015

What is Cross Site Scripting? Cross-site scripting (or “XSS”) is a vulnerability in web applications that's  caused by insecure coding practices, which do not sanitize user input. If a user of a vulnerable web application can pass scripts to the server and the server does not attempt to discover and remove scripts (“sanitizing input”), then the ...

Cygwin on Windows
By: Doktor Frankenstein
September 11, 2015

Cygwin is a large collection of GNU and Open Source tools. Its a good way to get to know Linux.  Cygwin is a DLL module that's a POSIX Emulation DLL from Red Hat that allows programs written for Unix / Linux systems to run on Windows. Originally "Cygnus Support", Cygnus Solutions was founded in 1989. They  developed Cygwin [among other ...

Code::Blocks and MinGW Installation for Windows
By: Doktor Frankenstein
September 9, 2015

This was done on Win7 64bit OS. It's pretty much the same on all Windows, with slight  variants. Code::Blocks is also available for Linux and Mac and has been ported to FreeBSD, OpenBSD, and Solaris.  This is geared towards beginners that want an awesome, free, open source cross-platform IDE that supports multiple compilers including GCC, Clang and Visual C++. Code::Blocks ...

All About Hacking (French Version)
By: waota
September 8, 2015

Beaucoup de jeunes informaticiens ou amateurs rêvent de devenir « pirate informatique »,c’est très souvent pour démontrer qu’on est un as en informatique. Alors ils se mettent à rechercher sur google « technique de piratage ; comment infiltrer un réseau informatique ; comment détourner un serveur ; comment surfer gratuitement ; comment faire ceci ou cela»…le plus ridicule c’est ...