0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Assembly language is the most commonly used when analyzing malware. why is that? because malwares are usually designed in C or C++, and after the code was compiled it is almost impossible to get an access to the source code. what we do have, thanks to brilliant tools like IDA Pro, is an access to the low level assembly language. ...


Hi everyone! I wanted to ask if anyone could clarify the difference between ARP and MAC spoofing. I only have a surface level understanding of both these terms and they sound very similar. Correct me if I am wrong, but both cases result in a MAC address that ends up compromised where an attack 'impersonates' a stolen MAC address to ...
![[SOLVED] Are HUBs Layer 1 Or Layer 2 Devices](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

I understand that a switch is a layer 2 device, but don't understand why a Hub is stated as layer 2 device in the Networking class console. They are a layer 2 device - they also transmit based on MAC-adresses - like switches. The difference is, that they send out the packets to all connections not just the one with the ...


here are some of the apps that can help you manage your work or home network!!!! WiFiKill:cut-off someone's wifi in your network NetCut: Same as above Fing:All network Admin tools LanDroid:Network Admin tools Home WIfi Alert: Admin tools and Netcut I will absolutely check these tools out. Thank you thanks !! :) Haven't looked at these but will check them out... Thnx for ...


Are You Want To Pass The APICS CPIM Exam?CertificationsBuzz would love to help you out. At APICS CPIM CPIM Exam, we value your hard-earned cash. APICS CPIM Certification exams could be quite expensive, and we know you don’t want your money to go to waste. Making use of our CPIM exam product will save you time and money. Oh, and ...


how to attack on a network with forkbombs? You could go to jail ;) Nope,Mr.KappaG, as I'm doing master's in CyberSecurity Systems and Networks -- I hav to understand abt this fork bomb and I tried on my pc(using VM wares)--I got hw it works practicully than I tried to stop attacking these fork bombs on my PC anyway(bcoz we use to ...


Anyone have a copy of the noob guide and the other guides that were posted today by Anonymous. I'm not planning on using it, I just heard about it in the news and am curious as to what it says and how the mind of a hacker works. Unfortunately I believe you need to use IRC and possibly TOR to ...


What all can you do when you find an anon FTP? Just use it as a dropbox for files, or is it possible to upload backdoor code and execute it? I am in Exploitation Part 1 of Advanced Pen Testing, and uploading backdoor PHP code is pretty cool. Can you do anything like that with an FTP server? 1st find out ...


Android Applications Reversing 101 https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/ Enjoy!! What is this ?? Hi rk-rajpurohit, this reference guide useful for your Android reversing applications.


Lately, EC-Council announced the latest version of Ethical Hacking that is CEH v10. The tenth edition of the most in-demand certification related to cybersecurity. The course mainly envelopes the five phases of ethical hacking. 1. Diving into Reconnaissance 2. Gaining Access 3. Enumeration 4. Maintaining Access 5. Covering your Tracks Find what is new in CEH v10 and [what are ...