0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Tutorial: How to Use the Nmap Scripting Engine
By: Johan Grotherus
September 8, 2015

Nmap is probably the most known and capable network scanner available today. It has a ton of features, it's open source and free to use. So, what's not to like about it? One of the features is the NSE, the Nmap scripting engine, which extends Nmap's functionality as a scanner. With the use of NSE, you can not ...

How to Bypass Website Blocking Using a Proxy Server
By: HEGA GEOFFROY
September 8, 2015

Usually, when we want to visit a website, we start our browser, type the address of the website in the URL address bar and wait for a response. In the meantime, the browser sends that web address to the local Domain Name Server (DNS) to convert it into respective IP address.The process of converting a website address or domain ...

Using SSLStrip in Kali Linux
By: nullvyte
September 8, 2015

This tutorial will teach you how to use SSLStrip in Kali Linux. SSLStrip is used to hijack secured HTTPS traffic and sniff the contents of this traffic.You'll need to download Kali Linux, which contains the SSLStrip utility in the standard image. Kali can be installed in a hypervisor, as a stand-alone OS or can be run as a live OS.  Find ...

Why Hundreds of Thousands of People are Learning Hacking, for Free
By: ryan c
September 3, 2015

Perhaps it is somewhat shocking that hundreds of thousands of people are learning hacking, for free on Cybrary. However, there are several very good reasons for this free cyber security learning revolution.A fundamental change in the way cyber security is taught and learned, is upon us. Together, the Cybrary team, and each of our Members, are making this change happen, ...

Password Complexity....Are We Fooling Ourselves?
By: sl0m0
September 2, 2015

Many of the beliefs we have around what constitutes a “good” password are created by what default policies in software such as Microsoft teach us.We are led to believe that a minimum length of 8 characters, a good mixture of UPPER and lower-case, numbers and uncommon (i.e. $@#&!) characters automatically make a good password.Many Systems Administrators ...

PASCAL LOGISTICS PROGRAMMING -(A simple example)
By: Odysseas
September 2, 2015

Introduction from the Programmer - This program is a simple program for the employees payment from the logistics section.We suppose that the currency is  in Euro and we dont focus on how the national tax system ison 40 Euro or in 100 Euro.Its a typical example to understand how programming is getting done with a languagelike Pascal. ...

Using the Metasploit database (advanced)
By: Johan Grotherus
September 1, 2015

In my first tutorial I demonstrated the basic usage of the Metasploit database. This included how to use nmap from within the Metasploit console, importing nmap scans and also how to display information in it.Now we will look a bit deeper in what possibilities the Metasploit database can provide, and also see how it looks when importing database from other ...

A Close Look at UDP Ping
By: Falko
September 1, 2015

The Internet is complex system composed of many different protocols and implementations. Sometimes, it's very buggy. It contains many poorly documented devices and operators that are implementing policies that aren't well measurable. Often, measured data isn't perfect, partial, not friendly, etc. Further, understanding such data is difficult and requires some skills and practice. Generally, any task related to data ...

Cracking a WPA2 WiFi Password with Aircrack-ng
By: upendra
September 1, 2015

Hola amigos... Aim: To crack a WPA2-psk encrypted WiFi password using Aircrack-ng.Requirements: If  you're using a Kali Linux in VMware or other virtual machines, then you need to get a compatible USB WiFi receiver (I'm using an Atheros AR9271 wireless network adapter), because WiFi connections don't show up in virtual machines. Instead, they show those connections ...

Tutorial: Basic Buffer Overflow
By: CryptoCodez
September 1, 2015

// Hey guys, today, I will give you a brief introduction to buffer overflows on Linux x8664 machines.// So, let's start with a basic example in C:_______// First some standard includes, you should now them...#include#include#include// we create a vulnerable functionint vulnFunction(int a, int b){// it creates a buffer with a size of 128 bytes! Yes, 128 not 125; it ...