0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Prevent Communications Spying with O.T.R. Encryption and TOR in XMPP
By: Krintoxi
September 23, 2015

With the growing concern of online privacy, this is by far the best way I've found to keep your communications private using a combination of O.T.R., TOR, Linux and a trustworthy VPN service. Note - This guide can be used by the following communities of people and others: Activists: ...

Testing Your Linux Firewall Configuration
By: Falko
September 23, 2015

At Cybrary.it, it's all about security and penetrating. I've decided to write this little guide for testing your own firewall configuration. We're going to use Firewall Tester (FTester) tool. Important: this tool is now outdated. However, I find it still useful and nice to use for beginners. The Firewall Tester ...

Take the Right Roads Toward Your Infosec Career
By: Rafik
September 21, 2015

It's hard to administer systems nowadays without security. Managing and administering systems almost always includes a security component, if not an outright security focus. Are you interested in moving from a systems administration position into a more security-focused role? And, do you want to design your career in information systems? As an example, consider that ...

Internet Protocols: Versions 4 and 6 Analysis and Comparison of IPv4 and IPv6
By: Wushi09
September 21, 2015

Internet Protocols: Versions 4 and 6 Analysis and Comparison of IPv4 and IPv6   Usman Jibril Department of Management Information Systems Cyprus International University Lefkosa, North Cyprus. wushi09@outlook.com Akintoye Oluwasegun Ogundiya Department of Management Information Systems Cyprus International University Lefkosa, North Cyprus. ...

Anatomy of Error-Based SQL Injection
By: nullvyte
September 21, 2015

What is SQL Injection? SQL injection is a subset of the "code injection" attack method. SQL stands for Structured Query Language and is used by databases to store and retrieve information. Many websites require this capability web developers use a server-side scripting language - often PHP or ASP - to pass user input to a ...

Tutorial: Setting up a Virtual Pentesting Lab at Home
By: KaalBhairav
September 21, 2015

Hi Pentesters, while pursuing the course on Ethical Hacking and Penetration Testing , we often feel the need to have our own pentesting lab to practice all the stuff we're learning during the course. I am no exception, so I began searching for a way I could do this. After gathering some info, I found a way and wanted ...

What You Should Know About SIEM
By: Zeeshan Alam
September 21, 2015

Security Operations Centers are essential part for dealing with cyber security threats where enterprise information systems are monitored, assessed and defended. SIEM (Security Information and Event Management), which is a combination of SIM (Security Information Management) and SEM (Security Event Management) provides near real-time analysis of security alerts generated by network hardware and applications.Different vendors provide different solutions and ...

Using Python to Facilitate Tasks in Linux
By: Krintoxi
September 21, 2015

Hello, this is a short guide on how to use the Python Scripting language to facilitate Tasks in Linux. I'll start by giving a small overview on what Python is:According to Wikipedia," Python is a widely used general-purpose, high-level programming language . Its design philosophy emphasizes code readability, and its syntax ...

Hacked Through Phishing: An Ugly Security Awareness Lesson Learned
By: ryan c
September 18, 2015

Given we're a cyber security education company, we like to preach (maybe too much at times) about how darn important  security awareness training for employees really is. So, we thought we'd share the hideously ugly lesson that internet authority company, ICANN, learned about security awareness not too long ago.  Reliving the ICANN Phishing Hack: Phishing is ...

What Really Happens When I Press Enter
By: The Steve
September 18, 2015

Please note: some of the backslahes ( \ ) in the coding below may have been removed by the WordPress program. When you press enter, the program doesn't just run. There's an order of operations that takes place. Understanding this order can keep you from making some pretty big mistakes. Let's take a command and break apart what ...