0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Stop ISP Espionage and Transparent Proxies Using DNS Cryptography
By: Krintoxi
October 8, 2015

Stop ISP Espionage and Transparent Proxies Using DNS Cryptography Hello,Today, I'll show you how to properly setup a DNSCrypt to prevent monitoring and logging on your DNS by your default provider. We'll do this by changing our DNS provider to an off-shore or other DNS service that does NOT log our requests, and encrypts DNS queries and responses. Before we explore ...

Programming with Juliar
By: Rattar
October 7, 2015

Have you ever wanted to have a webtool that can help with security?I created a simple language written in JavaScript that can be used to get you started with programming. One of the features of the language is its support for modules. There are two modules that I will go into: l33t.juliar and security.juliar, which are made specifically for ...

The Twisted Security Honey Pot Network
By: klowe
October 6, 2015

Sure, maybe you'd like to think you possess the manpower to monitor your computer networks 24/7, but we all know that's simply impossible.  Thus, threats come as they may, and you might be sleeping when one attempts to overthrow your data system.So what can you do to prevent this from happening? Enter the Honeypot---a security mechanism that detects and deflects threats ...

Java Programmers Competition IPPC: Show Me Your Speed
By: ryan c
October 6, 2015

Cybrary would like to announce a really cool Java programming competition by our friends at NextHacker. Check it out:   Java Programmers Competition IPPC: SHOW ME YOUR SPEED!  We are already convinced that there are many gifted programmers and ingenious hackers.Now we want to know who the fastest and most ...

Q and A: What are DOS and DDOS Attacks?
By: KaalBhairav
October 5, 2015

Q and A: What are DOS and DDOS Attacks?   Q1. What is a DOS attack? Ans: DOS attack is short for Denial of Service attack. An attacker sends a lot of garbage traffic to a server, such that it consumes all the resources on the server, rendering it unusable to the legitimate users. In the ...

Jobs are coming!
By: Tatianna
October 5, 2015

caption id="" align="alignleft" width="275"] Employers Want YOU!  [/captionIf you are searching for a job or looking to change to a career in IT or Cyber Security, our developer has created something special for you. Cybrary’s job platform was created for employers, recruiters – and yes – YOU! To help build ...

Configure a Debian Firewall Gateway
By: scilley
October 5, 2015

I am presenting to you, the Cybrary members, a Firewall/gateway configuration that's used here in my home/HQ for Twisted Security.It's recommended that you learn the basic Linux Command Line operations and know how to use the tools provided to scan and monitor your firewall.  1. Install Latest Debian Distro a. Absolute minimal install b. ...

An Introduction to DNS HiJacking
By: Jafar Hasan
October 2, 2015

Hello Readers... DNS Hijacking (sometimes referred to as DNS Redirection ) is a type of malicious attack that overrides a computer’s TCP/IP settings to point it to a rogue DNS server, invalidating the default DNS settings. When an attacker takes control of a computer to alter its DNS settings, the system has been DNS Hijacked.The “Domain Name ...

12 Practice Drills for the Linux Command Line
By: Homer
October 1, 2015

After watching the "The Linux Command Line Interface" Cybrary module, it's important to practice the commands introduced in the module. What follows is a simple listing of commands you can run through on your own system(s) to build familiarity for the test and confidence on the command line. Down the road, it can be helpful to return ...

“Man in the Middle” Attacks Explained Through ARP Cache Poisoning
By: Anon.D
October 1, 2015

In a "Man in the Middle" (MITM) attack, an attacker intercepts the communication between a client (victim, in this case) and a server. Interception of communication allows an attacker to read, insert and modify the data in the MITM attack. If the communication is not encrypted, then passwords can also be captured. Thus, an attacker is acting as a ...